<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/grc-case-study-tier-1-bank-exceeds-digital-asset-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3d6cb740-738b-4d61-bd64-f3689f94638c/AKATI+Sekurity+GRC+Case+Study.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - GRC Case Study: Tier-1 Bank Exceeds Digital Asset Compliance - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/mssp-case-study-manufacturing-firm-secures-ot-with-247-endpoint-mdr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6bd8c6aa-0ded-4e39-a859-af69ae5e77a4/AKATI+Sekurity+MSSP+Case+Study+-+4.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - MSSP Case Study: Manufacturing Firm Secures OT with 24/7 Endpoint MDR - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/mssp-case-study-education-institute-secures-campus-with-247-soc-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c2b02ffb-eb32-4981-b43c-b912131989f6/AKATI+Sekurity+MSSP+Case+Study-1.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - MSSP Case Study: Education Institute Secures Campus with 24/7 SOC Service - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/phishing-case-study-how-a-leading-conglomerate-is-building-a-human-firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a3c30d44-a6a7-43c0-8120-f93641bb8a8f/AKATI+Sekurity+Phishing+Assessment.jpeg</image:loc>
      <image:title>Cybersecurity Case Studies - Phishing Case Study: How A Leading Conglomerate Is Building A Human Firewall - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/csma-case-study-how-a-healthcare-provider-is-transforming-its-security-posture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b5886951-7f39-4ff6-9460-d4209dfd8e0b/AKATI+Sekurity+CSMA+Case+Study</image:loc>
      <image:title>Cybersecurity Case Studies - CSMA Case Study : How A Healthcare Provider Is Transforming Its Security Posture - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/vapt-case-study-eliminating-critical-server-vulnerabilities-for-a-leading-enterprise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/11b5e9c8-18b6-4853-8b7e-84db5dc2559e/Critical+Server+Vulnerabilities</image:loc>
      <image:title>Cybersecurity Case Studies - VAPT Case Study : Eliminating Critical Server Vulnerabilities for a Leading Enterprise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/mssp-case-study-agency-achieves-100-multi-cloud-security-visibility-with-akati-sekuritys-247-soc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c5abd8a0-bdef-44de-b217-392eb3947984/MSSP+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - MSSP Case Study : Agency Achieves 100% Multi-Cloud Security Visibility with AKATI Sekurity's 24/7 SOC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/mssp-case-study-how-a-multinational-enterprise-achieved-96-threat-prevention-with-247-soc-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d7e2d0b2-50cf-497b-9475-db4bdad945d0/MSSP+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - MSSP Case Study : How A Multinational Enterprise Achieved 96% Threat Prevention With 24/7 SOC Monitoring - About the Customer</image:title>
      <image:caption>The client is a multinational chemicals enterprise with operations across Southeast Asia. Their complex digital infrastructure supports critical manufacturing processes, supply chain management, and global business operations. With an expanding attack surface and increasingly sophisticated threat landscape, maintaining continuous security visibility became essential for protecting both operational technology and business-critical data.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/forensic-investigation-of-a-multi-stage-ransomware-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3359a6dc-3395-4ae4-a314-d51af688a40f/Digital+Forensic+Service+in+New+York</image:loc>
      <image:title>Cybersecurity Case Studies - Digital Forensics Case Study: Anatomy of a Four-Month Ransomware Attack</image:title>
      <image:caption>A large enterprise client found itself in every executive's worst nightmare: a total server infrastructure shutdown caused by a devastating ransomware attack. Files across critical systems were encrypted, ransom notes were deployed, and business operations ground to a complete halt.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/vapt-case-study-securing-digital-banking-platforms-through-in-depth-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3a101f67-14be-462c-a3b7-f6264371ad5f/Pentest+Company+in+New+York</image:loc>
      <image:title>Cybersecurity Case Studies - VAPT Case Study : How Penetration Testing Averted a Transaction Fraud Crisis for a Financial Institution</image:title>
      <image:caption>A forward-thinking financial institution engaged AKATI Sekurity to perform a comprehensive penetration test on its most critical public-facing assets: its Business and Retail web banking applications. With these platforms processing countless sensitive transactions daily, the client sought to proactively validate its security controls against sophisticated cyber threats and ensure its defenses were compliant with stringent financial industry mandates.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/uncovering-sophisticated-employee-fraud-a-digital-forensics-case-study</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/eacfd07a-35b6-4a8c-9087-674d2fd272ab/Digital+Forensic+Company+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Digital Forensics: Unmasking a Coordinated Employee Fraud Scheme</image:title>
      <image:caption>When a leading financial services firm suspected a severe breach of trust, they faced a critical situation. There were allegations that at least one employee was soliciting client investments for IPOs, only to divert the funds into an unauthorized third-party account.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/paynet-fpx-operational-audit-akati-sekurity-assesses-fintech-regulatory-adherence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/185c88a7-f82b-402d-92ba-4f9fc7ba362a/PAYNET+TPA+Audit+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - PayNet FPX Operational Audit: AKATI Sekurity Assesses Fintech Regulatory Adherence - Case Study Highlight</image:title>
      <image:caption>A financial technology company (TPA) engaged AKATI Sekurity for an independent operational audit to ensure its adherence to PayNet's stringent FPX Operational Procedures. The comprehensive audit by AKATI Sekurity found no instances of non-compliance but identified nine areas of partial compliance, offering specific opportunities for operational enhancement. AKATI Sekurity's actionable recommendations provided a clear roadmap for the client to strengthen seller onboarding, due diligence, service level management, and dispute communications, thereby reinforcing operational resilience and regulatory trust.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/strengthening-cybersecurity-defenses-with-akati-sekuritys-adversarial-attack-simulation-exercise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e1bc4466-9929-42e2-a865-cde73c60069b/AASE+Service+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - AASE Case Study: AKATI Sekurity Enhances Cybersecurity for Financial Institution - Case Study Highlight</image:title>
      <image:caption>A financial organization underwent an Adversarial Attack Simulation Exercise (AASE) by AKATI Sekurity to test its defenses against realistic cyber threats. The AASE uncovered specific vulnerabilities like web application weaknesses and credential exposure, while also confirming the effectiveness of certain existing security controls. Insights gained from the exercise allowed the client to implement targeted security upgrades, significantly bolstering their cyber defense posture.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/how-akati-sekuritys-binary-review-secured-mobile-platforms-against-critical-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7b0f359d-e0a0-4964-94f6-17abd710edb1/Penetration+Test+Company+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Mobile Binary Review: AKATI Sekurity Secures Financial App Against Exploits - AKATI Sekurity's binary review identified critical mobile app vulnerabilities for a financial institution, enabling crucial security improvements.</image:title>
      <image:caption>Discovered critical threats like Root Detection Bypass and SSL Pinning Bypass in the institution's iOS and Android app binaries. Performed in-depth binary analysis of application code, data storage, secure communications, and anti-tampering controls. Enabled the client to remediate these flaws, significantly boosting app security and protecting user data and trust.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/the-unseen-breach-a-case-study-in-compromise-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/75438ca9-fc0d-4f7d-8166-e272aa404bae/RMIT+Compromise+Assessment+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Compromise Assessment: AKATI Sekurity Uncovers Hidden Breach for Financial Institution - The Regulatory Mandate</image:title>
      <image:caption>The concern did not come from flashing alarms or a catastrophic failure. It arrived in the form of a regulatory requirement, part of Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/a-bank-turned-to-akati-sekurity-for-a-mobile-app-security-review-heres-what-happened</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/0ad21823-7f46-4985-9185-0f7772a76e5f/mobile-online-banking-concept.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - Mobile App Security Review: AKATI Sekurity Assesses Banking App Vulnerabilities - Securing Mobile Banking: How AKATI Sekurity’s Assessment Made a Difference</image:title>
      <image:caption>A financial institution needed to be sure its mobile banking app was secure. It was a routine check, the kind that happens all the time in an industry where security breaches can cost millions. But when cybersecurity firm AKATI Sekurity began testing, the findings were unsettling.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/how-a-security-loophole-nearly-led-to-an-account-takeover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ce95e415-9aa7-45d0-ba3a-a253fb54669a/Computer+forensic+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Incident Response Case Study: AKATI Sekurity Prevents Account Takeover for Financial Client - It started with a single unexpected notification.</image:title>
      <image:caption>A high-profile user received an unusual authentication request on their mobile device—but they hadn’t initiated it. At first, it seemed like an error. But within minutes, another request followed. The user, suspecting something was wrong, reported the incident.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/a-digital-forensics-case-study-on-ransomware-lateral-movement-and-systematic-destruction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5a1c5240-0503-49fb-974f-ef3b3b449f2b/Digital+Forensics+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Digital Forensics Case Study: AKATI Sekurity Investigates Healthcare Ransomware Attack - Cyberattacks don’t start with chaos.</image:title>
      <image:caption>They begin in silence—an unnoticed file execution, a hidden backdoor, a connection to an obscure external server. By the time an organization realizes what’s happening, it’s already too late.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/behind-the-simulated-breach-a-case-study-on-red-teaming-for-rmit-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c1c4d240-ec0b-4bae-adb0-eacc63cbdfc1/RMiT+AASE+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - Red Teaming for RMiT: AKATI Sekurity Simulates Breach for Financial Compliance</image:title>
      <image:caption>Cyberattacks don’t announce themselves with flashing alarms. They slip in quietly, exploiting overlooked vulnerabilities, tricking employees into revealing credentials, and bypassing security controls that exist only in theory.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/ensuring-rmit-compliance-a-case-study-on-strengthening-cyber-governance-and-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/42f53a5b-e282-46c0-a696-0596a73c9a22/Cybersecurity+Compliance+RMIT+Malaysia</image:loc>
      <image:title>Cybersecurity Case Studies - RMiT Compliance &amp;amp; GRC: AKATI Sekurity Strengthens Financial Institution's Risk Management</image:title>
      <image:caption>Cybersecurity isn’t just about blocking hackers or patching vulnerabilities. It’s about governance—who’s responsible, who’s accountable, and what happens when things go wrong. Regulations like Bank Negara Malaysia’s (BNM) Risk Management in Technology (RMiT) exist to enforce structure, but meeting the minimum requirements doesn’t guarantee security. It only guarantees compliance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/akati-sekurity-helped-a-biotech-firm-recover-from-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3f8cb38a-61ae-4190-ac55-c81fd384e329/laboratory-microscope-table-dark.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - Ransomware Recovery: AKATI Sekurity Enables Biotech Firm's Restoration Post-Attack</image:title>
      <image:caption>A biotech research firm was well aware of cybersecurity risks. It had firewalls, antivirus software, and data backups in place. But one morning, everything stopped. Employees couldn’t access research data. Systems were locked. A ransom note demanded payment in cryptocurrency, warning that sensitive files would be permanently lost if they didn’t comply. They were dealing with a ransomware attack—and they needed help fast.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/akati-sekuritys-compromise-assessment-strengthened-a-leading-telcos-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b7a7a809-73ce-463e-9e3d-883c4ca0c8c3/low-angle-view-illuminated-ferris-wheel-night.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - Compromise Assessment: AKATI Sekurity Hardens Telco Security After Ransomware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/leading-bank-benefited-from-akati-sekuritys-simulation-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/04051042-dd0c-49a8-8eee-62840658e3a8/stack-golden-coins-bar-chart-form-black-background-golden-coins-bar-chart.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - DDoS Simulation: AKATI Sekurity Enhances Bank's Resilience Against Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/akati-sekuritys-compromise-assessment-strengthens-cybersecurity-for-a-global-healthcare-institution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1bd7b1ed-bd60-48fd-9feb-c0645bc7825a/healthcare-concept-medicine-object-stethoscope-isolated-white.png</image:loc>
      <image:title>Cybersecurity Case Studies - Compromise Assessment: AKATI Sekurity Strengthens Global Healthcare Cybersecurity</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/akati-sekuritys-ddos-mitigation-for-a-leading-payment-gateway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/2a182425-2eda-4745-8a74-196d73b2819c/payment-successful-words-shopping-cart-checkmark-icon-symbol-virtual-screen-smartphone-near-laptop-computer-man-using-mobile-phone-online-payment-banking-shopping-home.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - DDoS Mitigation: AKATI Sekurity Secures Payment Gateway Transactions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/akati-sekuritys-compromise-assessment-for-a-utility-agency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ab8bb3d3-4054-42c4-af28-3edabd6bc0cf/modern-combined-heat-power-plant-electrical-power-station-cooling-tower-industrial-chimneys-blue-sky-sunny-day.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - Post-Breach Compromise Assessment: AKATI Sekurity Aids Utility Agency's Threat Mitigation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/healthcare-corporation-in-asia-pacific-seeks-cybersecurity-expertise-to-strengthen-security-infrastructure-and-patient-data-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1606698299285-45Q96HBDVSVVUW2KENI9/healthcare-and-technology-BQDR58E.jpg</image:loc>
      <image:title>Cybersecurity Case Studies - Cybersecurity Assessment: AKATI Sekurity Strengthens Healthcare Provider's Data Defenses</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/capital-red-teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1591501622524-E1W4I1Q40RUKWXBK1VFK/capital+firm+akati+Sekurity+red+teaming</image:loc>
      <image:title>Cybersecurity Case Studies - Red Teaming Case Study: AKATI Sekurity Enhances Capital Management Firm's Defenses</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/asian-bank</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1594566334522-3NFALZGIPYVXH11P62NS/image-asset.jpeg</image:loc>
      <image:title>Cybersecurity Case Studies - Security Posture Assessment: AKATI Sekurity Enhances Asian Financial Institution's Defenses</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/top-secret-agency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1594566607421-ZYVTVR1Z4QI3LP9C55SN/image-asset.jpeg</image:loc>
      <image:title>Cybersecurity Case Studies - How a Top Secret Government Agency Strengthened Its Cyber Defenses with AKATI Sekurity</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/retail-giant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1594567886868-ZWF6CZCD4LR67J8JUIO0/image-asset.jpeg</image:loc>
      <image:title>Cybersecurity Case Studies - Securing E-Commerce: How AKATI Sekurity Helped a Retail Giant Strengthen Its Online Shopping Platform</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/big-data-iot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1594568065133-2RN6EUEDWGYLIF4I03ZC/image-asset.jpeg</image:loc>
      <image:title>Cybersecurity Case Studies - Securing Big Data &amp;amp; IoT: How AKATI Sekurity Strengthened a European Tech Giant's Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Health</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/VAPT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Governance+Risk+%26+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Capital+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Telecommunications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Financial+Institution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Government+Agency</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Retail</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Utility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Penetration+Test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Lifestyle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/MDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/category/Manufacturing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/DDoS+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/RMiT+AASE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/VAPT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Red+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Forensic+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Utility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Governance+Risk+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Bank+VAPT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Phishing+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/RMiT+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Computer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Penetration+Test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/MDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/DDoS+Mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Manufacturing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/CSMA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Compromise+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Social+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/SOC+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/CBSL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Adversarial+Attack+Simulation+Exercise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Telecommunications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Computer+Forensic+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Healthcare+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Mobile+App+VAPT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Cybersecurity+Maturity+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Financial+Institutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/RMiT+Compliance+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Bank+Negara+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Digital+Forensics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Paynet+TPA+Audit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Mobile+Banking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/cybersecurity-case-studies/tag/Employee+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/harvest-now-decrypt-later</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f7e81155-9b2e-4016-b72e-17d1d9f9341c/AKATI+Sekurity+MSSP</image:loc>
      <image:title>Insights - Harvest Now, Decrypt Later - "Harvest Now, Decrypt Later": The Quantum Clock Is Already Ticking on Your Data A guide to post-quantum cryptography risk, HNDL attacks, and what your organisation must do before Q-Day. AKATI Sekurity Insights | 1 April 2026 | 8 min read</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-2026-ciso-checklist-your-roadmap-to-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/699cf886-be37-4466-8e3a-255a746e5caf/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - The 2026 CISO Checklist: Your Roadmap to Resilience - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-invisible-threat-when-ai-starts-lying-to-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e452accc-2be5-48ef-8bca-251e411a0ebf/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - The Invisible Threat: When AI Starts Lying to You - Key Takeaway</image:title>
      <image:caption>The Concept: "Model Poisoning" is like rewriting a student's textbook before a test. The AI learns wrong information on purpose. * The Goal: Attackers change specific outcomes—like ensuring a specific loan is approved or denied—without breaking the whole system. The Risk: This destroys trust. If you can't tell if your AI is objective or compromised, you might have to go back to manual work.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/98562b53-734d-4caa-abc1-70b118dc458e/licensed-image.jpeg</image:loc>
      <image:title>Insights - The Invisible Threat: When AI Starts Lying to You - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-browser-is-the-new-operating-system-and-the-new-target</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7aeac9ce-d141-4e5c-bb22-a70b3f181f31/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - The Browser is the New Operating System (and the New Target) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/legal-alert-the-rise-of-death-by-ai-liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/dcf92600-1d15-44d6-8d9f-a8d520835df1/halloween-party-decorations-skeleton-on-dark-green-2025-03-24-04-22-08-utc.jpg</image:loc>
      <image:title>Insights - Legal Alert: The Rise of "Death by AI" Liability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/agentic-ai-the-new-battlefield-for-the-soc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/958a8298-8116-4d2e-90b8-86cd39b190cb/hand-touching-hand-showing-connection-between-futu-2025-03-09-06-32-21-utc.jpg</image:loc>
      <image:title>Insights - Agentic AI: The New Battlefield for the SOC</image:title>
      <image:caption>Key Takeaways: The Shift: 2026 marks the transition from "Copilots" (human-assisted AI) to "Agentic AI" (fully autonomous systems). The Threat: Autonomous agents introduce "Shadow Agent" risks and machine-speed attacks that human analysts cannot outpace. The Defense: Security Operations Centers (SOCs) must adopt an "Agentic" model, using AI to fight AI, and treat agents as non-human identities.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/seeing-is-no-longer-believing-the-identity-crisis-of-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/01695565-927b-4efd-a977-64ce525196a0/AKATI+Sekurity+Cyber+Security+MSSP</image:loc>
      <image:title>Insights - "Seeing is No Longer Believing": The Identity Crisis of 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-5-billion-budget-line-preparing-for-ai-governance-publishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5e534130-b566-4035-9895-b71c66ebd47a/AKATI+Sekurity+AI+Governance</image:loc>
      <image:title>Insights - The $5 Billion Budget Line: Preparing for AI Governance Publishing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/ai-jailbreaks-how-attackers-are-unshackling-llms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a6d51c32-2df3-4b68-88fb-0136e557ce70/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - AI Jailbreaks: How Attackers Are "Unshackling" LLMs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/iot-amp-ot-the-attack-surface-you-cant-see</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/fade287f-cbed-4d9a-a0cc-918b13f9ecf1/AKATI+Sekurity+OT+Security</image:loc>
      <image:title>Insights - IoT &amp;amp; OT: The Attack Surface You Can't See - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-enemy-within-when-ai-agents-go-rogue</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5afd115e-b117-4de3-8e7f-8bb92e3af193/AKATI+Sekurity+AI+Security</image:loc>
      <image:title>Insights - The Enemy Within: When AI Agents Go Rogue - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cloud-at-risk-zero-days-in-the-hypervisor-publishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3410c380-b4b8-4294-9545-685ac07693d6/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - Cloud at Risk: Zero-Days in the Hypervisor Publishing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-single-point-of-failure-why-your-vendor-is-your-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c3e44bc8-8e40-4fca-baeb-100a7e7864ca/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - The Single Point of Failure: Why Your Vendor is Your Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/ransomware-20-the-rise-of-the-corporate-cybercriminal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/0b53ec9c-5017-4ee8-9447-d4b816fe9e0d/AKATI+Sekurity+DFIR+Service</image:loc>
      <image:title>Insights - Ransomware 2.0: The Rise of the "Corporate" Cybercriminal - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-442-surge-how-ai-supercharged-vishing-in-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/fb4db16b-750b-4079-ab73-f05f2d4cdb3f/selective-focus-of-cheerful-women-talking-on-smart-2024-11-15-09-52-14-utc.jpg</image:loc>
      <image:title>Insights - The 442% Surge: How AI Supercharged Vishing in 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-51-second-breakout-why-speed-is-now-your-biggest-enemy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c0395ad9-f4c7-44be-baa7-1a6dc376d3f2/AKATI+Sekurity+Cyber+Security+Company</image:loc>
      <image:title>Insights - The 51-Second Breakout: Why Speed is Now Your Biggest Enemy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/managing-the-invisible-perimeter-of-vendor-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e221c23a-af48-4abf-9039-f8ced681c54a/concept-of-teamwork-people-and-icons-2025-10-16-16-48-07-utc.jpg</image:loc>
      <image:title>Insights - Your security is only as strong as your weakest vendor. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cloud-security-myths-the-2025-reality-check</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/408b8cb8-6b92-4736-9802-a056bf78e59e/AKATI+Sekurity+Cloud+Security</image:loc>
      <image:title>Insights - Cloud Security Myths: The 2025 Reality Check - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-ransomware-economy-why-paying-never-ends-well</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/864e71a9-388d-4f1d-b2da-85cf596167a6/man-reviewing-security-documents-in-scam-call-cent-2025-11-24-08-26-24-utc.jpg</image:loc>
      <image:title>Insights - The Ransomware Economy: Why Paying Never Ends Well - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/deepfake-fraud-2025-the-executive-defense-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/43f56d82-b2b1-446c-8b00-860b6b24ce6c/AKATI+SEKURITY+CYBERSECURITY+COMPANY</image:loc>
      <image:title>Insights - Deepfake Fraud 2025: The Executive Defense Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/stop-measuring-activity-measure-actual-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/8150c50a-acf6-492f-a469-17976f6411cd/13.+AKATI+Sekurity+Security+Metrics+and+KPI.jpg</image:loc>
      <image:title>Insights - Stop Measuring Activity Measure Actual Security. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tame-your-security-alert-chaos-instantly</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/69e31dfc-1e54-43b8-ba54-c35f67e8be6d/12.+AKATI+Sekurity+Security+Alerts+Burn+Out.jpg</image:loc>
      <image:title>Insights - Tame Your Security Alert Chaos Instantly - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-encrypted-secrets-have-an-expiration-date-and-its-closer-than-you-think</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/02485b25-7fba-462b-b138-a9d88227c0b2/11.+AKATI+Sekurity+Ecryption+has+an+expiration.jpg</image:loc>
      <image:title>Insights - Your Encryption Expires When Quantum Arrives. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/uncover-hidden-breaches-before-your-mampa-deal-closes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c9f2b43c-2ecd-407f-88ee-b06a019be00d/10.+AKATI+Sekurity+-+Cybersecurity+Due+Diligence.jpg</image:loc>
      <image:title>Insights - Uncover Hidden Breaches Before Your M&amp;amp;A Deal Closes. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/they-hacked-your-supplier-to-own-your-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/4d0de03b-5ac8-47ae-bfd3-9fc2f983eee2/9.+AKATI+Sekurity+-+Supply+chain+attack.jpg</image:loc>
      <image:title>Insights - They Hacked Your Supplier To Own Your Network. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-legacy-systems-create-invisible-business-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/57d72ba7-bba9-4e83-9a9f-99e1c2f57a99/8.+AKATI+Sekurity+-+Legacy+System.jpg</image:loc>
      <image:title>Insights - Your Legacy Systems Create Invisible Business Risks. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/demand-built-in-safety-from-your-software-vendors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/20262544-6b40-4cfc-8a9a-4127bb95b905/7.+AKATI+Sekurity+-+Security+by+Default.jpg</image:loc>
      <image:title>Insights - Demand Built In Safety From Your Software Vendors. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/uncover-attack-paths-through-strategic-paranoia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a483eec8-43a7-4bd6-9a3f-3212ba51b123/6.+AKATI+Sekurity+-+Threat+Modelling.jpg</image:loc>
      <image:title>Insights - Uncover Attack Paths Through Strategic Paranoia. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/ship-faster-ship-safer-how-devsecops-ends-the-software-launch-logjam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/0644cec2-ac0a-46ae-81f1-b214e27f4092/5.+AKATI+Sekurity+-+DevSecOps.jpg</image:loc>
      <image:title>Insights - Ship Faster, Ship Safer: How DevSecOps Ends the Software Launch Logjam - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/akati-sekurity-receives-brandlaureate-award-2025-for-trusted-cybersecurity-excellence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d87856b5-8890-44a0-b261-8cddb2affe9a/AKATI+Sekurity+Malaysia+Brandlaureate</image:loc>
      <image:title>Insights - AKATI Sekurity Receives BrandLaureate Award 2025 for Trusted Cybersecurity Excellence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/012d3434-8d4a-4272-b588-2d9a9accc5b2/AKATI+Sekurity+Malaysia+Brandlaureate</image:loc>
      <image:title>Insights - AKATI Sekurity Receives BrandLaureate Award 2025 for Trusted Cybersecurity Excellence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/smart-factories-hidden-dangers-6-steps-to-secure-ot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/19fcc907-1fc4-4ae6-9a86-becff927e628/AKATI+SEKURITY+-+6+STEPS+TO+SECURE+OT</image:loc>
      <image:title>Insights - Smart Factories, Hidden Dangers: 6 Steps to Secure OT - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-your-cyber-insurance-claim-will-be-denied</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/877310de-0ff5-4c9b-99f9-d96535eaee6d/Why+Your+Cyber+Insurance+Claim+Will+Be+Denied.</image:loc>
      <image:title>Insights - Why Your Cyber Insurance Claim Will Be Denied. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/6-steps-to-fix-your-api-security-blindspot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/58e688e1-eca3-43ed-b25b-f4532b650e89/6+Steps+to+Fix+Your+API+Security+Blindspot</image:loc>
      <image:title>Insights - 6 Steps to Fix Your API Security Blindspot - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-to-keep-your-zero-trust-promise-and-save-your-board-22m-in-breach-costs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5774490b-e9af-4db5-91f8-75619e09d57f/How+to+Keep+Your+Zero+Trust+Promise+and+Save+Your+Board+%242.2M+in+Breach+Costs.</image:loc>
      <image:title>Insights - How to Keep Your Zero Trust Promise and Save Your Board $2.2M in Breach Costs. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/7-steps-to-answering-the-toughest-question-in-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1d6578d7-dc86-4df0-8477-d5a669048e6a/AKATI+Sekurity+Compromise+Assessment+Service.jpg</image:loc>
      <image:title>Insights - 7 Steps to Answering the Toughest Question in Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-ddos-defense-plan-is-probably-a-myth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1e4375f7-e744-41f1-929b-505f735498a6/AKATI+Sekurity+DDoS+Attack+Simulation.jpg</image:loc>
      <image:title>Insights - Your DDoS Defense Plan Is Probably a Myth. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/stop-guessing-if-your-security-works</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/cd359542-b530-4fb8-935f-f26a91bd8a25/AKATI+Sekurity+Breach+%26+Attack+Simulation.jpg</image:loc>
      <image:title>Insights - Stop Guessing If Your Security Works. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/managing-the-sobering-reality-of-cloud-security-misconfigurations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d885c9c5-62d1-477c-919b-fb23a5189556/AKATI+Sekurity+Cloud+Security+Service.jpg</image:loc>
      <image:title>Insights - Managing the Sobering Reality of Cloud Security Misconfigurations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-your-security-strategy-must-start-with-zero-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/681ec0fc-113e-4d54-91b9-267b3c8f7a25/AKATI+Sekurity+Zero+Trust.jpg</image:loc>
      <image:title>Insights - Why Your Security Strategy Must Start with Zero Trust - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/separating-ctem-myth-from-reality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ac021069-cf42-4d4d-9b63-d5d6e815a830/AKATI+Sekurity+CTEM+Service.jpg</image:loc>
      <image:title>Insights - Separating CTEM Myth from Reality - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/5-pillars-of-a-modern-application-security-strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/fb9a39e4-53de-41e6-bbe0-c6eac0f29498/AKATI+Sekurity+Application+Security+Assessment.jpg</image:loc>
      <image:title>Insights - 5 Pillars of a Modern Application Security Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/5-critical-questions-a-red-team-exercise-answers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/177c006e-4023-45d6-ab2c-19086e7473cb/AKATI+Sekurity+Red+Team+Service.png</image:loc>
      <image:title>Insights - 5 Critical Questions a Red Team Exercise Answers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-your-next-pen-test-needs-to-mimic-a-real-world-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/50d0a304-d229-43d1-abc3-6877ab7e01b2/AKATI+Sekurity+Penetration+Test+Malaysia.jpg</image:loc>
      <image:title>Insights - Why Your Next Pen Test Needs to Mimic a Real-World Attack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-biggest-security-risk-is-your-unknown-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/71870652-d9bb-461a-8e80-b86a18aeed63/AKATI+Sekurity+Attack+Surface+Management+ASM.jpg</image:loc>
      <image:title>Insights - Your Biggest Security Risk Is Your Unknown Attack Surface - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/5-ways-your-brand-is-actively-being-exploited-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/dea5cfea-bcd5-44c2-81c5-4a6935ad9915/AKATI+Sekurity+Brand+Protection.jpg</image:loc>
      <image:title>Insights - 5 Ways Your Brand Is Actively Being Exploited Online - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/making-smarter-security-decisions-with-cyber-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/11401962-d1e9-46d6-b671-d1ce5b6996b2/AKATI+Sekurity+MSSP+Threat+Intelligence.JPG</image:loc>
      <image:title>Insights - Making Smarter Security Decisions with Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/xdr-unifies-your-security-to-stop-threats-faster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/24f9c793-c726-4e76-a003-8d03ea9b38bb/AKATI+Sekurity+MSSP+Malaysia.jpg</image:loc>
      <image:title>Insights - XDR Unifies Your Security to Stop Threats Faster - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-mdr-actively-protects-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d58f1224-9b38-41b9-a47c-794ca44e19b9/MDR+Service+Provider+Malaysia</image:loc>
      <image:title>Insights - How MDR Actively Protects Your Business - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-business-operates-24-7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a3e85a43-6141-4407-89d2-6e7556e2d475/SOC+Monitoring+Service+Malaysia</image:loc>
      <image:title>Insights - Your Business Operates 24/7. Is Your Cybersecurity Keeping Up? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-preemptive-cybersecurity-is-the-future-of-the-soc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/70ebcb4c-1638-4c59-9dcc-95a2b667bc89/Cybersecurity+Company+AKATI+Sekurity</image:loc>
      <image:title>Insights - Why Preemptive Cybersecurity Is the Future of the SOC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-to-integrate-ai-risk-into-your-existing-cybersecurity-programme</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/690d482b-ffb2-4528-bdb1-964ed6bfe30d/intense-competition-boy-vs-robot-chess-match-2025-01-07-18-18-45-utc.jpg</image:loc>
      <image:title>Insights - How to Integrate AI Risk into Your Existing Cybersecurity Programme - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/f2qz6va3ts295pf3oo0jjkyblzia57</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/df01f86d-1b0e-47f9-a762-fd70eb8f8b22/AKATI+Sekurity+Cybersecurity+Company+New+York</image:loc>
      <image:title>Insights - The SOC Analyst Burnout Crisis: Why Your Best Cyber Defenders Are Quietly Quitting (And How Smart Leaders Stop It) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/beyond-geek-speak-how-to-talk-cybersecurity-with-your-board-so-they-actually-listen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d7057e7c-5c65-41f5-a126-933223e9988b/Cybersecurity+MSSP+Malaysia</image:loc>
      <image:title>Insights - Beyond Geek Speak: How to Talk Cybersecurity with Your Board (So They Actually Listen) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-cisos-dilemma-when-cybersecurity-becomes-personal-liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/68afbb3e-4b3c-4010-925a-6d1bf1b1c7ef/AKATI+Sekurity+MSSP+USA</image:loc>
      <image:title>Insights - The CISO's Dilemma: When Cybersecurity Becomes Personal Liability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-boardroom-checklist-for-securities-commissions-technology-risk-management-sc-trm-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f612f23a-5516-452e-b20f-b57868668694/SC+TRM+MALAYSIA</image:loc>
      <image:title>Insights - The Boardroom Checklist for SC’s Guideline on Technology Risk Management Compliance - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cybersecurity-act-is-your-critical-infrastructure-compliant-with-the-247-monitoring-mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/19583cbe-a050-4e2b-8d40-f319c3926ab3/Cybersecurity+Act+2024+Malaysia</image:loc>
      <image:title>Insights - Cybersecurity Act : Is Your Critical Infrastructure Compliant with the 24/7 Monitoring Mandate? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-pentest-checks-the-locks-a-red-team-simulates-the-entire-burglary</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c7ceca6f-0871-46cf-be1e-a937791f33ef/AASE+Service+Malaysia</image:loc>
      <image:title>Insights - Your Pentest Checks the Locks. A Red Team Simulates the Entire Burglary. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-true-cost-of-a-failed-pci-asv-scan-its-more-than-you-think</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f6de0a4f-5cbf-4cac-a21a-4a6f99be784b/PCI+ASV+Malaysia</image:loc>
      <image:title>Insights - The True Cost of a Failed PCI ASV Scan (It's More Than You Think) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-clean-bill-of-health-illusion-why-your-annual-pentest-creates-a-false-sense-of-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/8a097367-a74c-4d9c-b62d-0449a6a69bb5/Pentest+Company+Malaysia</image:loc>
      <image:title>Insights - The "Clean Bill of Health" Illusion: Why Your Annual Pentest Creates a False Sense of Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/a-directors-guide-to-bnm-rmit-your-governance-responsibilities-explained</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/4904d97a-3f19-4fe7-b0da-033337868b8e/BNM+RMiT+Malaysia</image:loc>
      <image:title>Insights - A Director's Guide to BNM RMiT: Your Governance Responsibilities Explained - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/after-the-breach-a-bank-leaders-guide-to-a-compliant-investigation-under-bnm-rmit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/573df886-276f-4ece-bf86-8429b5e2115c/DFIR+Retainer+Service+in+Malaysia</image:loc>
      <image:title>Insights - After the Breach: A Bank Leader's Guide to Compliant Investigation in Southeast Asia - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-leaders-guide-to-meeting-bnm-rmits-247-monitoring-mandate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/72e58e5c-2447-45e0-ad44-0c27def175be/MSSP+SOC+in+Malaysia</image:loc>
      <image:title>Insights - BNM RMiT Compliance 2025: The Executive's Guide to 24/7 Security Monitoring</image:title>
      <image:caption>For financial institutions in Malaysia, Bank Negara Malaysia's (BNM) Risk Management in Technology (RMiT) policy framework is a defining regulatory pillar.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-5-stages-of-a-modern-ransomware-kill-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/fe4b8341-0bcc-423c-b3ef-8226d8a43579/MSSP+Company+in+New+York</image:loc>
      <image:title>Insights - Ransomware Kill Chain 2025: How Attackers Progress from Phishing to Encryption</image:title>
      <image:caption>A network-wide ransomware encryption is the final, catastrophic act of a much longer and quieter invasion. For business leaders, understanding that these attacks are not a single event but a methodical, multi-stage process is the first step toward building an effective defense.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/anatomy-of-a-ransomware-attack-from-a-single-click-to-a-network-wide-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a441857b-1970-453e-b203-5937cba69407/Digital+Forensic+Service+in+New+York</image:loc>
      <image:title>Insights - Anatomy of a Ransomware Attack: How One Click Cost Change Healthcare $2.4 Billion - Executive Summary: The Real Cost of "Just One Click"</image:title>
      <image:caption>68% of ransomware attacks begin with a single phishing email Average time from click to encryption: Less than 24 hours Change Healthcare case study: 190 million records stolen, $2.4B in damages Three forensic stages reveal how attackers escalate from inbox to infrastructure Bottom line: Every click matters—and every forensic detail prevents the next attack</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/beyond-the-firewall-how-to-set-a-digital-tripwire-for-ransomware-attackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e556b88c-3bc6-4119-a921-a5569e5fbbe9/MSSP+in+New+York</image:loc>
      <image:title>Insights - Beyond the Firewall: How to Set a Digital Tripwire for Ransomware Attackers</image:title>
      <image:caption>When business leaders think of a ransomware attack, they often picture the final, dramatic moment: the locked screens, the encrypted files, and the ransom demand. But a successful attack does not begin with encryption. It begins with a single, quiet, and often preventable event known as "Initial Access."</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/ransomware-has-evolved-your-defense-must-too</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b235d5b7-55da-44b7-8353-89db317ad200/MSSP+in+Malaysia</image:loc>
      <image:title>Insights - They Don't Just Encrypt Your Data Anymore. They Steal It. The New Rules of Ransomware Defense. - The word "ransomware" often brings to mind a locked computer screen and a demand for cryptocurrency.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-a-modern-mssp-is-key-to-building-a-proactive-secops-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7abb490f-ce2b-40b9-b7a5-6859a2a0a1a8/MSSP+in+Malaysia</image:loc>
      <image:title>Insights - You Know Your Flaws. You See the Alerts. So Why Do Attacks Still Get Through? - For years, security operations have been divided into two distinct, often siloed, functions.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cloud-incident-response-your-playbook-is-obsolete</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b40b55e2-f04b-4d60-a74b-a6a3c836c1fb/MSSP+in+Malaysia</image:loc>
      <image:title>Insights - You Don't Control Your Cloud. Does Your Incident Response Plan Acknowledge That? - For years, organizations have meticulously crafted incident response (IR) playbooks. When an incident occurred in the data center, the steps were clear: isolate the server, preserve the disk image, analyze the logs. This on-premise model gave security teams a sense of control. In the cloud, that control is an illusion, and your old playbook is obsolete.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-an-mssp-delivers-security-metrics-that-demonstrate-true-business-value</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/fd3d3937-1533-4d6e-af41-5c4c286c445d/MSSP+in+Malaysia</image:loc>
      <image:title>Insights - Is Your MSSP a Partner or Just a Noise Machine? The Metrics That Reveal the Truth.</image:title>
      <image:caption>For years, corporate leaders have been presented with cybersecurity reports filled with impressive but ultimately hollow figures: millions of threats blocked, terabytes of data scanned, thousands of alerts processed.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-to-secure-your-cybersecurity-budget-amp-drive-business-value</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/8b0a70d5-51d5-4260-a68e-b50dda2e8ee9/Cybersecurity+Company+Malaysia</image:loc>
      <image:title>Insights - Your Cybersecurity Budget is About to Be Cut. Here’s the 3-Step Plan to Save It.</image:title>
      <image:caption>In any period of economic uncertainty, every line item in a budget comes under scrutiny. For decades, cybersecurity has been categorized as a "cost center," an expensive but necessary insurance policy. This perception makes its budget uniquely vulnerable to cuts when leadership is forced to tighten spending.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-digital-forensics-investigates-business-email-compromise-bec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7e1000e7-4a87-4527-9b0a-5898dba46e91/Business+Email+Compromise</image:loc>
      <image:title>Insights - You Just Paid a Fake Invoice. What Happens Next?</image:title>
      <image:caption>The payment has been sent. Days later, your supplier calls asking where their money is. A feeling of dread sets in as you realize the invoice you paid was a sophisticated fake, and the money, your money, is gone.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-cisos-secret-converting-security-capex-to-predictable-opex-with-an-mssp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/403fa454-30b9-484d-86d5-68709588ca44/MSSP+USA+AKATI+Sekurity</image:loc>
      <image:title>Insights - Is Your Security Tech Becoming a Financial Anchor? How to Cut the Cord with OpEx</image:title>
      <image:caption>For any CFO or CEO, budget predictability is paramount. Yet, cybersecurity spending has traditionally been a volatile mix of massive, upfront capital expenditures followed by unpredictable operational costs.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/a-leaders-guide-to-modern-identity-amp-access-management-iam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/071aed44-5320-4799-a05e-014185c08e7b/Cybersecurity+companies+in+Malaysia+AKATI+Sekurity</image:loc>
      <image:title>Insights - IAM "Projects" Are Dead: Why a Product Mindset is Key to Your Security</image:title>
      <image:caption>In your business right now, who has access to what? The question seems simple, but the answer is dangerously complex.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/5-signs-your-online-account-has-been-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/50b090c4-3317-414d-a70e-473b563c7764/MSSP+Malaysia+AKATI+Sekurity</image:loc>
      <image:title>Insights - Account Compromised? Your First 60 Minutes are Critical. Here's the Emergency Action Plan.</image:title>
      <image:caption>It’s a feeling of digital dread. A strange email notification appears. You try to log into an account, and your password suddenly doesn’t work. The unsettling question creeps in: "Have I been hacked?"</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-an-mssp-monitors-for-credential-abuse-247</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b0bf2148-e43a-429e-af9c-0adebc9a6bd0/MSSP+Malaysia</image:loc>
      <image:title>Insights - They Have a Valid Password. How We Catch the Ghost in Your Machine.</image:title>
      <image:caption>The biggest threat to your business isn't a brute-force attack designed to break down your digital door. It’s an attacker who obtains a legitimate key, walks in quietly, and pretends to be one of your trusted employees.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-human-firewall-your-last-line-of-defence-or-your-biggest-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d8114615-a7de-4445-8ab8-e6a62c96a318/MSSP+Malaysia</image:loc>
      <image:title>Insights - The Human Firewall: Your Last Line of Defence, or Your Biggest Vulnerability? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-real-cost-of-a-247-security-operations-center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/eaa20a03-7fc2-46c7-a29d-e19d7b3cac88/MSSP+Malaysia</image:loc>
      <image:title>Insights - The Real Cost of a 24/7 Security Operations Center</image:title>
      <image:caption>The true cost of building an effective, in-house, 24/7 Security Operations Center (SOC) is hidden in massive operational expenses, complex payroll, and hidden costs that most budgets fail to account for.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-security-blind-spot-that-can-shut-down-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/4474acbb-ba20-4194-884a-55b6b74c5bfc/Cybersecurity+companies+in+Malaysia</image:loc>
      <image:title>Insights - The Security Blind Spot That Can Shut Down Your Business</image:title>
      <image:caption>Let's have a frank conversation. In boardrooms across Malaysia, leaders believe they have cybersecurity under control. But they're often answering the wrong question.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cyber-threats-explained-how-malware-attacks-windows-linux-and-android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/dbf3b46c-059d-4f9c-9e70-36bcabed8582/Cybersecurity+Company+in+United+States</image:loc>
      <image:title>Insights - Cyber Threats Explained: How Malware Attacks Windows, Linux, and Android</image:title>
      <image:caption>Think of a hacker like a burglar. A skilled burglar doesn't use the same tools for every house. They study the building's design—its windows, doors, and alarm systems—and choose their tools accordingly.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/incident-response-vs-digital-forensics-a-technical-breakdown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/22da79ca-59ae-4aa0-b6ce-c0324a60188e/Digital+Forensic+Service</image:loc>
      <image:title>Insights - Incident Response vs. Digital Forensics: A Technical Breakdown</image:title>
      <image:caption>Understand how to properly manage a security breach by learning the roles of Incident Response vs. Digital Forensics. This guide explains how AKATI Sekurity's integrated approach delivers both speed to contain and depth to investigate.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/a-leaders-guide-to-the-scs-technology-risk-management-trm-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d39538f6-2c8f-4435-8152-a610441f5268/SC+Malaysia+Technology+Risk+Management</image:loc>
      <image:title>Insights - A Leader's Guide to the SC's Technology Risk Management (TRM) Framework</image:title>
      <image:caption>Understand your board's key responsibilities under the latest SC Technology Risk Management (TRM) framework. AKATI Sekurity explains your duties and how an independent review helps you achieve full compliance and strategic advantage.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/beyond-the-checklist-the-real-value-of-in-depth-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7517ebdf-9d24-4410-acfc-fee1a5cfdec6/Pentest+Malaysia</image:loc>
      <image:title>Insights - Beyond the Checklist: The Real Value of In-Depth Penetration Testing</image:title>
      <image:caption>Go beyond automated tools to protect your company's assets and reputation. This article explains how the AKATI Sekurity Pentest Service uses an in-depth, manual approach to find critical vulnerabilities that scanners miss.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/mssp-service-why-your-security-shouldnt-just-be-a-burglar-alarm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e957f395-4174-4e82-877e-e9602383a94c/MSSP+Malaysia</image:loc>
      <image:title>Insights - MSSP Service: Why Your Security Shouldn't Just Be a Burglar Alarm</image:title>
      <image:caption>Your security provider shouldn't just be a burglar alarm that announces failure. Read this to understand the crucial difference between a reactive alert system and a proactive intelligence partner who provides the clarity you need to make strategic decisions.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/secure-your-digital-future-akati-sekuritys-brand-protection-and-darkweb-monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ac47b492-8217-4bfd-a547-94b44906a3d8/Brand+Protection+Malaysia</image:loc>
      <image:title>Insights - Secure Your Digital Future: AKATI Sekurity’s Brand Protection and Darkweb Monitoring - Protecting Your Company’s Reputation and Trust in the Online World</image:title>
      <image:caption>Why Read This Report? This report reveals the serious, often hidden online threats that can rapidly damage your company's reputation and financial health. Discover how AKATI Sekurity’s advanced Brand Protection and Darkweb Monitoring proactively neutralizes these dangers using sophisticated methods and expert analysis. Equip your leadership with the crucial insights needed to strategically safeguard your valuable reputation, data, and customer trust.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-akati-sekurity-transforms-vapt-into-strategic-assets-for-cisos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/bf315292-39cd-45b9-a1da-d29dacb9b5a0/Pentest+Companies+in+Malaysia</image:loc>
      <image:title>Insights - How AKATI Sekurity Transforms VAPT into Strategic Assets for CISOs - Key Takeaways for CISOs</image:title>
      <image:caption>Learn how AKATI Sekurity turns VAPT from a checklist into a strategic asset for CISOs. See how clear reporting and expert remediation drive real risk reduction. Discover tangible benefits like faster fixes, smarter investments, and stronger board confidence.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-akati-sekuritys-mssp-delivers-real-time-threat-suppression</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d149b624-a705-4d26-95e0-3f0af9615963/MSSP+Provider+in+Malaysia</image:loc>
      <image:title>Insights - How AKATI Sekurity’s MSSP Delivers Real-Time Threat Suppression</image:title>
      <image:caption>The reality today is simple. Cyber threats don’t wait for office hours. For businesses in Malaysia and across Asia, digital risks have become part of daily operations and not rare events. But while the threats are constant, the response doesn’t have to be chaotic.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/your-first-30-minutes-in-a-cyber-incident</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/846ba65c-1a78-4961-a523-d00c7bc76b04/AKATI+Sekurity+Cybersecurity+Companies+in+Malaysia</image:loc>
      <image:title>Insights - Your First 30 Minutes in a Cyber Incident - It’s often a normal Friday afternoon. Then, a call comes through. Someone from the Finance team sounds worried. "I think I clicked on a bad link," they might say. "My computer screen is stuck."</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/understanding-the-difference-between-computer-forensics-investigations-and-compromise-assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/864d1cc8-f050-47ea-9197-95ca2d797136/Cybersecurity+Companies+In+Malaysia</image:loc>
      <image:title>Insights - Understanding the Difference Between Computer Forensics Investigations and Compromise Assessments - When a breach hits the headlines, regulators don’t ask if your systems were attacked — they ask how you responded. The difference between a defensible action and a compliance failure often comes down to choosing the right investigative method.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/what-every-board-should-do-in-the-first-24-hours-of-a-cyberattack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/9ad5b762-f970-4ec1-92c1-944ce48c1e3f/afraid-woman-panicking-trying-save-data-center-from-unauthorized-access.jpg</image:loc>
      <image:title>Insights - What Every Board Should Do in the First 24 Hours of a Cyberattack - Why You Should Read This Article:</image:title>
      <image:caption>Because when ransomware hits, the board doesn’t have time to Google what to do. This guide gives you a step-by-step leadership response—clear, practical, and pressure-tested. It’s written for decision-makers who need clarity, not complexity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-you-should-never-save-your-passwords-in-the-notes-app</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/883c15e5-5235-499f-b7ac-3f5ea3ac9875/Cybersecurity+Companies+Malaysia</image:loc>
      <image:title>Insights - Why You Should Never Save Your Passwords in the Notes App - And what you can do instead—even if you’re not tech-savvy.</image:title>
      <image:caption>Every week, we help regular folks—not IT experts—stay a little safer online. If you’re someone who uses your phone to pay bills, check emails, or shop online, this one’s for you.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/understanding-pci-dss-asv-external-scans-a-guide-for-merchants</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/9fc3f6a1-0190-498e-9b06-87b728d94d7f/AKATI+Sekurity+Malaysia+PCI+DSS+ASV</image:loc>
      <image:title>Insights - Understanding PCI DSS ASV External Scans: A Guide for Merchants - For businesses that accept credit and debit cards, the seemingly simple act of a customer swiping, tapping, or entering their card details triggers a complex chain of events — all underpinned by a critical, globally recognized security framework.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-new-face-of-pdpa-compliance-why-a-data-protection-officer-is-now-non-negotiable</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/98494f09-c99d-43c3-b5f5-1ca3e123c620/Cybersecurity+Companies+Malaysia</image:loc>
      <image:title>Insights - Why Appointing a Data Protection Officer Is No Longer Optional - Come 1 June 2025, the game changes for every business handling personal data in Malaysia. What was once a compliance checkbox is now law: appointing a Data Protection Officer (DPO) is officially mandatory under the newly passed Personal Data Protection (Amendment) Act 2024 (Act A1727).</image:title>
      <image:caption>If you're on the board of a Malaysian company, this isn't just another IT update. This is about trust, transparency, and ticking time bombs — because ignoring the DPO requirement could cost your organisation up to RM1 million, not to mention reputational damage that no insurance can fix.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/mobile-safety-tips-for-seniors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/824db79f-2a89-46d7-ac23-29c65749b696/Top+Cybersecurity+Company%2C+AKATI+Sekurity</image:loc>
      <image:title>Insights - Mobile Safety Tips for Seniors - Because most scams today start with a phone in your hand.</image:title>
      <image:caption>If you're over 60, chances are your mobile phone is now your main gateway to the world. You use it to read the news, check your bank balance, order groceries, and chat with family on WhatsApp or FaceTime. But cybercriminals know that, too.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/you-cant-protect-a-247-business-with-a-9-to-5-security-team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6a20e955-7a91-48c0-aa3c-92e3e5d70898/MSSP+in+the+USA+-+AKATI+Sekurity</image:loc>
      <image:title>Insights - You Can’t Protect a 24/7 Business with a 9-to-5 Security Team - Why AKATI Sekurity Is One of the Top MSSP Companies — and What That Means for Modern Enterprises</image:title>
      <image:caption>In today's digital economy, the workday doesn’t end at 5 p.m. Neither do cyberattacks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6587ba56-fff5-4790-a4de-8cb7ffa8a1fc/MSSP+in+the+USA%2C+AKATI+Sekurity</image:loc>
      <image:title>Insights - You Can’t Protect a 24/7 Business with a 9-to-5 Security Team - Built for Boardrooms, Trusted by SOC Teams</image:title>
      <image:caption>As regulatory expectations rise and cyber insurance becomes harder to obtain, Boards of Directors are asking sharper questions about visibility, readiness, and response time. AKATI Sekurity provides not only the technology, but also the reporting, governance, and strategic insights to help leadership understand their actual risk posture — not just the IT summary. This dual capability — operational depth with executive clarity — is what sets top MSSPs apart from generic monitoring vendors.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-governance-upgrade-what-nist-csf-20-means-for-your-cyber-oversight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/693f96f9-9d02-44f4-8b7c-134b0bb33746/MSSP+in+USA+-+AKATI+Sekurity</image:loc>
      <image:title>Insights - The Governance Upgrade: What NIST CSF 2.0 Means for Your Cyber Oversight</image:title>
      <image:caption>In boardrooms around the world, one word is surfacing with increasing urgency: governance. Not just as a guiding principle, but as a core function of cybersecurity. And for directors charged with risk oversight, regulatory compliance, and safeguarding shareholder value, the arrival of NIST Cybersecurity Framework (CSF) 2.0 changes the calculus entirely.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/how-to-spot-a-scam-text-even-if-it-looks-like-its-from-your-bank</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d0fcd8fb-9e4b-4eff-9729-bba5ebc87521/MSSP+in+the+USA%2C+AKATI+Sekurity</image:loc>
      <image:title>Insights - How to Spot a Scam Text — Even If It Looks Like It’s From Your Bank</image:title>
      <image:caption>You’re standing in line at the grocery store when your phone buzzes. “Chase: We’ve detected suspicious activity. Tap here to confirm your identity.” The sender looks familiar. It’s in the same thread where you’ve received real alerts before—about deposits, payments, or your monthly statement. But this message? It’s not real. It’s a scam—and it could cost you more than just your account login.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c30b4ef4-889b-4545-8191-55655c917937/Managed+Security+Service+in+the+US</image:loc>
      <image:title>Insights - How to Spot a Scam Text — Even If It Looks Like It’s From Your Bank - What you should do instead</image:title>
      <image:caption>If you receive a suspicious text—even if it appears in a familiar message thread—take these steps: Don’t click the link. Ever. Don’t respond to the text. Even a “STOP” can confirm your number is active. Use your bank’s official mobile app or call the number on the back of your card to check your account status. Report the message by forwarding it to 7726 (SPAM) — a service supported by all major U.S. carriers.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-every-company-needs-to-rethink-its-external-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1865a747-c6c3-4d11-91ab-e58bbf690b0e/External+Attack+Surface+Management+Service+-+AKATI+Sekurity</image:loc>
      <image:title>Insights - Why Every Company Needs to Rethink Its External Exposure - AKATI Sekurity’s EASM service helps organizations discover what they didn’t know they exposed.</image:title>
      <image:caption>The Risk That Lives Beyond the Perimeter The internet never forgets what you publish — even when you do. As organizations rapidly scale their infrastructure to accommodate hybrid work, cloud-first strategies, and API integrations, their digital footprints expand in ways that few truly track. What begins as a convenience often becomes a liability.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/when-ai-joins-the-attack-surface-executive-strategies-for-risk-mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d63c98f9-dfb1-4c3a-b109-233e58784949/AKATI+Sekurity%2C+MSSP+in+the+USA</image:loc>
      <image:title>Insights - When AI Joins the Attack Surface: Executive Strategies for Risk Mitigation</image:title>
      <image:caption>Artificial Intelligence has quietly but pervasively infiltrated enterprise operations — embedded in SaaS applications, used to automate processes, and increasingly trusted to assist with strategic decisions. Yet with this reliance comes risk, and much of it sits unmonitored. AI is no longer a backroom experiment. It is now part of your attack surface. And critically, it’s also part of your governance responsibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1c31ac9f-92bb-461d-b525-c51851d9d580/AKATI+Sekurity%2C+MSSP+in+the+USA</image:loc>
      <image:title>Insights - When AI Joins the Attack Surface: Executive Strategies for Risk Mitigation - A Governance Framework Built for AI</image:title>
      <image:caption>The future of AI governance lies in what is now being called AI TRiSM — Trust, Risk, and Security Management. This approach brings together: AI governance (ownership, policies, risk scoring) Runtime inspection (real-time anomaly detection, output monitoring) Information governance (data protection, lineage, permissions) Infrastructure protections (model sandboxing, prompt injection defenses) These layers together form a resilient architecture that ensures AI behaves in line with enterprise intent.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/third-party-first-problem-when-cybersecurity-depends-on-someone-elses-discipline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/df4789cd-e3a0-4ea4-973b-7ed5f03a1a06/Cybersecurity+company+in+the+US</image:loc>
      <image:title>Insights - Third-Party, First Problem — When Cybersecurity Depends on Someone Else’s Discipline - The first point of compromise isn’t inside your systems, it’s on the outside, just beyond your control, often within the network of vendors, partners, or service providers you’ve come to rely on.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/56cdac8f-f0ac-42ab-9545-eddb5fc8a4fd/Third+Party+Risk+Assessment+Service+Provider+in+USA</image:loc>
      <image:title>Insights - Third-Party, First Problem — When Cybersecurity Depends on Someone Else’s Discipline - Governance Questions for the Boardroom</image:title>
      <image:caption>Do we have an up-to-date inventory of vendors with system access or data privileges? Are third-party risk assessments based on current threat conditions — or just contractual obligations? Do our procurement policies mandate actual cybersecurity testing? Have we simulated an incident involving a vendor breach? If a key supplier suffers a ransomware attack, how quickly can we isolate, respond, and continue operations?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/you-dont-need-to-be-a-hacker-to-hack-someone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/64414535-6f6c-4831-9773-8321e8094bdf/freepik__a-white-persian-cat-with-heterochromia-eyes-wearin__34414.jpeg</image:loc>
      <image:title>Insights - You Don’t Need to Be a Hacker to Hack Someone - How Google, LinkedIn, and Your Digital Breadcrumbs Are Making You a Target</image:title>
      <image:caption>It only takes 15 minutes. With nothing more than a person’s full name and a basic internet connection, it’s now possible to uncover where someone lives, works, eats, shops — even details about their family. All without hacking a single system. That’s the reality we’re living in. At AKATI Sekurity, we’ve demonstrated how this can be done — not as a stunt, but to raise awareness. Using publicly available information from LinkedIn, Instagram, Google Maps, Facebook Marketplace, and even old PDF resumes floating on the web, it's possible to build a disturbingly complete picture of someone’s life. And you don’t need to be a hacker to do it.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b93cf843-f384-4b35-a9a6-4b25fd464f76/Top+Cybersecurity+Company+in+US.</image:loc>
      <image:title>Insights - You Don’t Need to Be a Hacker to Hack Someone - What You Can Do Today — And Why It Matters</image:title>
      <image:caption>You don’t have to delete your accounts or go off-grid. But you do need to be smart. Search Yourself : Look up your name, job title, phone number, and email. See what others can see. Update Your Privacy Settings : Set your Instagram to private. Hide your connections on LinkedIn. Review who can tag you on Facebook. Think Twice Before Posting : That travel photo may reveal you’re away from home. That invoice screenshot could leak sensitive info. That birthday post could hint at your security question answers. Talk About It : Awareness is protection. Share this article. Have this conversation with family, friends, and colleagues.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-perfect-heist-how-deepfakes-are-hijacking-corporate-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3e3bc2ee-4c34-4c48-87b0-072d539f510b/Top+MSSP+Companies+in+USA</image:loc>
      <image:title>Insights - Deepfakes Are Rewiring Corporate Fraud - Companies are learning that seeing is no longer believing.</image:title>
      <image:caption>When Your Most Senior Leaders Can't Be Trusted — Even On Camera The WhatsApp message arrived at 7:47 a.m. on a Wednesday morning, asking the CFO to process a priority transfer of US$985,000 for Singapore, payable to a Hong Kong account via JP Morgan. The sender appeared to be Alvin Lee, CEO of Maybank Singapore. The language was crisp, professional — and completely fake.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7df01949-6c6e-49bd-95b1-fe7c45ebde12/Top+MSSP+Providers+in+USA</image:loc>
      <image:title>Insights - Deepfakes Are Rewiring Corporate Fraud - The Corporate Survival Playbook</image:title>
      <image:caption>Forward-thinking organizations are beginning to recognize that defending systems alone is no longer enough. True resilience requires re-engineering human decision points. Some are adopting what’s known as the "Air Gap Rule," requiring critical financial instructions to be validated through offline, pre-established channels. At one European bank, executives now verify sensitive instructions using numbered Swiss-style challenge phrases, memorized and exchanged only in person. Others are turning to Behavioral Red Teaming: simulations that expose leadership teams to synthetic media attacks, measuring and improving their ability to recognize manipulation. Early adopters report a 40% improvement in leadership threat recognition. Meanwhile, companies like Goldman Sachs are institutionalizing a "culture of constructive disobedience," rewarding employees who delay or question suspicious high-value transactions. In some cases, they mandate a 24-hour cooling period for first-time vendor payments — even when the request appears to come from the CEO.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/securing-influence-why-todays-cisos-must-master-stakeholder-strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e9ae94d6-3879-4395-8f50-04d5d63c76de/Managed+Security+Service+Provider+in+USA</image:loc>
      <image:title>Insights - Securing Influence: Why Today's CISOs Must Master Stakeholder Strategy - Why Read This</image:title>
      <image:caption>CISOs today need more than technical expertise. This article offers: A clear strategy for navigating internal politics. A practical framework to map and manage stakeholders. Guidance on how to influence without formal authority. Messaging tactics that resonate with business leaders. A leadership lens for driving security beyond compliance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/00df83b1-c396-49bc-bb9c-ec64425c0555/Cybersecurity+Company+in+USA</image:loc>
      <image:title>Insights - Securing Influence: Why Today's CISOs Must Master Stakeholder Strategy - Turning Insight into Action</image:title>
      <image:caption>To translate this strategic shift into practical steps, CISOs should consider the following priorities: Develop a stakeholder influence map. Begin by identifying key business and technical stakeholders. Assess their interest in cybersecurity, their influence over internal decisions, and their willingness to engage with the security agenda. Initiate proactive engagement. Schedule regular, non-incident-based meetings with priority stakeholders. These conversations should be used to build trust, exchange context, and identify mutual opportunities for alignment. Tailor messaging to stakeholder concerns. Customize cybersecurity communication based on the stakeholder’s primary lens — financial risk, operational uptime, brand protection, or legal liability. Integrate security into business rhythms. Embed cybersecurity into planning cycles, product roadmaps, and business KPIs. Position security as a contributor to business success, not a constraint on it. Elevate soft skills as strategic assets. Strengthen executive presence, narrative framing, and cross-functional empathy. The ability to influence without authority is no longer optional — it is essential. Establish feedback loops. Make space for stakeholders to express expectations, constraints, and perspectives on cybersecurity decisions. Influence is sustained through mutual respect, not one-directional control.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-silent-theft-of-trust-when-cybercrime-wears-your-name</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b0ed6580-fbd0-4796-ad07-5a0ab07f335a/Dark-web+Monitoring+%26+Brand+Protection+Service+Provider</image:loc>
      <image:title>Insights - The Silent Theft of Trust: When Cybercrime Wears Your Name - There is something almost poetic—if it weren’t so destructive—about the way cybercriminals steal a brand.</image:title>
      <image:caption>Not with brute force. Not even with malware. But with a whisper. A shade. A simulation so precise that even your most loyal customer cannot tell the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b3c80d78-cef4-4311-aec1-5e8b6ff1b20e/Darkweb+Monitoring+%26+Brand+Protection+Service+Provider</image:loc>
      <image:title>Insights - The Silent Theft of Trust: When Cybercrime Wears Your Name - The Boardroom’s Blind Spot</image:title>
      <image:caption>There are few things more destabilizing than realizing your name is being used against you. But in boardrooms, brand impersonation is still too often viewed as a nuisance—a PR problem, a legal matter, someone else’s lane. It is none of those things. It is a risk to the company’s integrity, trust, and bottom line. Because when someone is tricked under your name, it’s not the attacker they blame. It’s you.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-cybersecurity-command-center-you-didnt-know-you-needed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/173e0f6d-4769-4f02-a632-3bc21bcded64/MSSP+in+the+US</image:loc>
      <image:title>Insights - The Cybersecurity Command Center You Didn’t Know You Needed - Why Choosing the Right MSSP Could Be Your Smartest Security Move</image:title>
      <image:caption>Let’s say this plainly: If your business is online, you’re already a target. And if you're relying on a small internal IT team to spot every threat, escalate every alert, and respond to incidents while juggling everything else — you’re running a risky experiment.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3711462a-3d02-43ac-82f2-a928882c1a98/padlock-with-tools-black-background.jpg</image:loc>
      <image:title>Insights - The Cybersecurity Command Center You Didn’t Know You Needed - It’s Not Just for Big Companies Anymore</image:title>
      <image:caption>We work with organisations of all sizes and sectors: Mid-sized firms managing sensitive data. Healthcare providers protecting patient records. Manufacturers running mission-critical OT systems. Retailers under constant threat of fraud. Telcos handling massive network traffic. If you have customers, data, operations, or compliance requirements — you’re a target. And if you're reacting instead of anticipating, it’s only a matter of time. What You Get With AKATI as Your MSSP You get constant vigilance — 24/7, 365. You get experienced analysts who know what to look for. You get incident response when it matters, not after the fact. You get reports that business leaders can actually act on. And you get a cybersecurity partner that works like an extension of your team — without adding complexity. This isn’t outsourced security. This is managed intelligence.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/when-your-ceo-texts-you-and-its-not-your-ceo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e3f793b1-a0e3-4edb-9823-1c7af7d4b52c/Managed+Security+Service+Provider+in+the+USA</image:loc>
      <image:title>Insights - When Your CEO Texts You — And It’s Not Your CEO - Executive impersonation is cheap, convincing, and already in your inbox.</image:title>
      <image:caption>There was a time when scam emails were easy to spot. They came with broken grammar, strange logos, and suspicious links from unknown addresses in faraway countries. But attackers have changed their approach. Now, the message is shorter, more familiar, and comes from someone you know — or think you do. It might be your CEO. It might be your CFO. It might be your department head asking for a quick favour or a confidential transaction.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a97aa7c7-1d16-4dd7-9af1-e3786e34fae5/Managed+Security+Service+Provider+in+the+USA</image:loc>
      <image:title>Insights - When Your CEO Texts You — And It’s Not Your CEO - The Role of Leadership Is Critical</image:title>
      <image:caption>Ironically, attacks that impersonate leadership often succeed because real leadership isn’t visibly involved in cybersecurity. Many executives don’t participate in awareness campaigns or simulated phishing tests. Some don’t even realise how easy it is for their names — and authority — to be weaponised against their own people. This has to change. When leaders visibly support security awareness, when they talk about it, participate in it, and model best practices themselves, employees notice. The culture shifts. Reporting a suspicious message becomes normal, not hesitant. Verifying an unusual request becomes responsible, not insubordinate. And attackers lose their edge. Leadership also has the power to fund the right training, back up the right policies, and set expectations across departments. If the tone from the top treats cybersecurity as an operational priority — not a compliance burden — that message ripples through the organisation. It shapes how teams behave when faced with uncertainty. And that makes all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/resolverrat-malware-campaign-raises-alarm-in-healthcare-sector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1b231030-7319-40d5-9657-9dc875052336/MSSP+in+the+US</image:loc>
      <image:title>Insights - ResolverRAT Malware Campaign Raises Alarm in Healthcare Sector</image:title>
      <image:caption>A new strain of malware, identified as ResolverRAT, has begun targeting organizations in the healthcare and pharmaceutical sectors, according to multiple cybersecurity firms tracking the campaign.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/25e49bc3-2e86-4ab4-ba37-109757b85f2c/several-colored-pills-black-background.jpg</image:loc>
      <image:title>Insights - ResolverRAT Malware Campaign Raises Alarm in Healthcare Sector - A concise reference for boards, CIOs, and clinical leadership:</image:title>
      <image:caption>Train Staff to Recognize Phishing Run simulations and awareness programs. Staff are your first line of defense. Restrict Administrative Access Limit privileges. Monitor all elevated account activity. Deploy Endpoint Detection and Response (EDR) Go beyond antivirus. Detect suspicious behavior and fileless malware. Enhance Email Security Use advanced filtering, attachment sandboxing, and impersonation detection. Monitor for Behavioral Anomalies Look for legitimate users doing abnormal things — late-night logins, bulk data movement, etc. Test Your Incident Response Plan Ensure executives, not just IT, know their roles in a cyber crisis. Engage a Trusted Cybersecurity Partner Work with experts who understand healthcare-specific systems and compliance frameworks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-regulator-got-breached-whats-left-to-guard-the-guards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b63774bf-6a83-4ab5-a9ed-ef88d9f2c5a8/Managed+Security+Service+Provider+%28MSSP%29+in+USA</image:loc>
      <image:title>Insights - The Regulator Got Breached. What’s Left to Guard the Guards?</image:title>
      <image:caption>The U.S. Office of the Comptroller of the Currency (OCC) is not a tech company, a fintech darling, or a cybersecurity vendor. It is a pillar of the American financial system—charged with regulating and supervising over 1,000 national banks and federal savings associations. And yet, on February 12, it confirmed a breach.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/19f18f57-add8-4f9d-92c8-7fed8208b86f/Managed+Security+Service+Provider+%28MSSP%29</image:loc>
      <image:title>Insights - The Regulator Got Breached. What’s Left to Guard the Guards? - Trust Is Now Contingent on Preparedness</image:title>
      <image:caption>What’s at stake in the OCC breach is not just data—but credibility. If regulators can’t safeguard their own communications, how will regulated institutions trust their guidance? If oversight bodies are vulnerable, what does that mean for the public’s faith in financial system stability? The breach has implications far beyond IT. It challenges how we think about institutional trust, strategic foresight, and board-level accountability in a post-perimeter world. Do you have a breach response plan that starts at the top? Most organizations have incident response playbooks. Fewer have board-informed, communication-aware plans that manage reputation and stakeholder trust. In a major incident, silence isn’t safety—it’s exposure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/digital-deceit-from-tiktok-to-bank-fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/dad68c69-610f-40ef-bee5-973b85b274e2/cybersecurity+malaysia</image:loc>
      <image:title>Insights - Digital Deceit: From TikTok to Bank Fraud - A Scam That Didn’t Look Like a Scam</image:title>
      <image:caption>Earlier this year, in Mumbai, a 61-year-old retired schoolteacher received a call that would change her life. On the line were individuals who calmly and convincingly claimed to be from the Central Bureau of Investigation, the Reserve Bank of India, and even Mumbai Police.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/0d1b45b5-a584-46d4-9b5e-2daceb53e830/top+cybersecurity+companies+in+malaysia</image:loc>
      <image:title>Insights - Digital Deceit: From TikTok to Bank Fraud - The TikTok Trap: Different Tactics, Same Outcome</image:title>
      <image:caption>While older adults are often targeted with impersonation and fear, a younger demographic is being ensnared on social media — especially on TikTok — through more seductive, low-stakes lures. The scam begins with a short video. Maybe it’s a smiling face explaining how to make RM500 (USD100) a day with a simple side hustle. Maybe it’s a tutorial offering exclusive “insider” tips. The video feels genuine. The account looks popular, with thousands of likes and comments. It seems harmless. At the end, there’s a link — usually to register or pay a small fee for access, sometimes as low as RM10 (USD 2.25). Users are redirected to what appears to be a legitimate payment portal, often one that mimics FPX or online banking pages. But the moment you key in your details, the fraudsters have what they came for: your banking credentials. The fee is irrelevant. The real target is your identity, your data, and your account access. Once inside, the scammers may initiate unauthorized transfers, clone your session, or sell your information on the dark web. What looked like an innocent tutorial turns into a direct financial attack.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/navigating-cybersecurity-in-malaysia-are-companies-ready-for-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/635e1d06-d11e-4b51-9c89-0ddcc8fa3843/Security+Posture+Assessment+in+Malaysia</image:loc>
      <image:title>Insights - Navigating Cybersecurity in Malaysia : Are Companies Ready for 2026?</image:title>
      <image:caption>A Wake-Up Call Hidden in Plain Sight In March 2025, Kuala Lumpur International Airport became the center of a national cybersecurity response. A credible digital threat had emerged, prompting round-the-clock surveillance from national agencies. The media covered it briefly, but those watching closely saw something deeper: cyberattacks were no longer random or opportunistic — they were strategic, targeted, and national in scale.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6c25edd0-7ea8-418c-bce0-f13cc3034398/Security+Posture+Assessment+%28SPA%29+Malaysia</image:loc>
      <image:title>Insights - Navigating Cybersecurity in Malaysia : Are Companies Ready for 2026? - Seven Strategic Shifts Companies Should Embrace Before 2026</image:title>
      <image:caption>[1] Assess Cybersecurity Maturity Through Peer Benchmarking. Begin by evaluating your current cybersecurity delivery using structured, outcome-based metrics. Then, compare your organization’s performance with peers of similar size and scope. This benchmarking exercise helps prioritize investments that target the most urgent gaps — objectively and measurably. [2] Engage Non-IT Executives in Cyber Resilience Planning. Cybersecurity is not just an IT domain — it’s a business-wide responsibility. Engage senior leadership across finance, operations, and legal to co-own decisions on protection priorities, and jointly assess how different risk levels impact overall mission delivery. [3] Define Protection-Level Agreements (PLAs). Move beyond vague aspirations of being “secure” and define what adequate protection looks like. Set clear PLAs across business units: for example, commit to a 15-day patch cycle, specific incident response times, or vendor control benchmarks. This turns abstract risks into actionable responsibilities. [4] Balance Security Investment with Operational Value. Cybersecurity is a choice — one that must be balanced with business impact. Use PLA metrics to communicate trade-offs to stakeholders: faster patching may reduce outages by 70%, improve partner trust by 20%, or lower breach risk significantly. Let value guide protection levels. [5] Continuously Govern Through Outcome Metrics. Security is never “done.” Track performance through live dashboards that reflect outcome-driven metrics (ODMs), revisit PLAs regularly, and recalibrate controls to respond to evolving threats or business shifts. This builds defensibility, transparency, and executive trust. [6] Integrate Cyber Strategy with Disaster Preparedness. Natural disasters and cyber disruptions are converging risks. Leverage existing disaster preparedness teams to align on shared controls like mobile workforce readiness, physical security upgrades, and predictive analytics. Cyber resilience must be embedded in broader continuity planning. [7] Institutionalize Enterprise-Wide Risk Appetite Conversations. Establish a cadence of structured risk appetite discussions at the leadership level. Empower CIOs, CISOs, and their peers to regularly define, document, and update acceptable risk thresholds — ensuring all decisions are future-proofed against operational, regulatory, and reputational impacts.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cybersecurity-doesnt-sleepwhy-your-governance-model-shouldnt-either</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1cff8b9e-1113-4690-9f36-e1225f8ec18f/Cybersecurity+Company+in+Malaysia</image:loc>
      <image:title>Insights - Cybersecurity Doesn’t Sleep—Why Your Governance Model Shouldn’t Either - If you've ever watched a boardroom breathe a collective sigh of relief after the final slide of a cybersecurity audit presentation, you might assume the job is done. The spreadsheets are neat, the risk register looks manageable, and the auditors have left the building. But in 2025, that sigh is premature—and dangerously outdated.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/1dc957a5-c22b-446c-83da-88c509d6f61c/Security+Audit+Service+Provider+in+Malaysia</image:loc>
      <image:title>Insights - Cybersecurity Doesn’t Sleep—Why Your Governance Model Shouldn’t Either - Governance Must Catch Up to Reality</image:title>
      <image:caption>There is no such thing as "zero risk," but there is such a thing as "unmonitored risk." And in 2025, that is the greater sin. For too long, boards have abdicated cyber governance to committees and consultants. But the attackers aren't waiting for board signoff. They're probing 24/7. They're using automation, AI, and an intimate knowledge of your supply chain. So the board's posture must evolve from passive oversight to active governance. From reviewing the report to interrogating the risk. From compliance to resilience. Because the real question isn't whether you've passed your audit. It's whether you’re still secure the day after. And in 2025, the companies that survive the breach aren't the ones who checked the box. They're the ones who checked their posture—every single day.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-hidden-cost-of-ignoring-patch-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d70b1465-24a1-457f-b2bf-1b8b6d702cf2/Unknown-2.jpeg</image:loc>
      <image:title>Insights - The Hidden Cost of Ignoring Patch Management</image:title>
      <image:caption>In an office that smells faintly of burnt coffee and late nights, somewhere between the third “remind me later” click and the team’s collective sigh over legacy system dependencies, something very real happens: a window opens. Not a literal one, but a digital aperture—unguarded, unsupervised. And while business-as-usual continues, that forgotten update is remembered by someone else. Someone with time, incentive, and a toolkit of exploits.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ceff625b-45b4-4427-9ae4-4672998bc35d/Unknown.jpeg</image:loc>
      <image:title>Insights - The Hidden Cost of Ignoring Patch Management - But here’s the truth: in cybersecurity, there are no small tasks.</image:title>
      <image:caption>Every unpatched endpoint, every delay, every “we’ll do it next quarter” becomes a potential narrative. And those narratives are written not just in data loss or reputational damage, but in the trust that quietly erodes when a company admits it knew better but didn’t act.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-5-cybersecurity-mistakes-that-leave-you-exposed</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c4493c61-a6bf-4b6a-89a8-2b828520c4f8/Unknown-2.jpeg</image:loc>
      <image:title>Insights - The 5 Cybersecurity Mistakes That Leave You Exposed - 1. Trusting Passwords Like You Trust Your Dog</image:title>
      <image:caption>We name our passwords after our pets, our birthdays, or—when we’re feeling particularly creative—the word “password” with a few numbers tacked on. The comfort of something memorable lulls us into complacency. But cybercriminals are not guessing passwords by hand. They use tools that can run millions of combinations in minutes. Passwords should be treated like secrets you’re willing to forget and retrieve from a vault—long, unique, and utterly random. Better yet, let a password manager do the remembering. It won’t remember your dog’s name, but it will save your data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d16e0c9a-d0b2-4f10-b91f-31ea76af0029/Unknown.jpeg</image:loc>
      <image:title>Insights - The 5 Cybersecurity Mistakes That Leave You Exposed - 3. Thinking Updates Are Optional</image:title>
      <image:caption>There’s something deeply annoying about the “update now” popup. We ignore it. Postpone it. Schedule it for 2 a.m. and still shut the laptop before it can act. But those updates exist because someone found a flaw—a way in. And that fix is now waiting to be installed. Cyberattacks love old systems. A missed update is like leaving your door unlocked in a rough neighborhood and being surprised when someone walks in. Let them update. Let them fix what’s broken before it breaks you.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/658cbe7e-a0c0-4b09-9815-62bae2ea9e64/Unknown.jpeg</image:loc>
      <image:title>Insights - The 5 Cybersecurity Mistakes That Leave You Exposed - 5. Thinking "It Won’t Happen to Me"</image:title>
      <image:caption>This one is the most dangerous. The idea that your company is too small, your account too insignificant, your systems too obscure to be a target. Attackers don’t care who you are. They care what they can access. And most of the time, they don’t even care enough to target you personally. They automate the hunt, scanning the internet for low-hanging fruit—outdated plugins, exposed ports, predictable passwords. It’s not personal. But it will feel that way. If you're not prepared, you're already vulnerable.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-both-internal-and-external-security-matter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/44ee2f81-5fa1-43ac-b51c-ace2c25254ff/Unknown.jpg</image:loc>
      <image:title>Insights - Why Both Internal and External Security Matter</image:title>
      <image:caption>Some questions arrive like rain — subtle, quiet, unassuming — and yet they leave everything changed. One of those questions came to us not long ago, not from a Fortune 500 company, but from a mid-sized educational institution. The CISO leaned forward and asked, “Do we really need both an internal and an external security assessment?” His tone was cautious, skeptical even, as if the answer might unlock some unwelcome cost. Or worse — reveal something they weren’t ready to face. The room went still. A clock ticked. And then, like peeling back the edge of a bandage, the answer began to unfold.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/60fe3ee6-d738-40a6-8f76-a8c86de7b177/Unknown.jpeg</image:loc>
      <image:title>Insights - Why Both Internal and External Security Matter</image:title>
      <image:caption>The difference between the two isn’t just one of perspective — inside versus out. It’s a philosophical one. One asks “what if the enemy is already here?” The other asks “how strong are our gates?” You need both questions. Because real threat actors don’t care which path works — just that one does.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-browser-is-lying-to-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f70ac509-518a-4524-ab4a-324955e00704/Browser+Phishing+Scam+Malaysia</image:loc>
      <image:title>Insights - The Browser Is Lying to You - AI-Powered Phishing Is Getting Smarter. Here's How to Stay Safe.</image:title>
      <image:caption>It used to be easy to tell when something was off. The grammar in the email was broken. The website looked like it was made in 2003. And the logo? Blurry. But that’s not the case anymore.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/do-not-confuse-a-penetration-test-with-a-vulnerability-scanhow-to-spot-a-fake-pentest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/91a4fda1-265f-4b2a-96b0-fc31f5f15618/Penetration+Test+Company+Malaysia</image:loc>
      <image:title>Insights - Do Not Confuse a Penetration Test with a Vulnerability Scan—How to Spot a Fake Pentest - There is an old joke in our cybersecurity world:</image:title>
      <image:caption>Asking for a penetration test but receiving a vulnerability scan or what we usually called, vulnerability assessment is like ordering a Michelin-star meal but being served instant noodles." The confusion is not just common, it is actually dangerous.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/why-pci-dss-compliance-matters-for-every-business-that-handles-card-payments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/715a7055-9cc5-43f5-a1fe-2493c6f7c2e0/AKATI+Sekurity+PCI+DSS+Compliance+Malaysia</image:loc>
      <image:title>Insights - Why PCI DSS Compliance Matters for Every Business That Handles Card Payments - Imagine This.</image:title>
      <image:caption>Every morning, you walk into your favorite café and order your favorite latte, then you tap your card at the counter. Transaction approved. Simple, seamless, and almost second nature. However, do you know that, behind that effortless moment is an entire ecosystem working to keep your payment details safe. We don't have a choice because the cybercriminals are always on the lookout for vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a1525c03-897f-4ea2-b696-37b91339c5c8/AKATI+Sekurity+PCI+DSS+Malaysia</image:loc>
      <image:title>Insights - Why PCI DSS Compliance Matters for Every Business That Handles Card Payments - How AKATI Sekurity Helps Businesses Stay PCI DSS-Compliant</image:title>
      <image:caption>Navigating compliance requirements can feel overwhelming, but you don’t have to do it alone. At AKATI Sekurity, we help businesses of all sizes understand, implement, and maintain PCI DSS compliance through a practical, security-first approach. Our process includes: Gap Assessments – Identifying where your current security measures stand and what needs improvement Risk-Based Implementation – Helping businesses prioritize security controls that actually reduce threats Regular Security Testing – Conducting penetration tests and vulnerability scans to catch risks before attackers do Ongoing Compliance Support – Keeping you up to date with evolving standards and best practices Whether you’re just starting with PCI DSS compliance or need help maintaining it, our team ensures security becomes a seamless part of your operations—without unnecessary complexity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/top-managed-security-operations-center-provider-in-malaysia-akati-sekuritys-cutting-edge-cyber-defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5d1a2758-26da-40c2-8236-44b3112bcbc5/Security+Operations+Center+in+Malaysia</image:loc>
      <image:title>Insights - The Business Case for a Real Security Operations Center: Why AKATI Sekurity Leads the Charge in Malaysia - How AKATI Sekurity Became the Managed SOC Malaysia’s Businesses Can’t Ignore</image:title>
      <image:caption>Cyber threats in Malaysia are no longer a distant concern, something that only large enterprises or government agencies need to worry about. They are an inevitability, an unavoidable part of operating in the digital age. For companies of all sizes, the question is not whether they will face an attack, but whether they will be prepared when it happens.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/be7eea29-3fe4-40ef-b049-e37ef79e2044/silhouette-man-overseeing-operations-hightech-security-control-room.jpg</image:loc>
      <image:title>Insights - The Business Case for a Real Security Operations Center: Why AKATI Sekurity Leads the Charge in Malaysia - Compliance as a Security Strategy, Not a Checkbox</image:title>
      <image:caption>For many companies, compliance is an obligation, a box to check for regulatory audits. But in cybersecurity, compliance is not just about meeting legal requirements—it’s about survival. AKATI Sekurity’s Managed SOC helps businesses stay ahead of evolving security regulations, ensuring compliance with some of the most stringent frameworks in the industry: PCI DSS for financial institutions ISO 27001 for data security governance NIST Cybersecurity Framework for risk management Malaysia’s Cyber Security Act 854, designed to safeguard national resilience against cyber threats But compliance is just the baseline. The real objective is cyber resilience—the ability to withstand, adapt to, and recover from attacks without crippling business operations.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/cybersecurity-act-854-what-it-means-for-your-business-amp-how-to-stay-compliant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ed8eebbd-bbcb-41d9-9d61-a8eff1ce2ac3/Cybersecurity+Act+854+is+here%E2%80%94what+does+it+mean+for+your+business%3F</image:loc>
      <image:title>Insights - Cybersecurity Act 854: What It Means for Your Business &amp;amp; How to Stay Compliant - Cybersecurity Act 854</image:title>
      <image:caption>Cybersecurity Act 854 is here—what does it mean for your business? Learn key compliance requirements, penalties, and how AKATI Sekurity, a Cybersecurity Service Provider can help you stay compliant with Malaysia’s cybersecurity laws.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/top-cybersecurity-companies-in-malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6bcb3024-b72c-4f22-a61c-30c93ffe578c/Cybersecurity+in+Malaysia%3A+Who%E2%80%99s+Leading+the+Digital+Defense%3F</image:loc>
      <image:title>Insights - Top Cybersecurity Companies in Malaysia: Why AKATI Sekurity Leads the Industry - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-risk-of-single-vendor-brand-dependence-a-boardroom-wake-up-call</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/69b5f6f1-c91d-4736-9a44-c201768009e4/1Cybersecurity+consulting+strategy+to+reduce+vendor+dependence+in+Malaysia</image:loc>
      <image:title>Insights - The Risk of Single-Vendor Brand Dependence - The Skybox Meltdown: A Hard Lesson in Single-Vendor Dependency</image:title>
      <image:caption>Businesses cannot afford to rely on a single cybersecurity provider in Malaysia. Vendor dependence creates security blind spots, leaving organizations vulnerable to cyber threats. As a trusted cybersecurity consulting firm, AKATI Sekurity advises organizations to diversify their security strategy for better risk management.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/84194756-f581-4f08-b129-b31d3778ff48/Cybersecurity+consulting+strategy+to+reduce+vendor+dependence+in+Malaysia</image:loc>
      <image:title>Insights - The Risk of Single-Vendor Brand Dependence - The Hidden Trap: Being Locked into a Single Vendor’s Ecosystem</image:title>
      <image:caption>Many organizations unknowingly fall into a trap—believing they are secure because they are using a “trusted” brand across multiple cybersecurity solutions. But when all your firewalls, endpoint detection, threat intelligence, and vulnerability management tools come from the same vendor, you are no longer in control—the vendor is.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b15c7941-20f2-4dac-9725-433e229973b0/Cybersecurity+consulting+strategy+to+reduce+vendor+dependence+in+Malaysia</image:loc>
      <image:title>Insights - The Risk of Single-Vendor Brand Dependence - The AKATI Sekurity Approach: Multi-Vendor Resilience and Expertise</image:title>
      <image:caption>At AKATI Sekurity, we don’t just resell tools—we build end-to-end cybersecurity strategies tailored to your organization’s unique needs. Here’s how partnering with us ensures your security remains strong, independent, and adaptable: Vendor-Agnostic, Client-Focused Solutions – We don’t push a single brand or platform. Instead, we integrate the best-of-breed technologies suited to your business, ensuring you’re never locked into one vendor’s fate. Real Expertise, Not Just Tools – Our team consists of seasoned cybersecurity professionals who understand security beyond configurations and dashboards. We provide advisory, threat intelligence, and incident response strategies that are built on experience, not dependency. Built-in Contingencies for Vendor Failures – We design security architectures that include multiple layers of redundancy. If a vendor exits the market, your security remains intact because we plan for these risks from day one. Ongoing Security Optimization – Cyber threats evolve, and so should your security posture. Our continuous monitoring and adaptive strategies ensure you stay ahead of new risks while maintaining operational efficiency. Regulatory Compliance &amp; Risk Management – Whether you’re in financial services, healthcare, education, or government, we ensure your cybersecurity framework meets industry regulations and best practices—without relying solely on third-party vendors to dictate compliance. If your cybersecurity strategy can’t function without a single vendor, you don’t have a strategy—you have a single point of failure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-cybersecurity-mirage-why-boards-are-investing-but-not-seeing-results</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/322ef20a-ae32-4697-84e8-bccd73b07dda/Cybersecurity+services+company+advising+Malaysian+businesses+on+digital+risk+management.</image:loc>
      <image:title>Insights - The Cybersecurity Mirage: Why Boards Are Investing, but Not Seeing Results - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/771e405c-f3d7-480c-ad4c-dad64737583b/Cybersecurity+services+company+advising+Malaysian+businesses+on+digital+risk+management.</image:loc>
      <image:title>Insights - The Cybersecurity Mirage: Why Boards Are Investing, but Not Seeing Results - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/augmented-leadership-embracing-ai-without-losing-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a3a43bdf-dd47-4749-8d20-82d374da8526/Rogan_Talk_A_balance_scale_with_glowing_AI_circuits_on_one_si_02e7caca-3001-4532-b3a5-aae7ffff3c34.jpeg</image:loc>
      <image:title>Insights - Augmented Leadership: Embracing AI Without Losing Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/disinformation-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/dd678e66-680d-433d-906c-0811de0204cb/Unknown.jpeg</image:loc>
      <image:title>Insights - Disinformation Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/leadership-reimagined-why-every-board-needs-a-cyber-expert</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/0e78b03d-ba9f-47c5-9e63-16ca4f0acb39/Unknown.jpeg</image:loc>
      <image:title>Insights - Leadership Reimagined: Why Every Board Needs a Cyber Expert - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6050638a-e623-4aa7-bbcb-70dbba563830/Unknown.jpeg</image:loc>
      <image:title>Insights - Leadership Reimagined: Why Every Board Needs a Cyber Expert - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/from-risk-to-reward-how-cybersecurity-transformed-boardroom-strategies-in-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e85874bd-b72d-42c9-b603-deb3cb498b7e/Unknown.jpeg</image:loc>
      <image:title>Insights - From Risk to Reward: How Cybersecurity Transformed Boardroom Strategies in 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e53b78f3-5c79-4e4b-b115-66f9662341e4/Unknown.jpeg</image:loc>
      <image:title>Insights - From Risk to Reward: How Cybersecurity Transformed Boardroom Strategies in 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/ec4e6406-461e-4a04-aced-c892c957e784/Unknown.jpeg</image:loc>
      <image:title>Insights - From Risk to Reward: How Cybersecurity Transformed Boardroom Strategies in 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-true-cost-of-cutting-cybersecurity-cost</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c431928a-6e61-4ab7-8402-96fc2cdaa64d/1680152317147.jpeg</image:loc>
      <image:title>Insights - The True Cost of Cutting (Cybersecurity) Cost - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/2f8311f9-95d4-4957-acbb-226a2a920e7f/1680152592827.jpeg</image:loc>
      <image:title>Insights - The True Cost of Cutting (Cybersecurity) Cost - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/2f387191-3ea1-4723-b6fb-f013727cb286/1680152929789.jpeg</image:loc>
      <image:title>Insights - The True Cost of Cutting (Cybersecurity) Cost - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/4efc7ce9-48f8-44bd-b8e8-c626a67915c6/1680153322728.jpeg</image:loc>
      <image:title>Insights - The True Cost of Cutting (Cybersecurity) Cost - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/d4de96f1-0a4d-401d-9d6e-c9f1a8688a1e/1680153402437.jpeg</image:loc>
      <image:title>Insights - The True Cost of Cutting (Cybersecurity) Cost - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/balancing-security-and-roi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c18ab67e-a9fa-401f-b7a5-dda7531653ab/Unknown.jpeg</image:loc>
      <image:title>Insights - Balancing Security and ROI: The CFO’s Guide to SIEM Investments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b8c758e9-838a-4c70-a45d-9629c5bf6b9b/Unknown.jpeg</image:loc>
      <image:title>Insights - Balancing Security and ROI: The CFO’s Guide to SIEM Investments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-incident-response-playbook-building-a-board-ready-plan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/05830635-eed9-4ee0-b78e-8c5a67f061b4/Unknown.jpeg</image:loc>
      <image:title>Insights - The Incident Response Playbook: Building a Board-Ready Plan - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/917c7820-e6d6-44a4-8efc-62c5c8edb802/Unknown.jpeg</image:loc>
      <image:title>Insights - The Incident Response Playbook: Building a Board-Ready Plan - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/the-boardrooms-hidden-weapon-how-forensics-transforms-cyber-incidents-into-strategic-wins</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7498a83f-51bc-47ed-b394-a6392a426d37/Unknown.jpeg</image:loc>
      <image:title>Insights - The Boardroom’s Hidden Weapon: How Forensics Transforms Cyber Incidents into Strategic Wins - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/80d125c2-599e-4baf-9d33-c594f689657d/Unknown.jpeg</image:loc>
      <image:title>Insights - The Boardroom’s Hidden Weapon: How Forensics Transforms Cyber Incidents into Strategic Wins - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/70e37915-7e5b-4338-936b-d59c69f10008/Unknown.jpeg</image:loc>
      <image:title>Insights - The Boardroom’s Hidden Weapon: How Forensics Transforms Cyber Incidents into Strategic Wins - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/beyond-containment-empowering-boards-to-lead-resilient-incident-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5bba6935-9c03-4e62-902d-cb864eeaad3b/Unknown.jpeg</image:loc>
      <image:title>Insights - Beyond Containment: Empowering Boards to Lead Resilient Incident Response - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/2a622995-52dd-4312-9695-43fe35270665/Unknown.jpeg</image:loc>
      <image:title>Insights - Beyond Containment: Empowering Boards to Lead Resilient Incident Response - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/incident-response-101-the-hard-questions-every-board-member-needs-to-ask-before-during-and-after-a-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/75c9ea7f-1939-416c-81e5-660f089f5a43/table-2254656_640.jpg</image:loc>
      <image:title>Insights - Incident Response 101: The Hard Questions Every Board Member Needs to Ask Before, During, and After a Breach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/5f706118-9aa2-4ded-99aa-63e7019da966/data_breach.png</image:loc>
      <image:title>Insights - Incident Response 101: The Hard Questions Every Board Member Needs to Ask Before, During, and After a Breach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/187486e7-f6af-45a1-9f50-c5e743baa562/Unknown-2.jpg</image:loc>
      <image:title>Insights - Incident Response 101: The Hard Questions Every Board Member Needs to Ask Before, During, and After a Breach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/before-the-next-cyberattack-why-smart-companies-have-an-incident-response-retainer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/2775e843-b4d1-47b7-a340-80869d403c08/image.jpeg</image:loc>
      <image:title>Insights - Before the Next Cyberattack: Why Smart Companies Have an Incident Response Retainer - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/top-10-most-significant-cybersecurity-challenges-for-c-level-executives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/3bfafd82-3e27-456c-9b1c-2d33ab8d28e8/hacker-1944688_1280.jpg</image:loc>
      <image:title>Insights - Top 10 Most Significant Cybersecurity Challenges for C-level Executives - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/44a7707b-6c5b-4f49-9ae8-327c5e182b33/ai-generated-8366102_1280.jpg</image:loc>
      <image:title>Insights - Top 10 Most Significant Cybersecurity Challenges for C-level Executives - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/b0fc4d14-d38b-42df-92fe-9c7344c67a9d/friends-1026521_1280.jpg</image:loc>
      <image:title>Insights - Top 10 Most Significant Cybersecurity Challenges for C-level Executives - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/insider-threats-how-to-mitigate-risks-from-within-your-organization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/e9ef688a-fb2f-4d8e-99db-f2c305f01b38/1679046635577.jpeg</image:loc>
      <image:title>Insights - Insider Threats: How to Mitigate Risks from Within Your Organization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/847f83de-dd61-437d-af98-50565821b8e9/image+%283%29.png</image:loc>
      <image:title>Insights - Insider Threats: How to Mitigate Risks from Within Your Organization</image:title>
      <image:caption>The rise and cost of Insider Threats Insider threats are now a growing concern as cybercriminals have begun directly soliciting the help of employees to execute ransomware attacks against their organization.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/creating-a-culture-of-cybersecurity-making-it-everyones-responsibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/04db2260-e6fd-4567-9f60-a3fd6ff6a232/1691030852832.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/67d574cf-80cb-4648-976b-1e9a15de849b/1691032568558.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/34578747-13a8-4512-adf8-6d60fe7035c1/1691030949237.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/887a6547-1992-4413-94a0-ff5bf3b36623/1691031344238.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/9e6b78fc-6895-4ab9-b9b7-ae131553e950/1691031695554.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/6f7cddf3-04d3-4011-9e21-a0516eafdf27/1691032604084.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/192cca18-5d52-466c-9685-c2c15363688c/1691031603393.jpeg</image:loc>
      <image:title>Insights - Creating a Culture of Cybersecurity: Making it Everyone's Responsibility - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/under-attack-dont-hit-the-panic-button-yet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/c0c50c85-ae16-40ac-9cb4-c9bd155cc3a6/panic-red-button.png</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet - Got hacked? Who are you gonna call? (Ghostbusters!) If you are born in the 80s and before, you would definitely understand where the author is coming from. Jokes aside.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f6c56fec-d7f0-4141-a44a-9f6b7de1a008/1694751628730.jpeg</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet</image:title>
      <image:caption>In the first step of your cybersecurity incident response plan, preparation is key. Just as a coach assembles a sports team when the need arises, ensure your team is ready to address any cyber threats that arise. Clarify roles and responsibilities, like assigning positions in a football match. This step requires you to build your response team and ensure they are adequately trained to handle various scenarios. Regular training sessions and cyber drills will help your team stay sharp and prepared for any challenges that may arise.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/f57f1bbb-390c-4c29-b719-771234378266/1694751772370.jpeg</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet</image:title>
      <image:caption>Think of your incident response team as your trusted nature guides, armed with the necessary tools and experience to spot any unusual occurrences within your organization’s cyberspace. Similar to seasoned nature enthusiasts on a hike, they utilize their knowledge and specialized equipment to keenly identify and analyse cybersecurity threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/7e25ea7a-5147-4359-beb1-eec45a95152b/image.png</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet</image:title>
      <image:caption>Imagine your incident response team as firefighters responding to a small forest fire. Quick action is key to preventing it from spreading like wildfire. The goal is to keep the blaze from consuming the entire forest. Once a cybersecurity threat has been identified, it's vital to isolate and contain it swiftly to prevent further harm to your business operations. A powerful tool in achieving effective containment is a Security Orchestration, Automation, and Response (SOAR) platform. Think of it as a set of automated tools and processes that act as your firefighting equipment.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/54daf683-4817-48d7-bb01-fd0f50b82cab/image+%281%29.png</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet</image:title>
      <image:caption>Imagine your cybersecurity experts as doctors diagnosing and treating an illness. Their role is to perform thorough check-ups on your organization's health, much like medical professionals seeking to identify and eliminate the root cause of a health issue. This stage involves a thorough investigation, detailed analysis, and effective recovery to ensure that the issue is fully resolved. To achieve comprehensive eradication of cyber threats, your cybersecurity consultants typically employ threat hunting techniques (The proactive search for cyber threats within your IT environment) using indicators of compromise (IoCs)(In simpler terms, the warning signs of a breach). This proactive approach helps identify hidden malware or unauthorized access points, that automated security solutions might have missed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/680d684a-5188-4778-a669-47ff022e7e1c/1694751917287.jpeg</image:loc>
      <image:title>Insights - Under Attack? Don't Hit the Panic Button Yet</image:title>
      <image:caption>In the last phase of "Recover," your team becomes like expert craftsmen focused on bringing back a vintage car to its best condition. Their job is to revert your business to operate as well as before the breach, just like how people carefully restore old, beloved items. This important step is all about fixing systems, data, and services and testing them thoroughly to make sure everything works perfectly.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/what-is-a-soc-functions-roles-benefits-challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/79dea5c4-6c50-46e0-b8bc-93af1d4ef59c/security-room-with-computers-monitors-generative-ai.jpg</image:loc>
      <image:title>Insights - What is a SOC: Functions, Roles, Benefits, Challenges - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/9d712823-d838-495c-a1d3-3c6a1f186a30/image+%284%29.png</image:loc>
      <image:title>Insights - What is a SOC: Functions, Roles, Benefits, Challenges - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/a74f1c9e-4a5b-43ac-a5d1-794a402284a5/techsavvy-executive-transfers-data-with-precision-holographic-display-2.jpg</image:loc>
      <image:title>Insights - What is a SOC: Functions, Roles, Benefits, Challenges - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/af8856d9-7740-4483-961b-bebbe925fb0a/compelling-cybersecurity-backdrop-emphasizing-importance-continuous-adaptation-improvement-information-network-protection-2.jpg</image:loc>
      <image:title>Insights - What is a SOC: Functions, Roles, Benefits, Challenges - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/17bc2ac0-515f-4563-a2bc-1f392c9d5e57/image+%282%29.png</image:loc>
      <image:title>Insights - What is a SOC: Functions, Roles, Benefits, Challenges - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/leading-with-intelligence-ais-role-in-cyber-defencenbsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/53be502d-d1fa-4110-997f-5d8a0361785c/3d-rendering-female-cyborg-robot-thinking-black-background.jpg</image:loc>
      <image:title>Insights - Leading with Intelligence: AI’s Role in Cyber Defence&amp;nbsp; - Artificial Intelligence</image:title>
      <image:caption>The Double Edged Sword</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/4838e677-a8fe-4e4a-ac00-c358027c1a75/ai-artificial-intelligence-technology-microchip-background.jpg</image:loc>
      <image:title>Insights - Leading with Intelligence: AI’s Role in Cyber Defence&amp;nbsp;</image:title>
      <image:caption>In the past, cybersecurity strategies heavily relied on manual, rule-based approaches and signature-based technologies. While these methods offered some degree of effectiveness, they struggled to match the speed of change and the evolving tactics of cyber criminals. Enter Artificial Intelligence (AI), a transformative force in the domain of cybersecurity. AI has elevated our security measures, rendering them more intelligent, predictive, and responsive.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ed20a53985e455b09fbe32e/83955fc9-9334-4c60-9024-8ecb4db5d053/shield-security-protection-icon-safety-illustration-symbol-emblem-concept-cyberspace-check.jpg</image:loc>
      <image:title>Insights - Leading with Intelligence: AI’s Role in Cyber Defence&amp;nbsp; - SOC Monitoring: Implement AI-driven Security Operations Center (SOC) monitoring tools for real-time threat analysis and response. Features to Look for:</image:title>
      <image:caption>SOAR (Security Orchestration, Automation, and Response): Ensures automated responses to identified threats. Threat Intelligence Integration: Real-time updates from global threat feeds that the AI can learn from. Behavioral Analytics: Capability to analyse normal vs. anomalous behavior in real-time.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Red+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/SC%27s+Guidelines+on+Technology+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Governance+Risk+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Cybersecurity+Act</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Outcome-Driven+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/MSSP+partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/RMiT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Compromise+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Cybersecurity+Board+Communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/SOC+analyst+burnout+prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Adversarial+Attack+Simulation+Exercise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/AASE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/SEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Security+Operations+Center+management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Governance+%26+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/cybersecurity+workforce+crisis+solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Financial+Institutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Digital+Forensics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/Zero+Trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/category/ZTNA+Implementation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Leadership</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Ransomware+attack+stages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Managed+Detection+%26+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Multi-Factor+Authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Next-Gen+SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/VAPT+Retainer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Consulting+ASEAN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/PCIDSS+ASV</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Threat+Detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Service+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Attack+Path+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Internal+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/MSSP+in+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Credit+Based+VAPT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/adversarial+attack+simulation+exercise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/CISA+Secure+by+Design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC+Challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Operations+Centre+in+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/PCI+SSC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Operational+Technology+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/NIST+2.0</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Financial+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Zero+Trust+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+hygiene</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Awareness+For+Everyone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC+analyst+burnout+prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Automated+Threat+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Darkweb+monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/24%2F7+Monitoring+Requirements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/PCI+ASV+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Operations+Center+management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/IAM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Continuous+Monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Posture+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+board+communication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Operating+Technology+%28OT%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC+Benefits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Threat+Exposure+Management+%28CTEM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Recognition</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/MSSP+USA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Executive+Impersonation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Secure+by+Design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Bank+Cybersecurity+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Secure+by+Default</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Compromised+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Red+Team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Zero+Trust+Security+Model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Single-Vendor+Brand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SIEM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Secure+Software+Development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/CISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/cybersecurity+kill+chain+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Threat+Exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Brand+Protection+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Quantum+Computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Browser+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SPA+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/BEC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Identity+Access+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC+Functions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Artificial+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Legacy+System</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Computer+Forensic+Investigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/AASE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SC+Technology+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Vendor+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Vishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Third+Party+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Business+Email+Compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Awards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Regulator+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Merger+Acquisition+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Patch+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Strategic+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Digital+Forenics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/ICS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/BNM+RMiT+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Killchain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SC%27s+Guideline+on+Technology+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/BNM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/RMIT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Ransomware+Kill+Chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Technical+Debt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/KPI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Risk+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/External+Attack+Surface+Management+%28EASM%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Third-Party+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Companies+in+USA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Governance+Risk+and+Compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Threat+Report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Managed+Security+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Skybox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/External+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/DevSecOPs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Critical+Infrastructure+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Culture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Social+engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/MDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Pentest+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/AI+Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/OWASP+API+Top+10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/OT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/MSSP+partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SCADA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/RMiT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Threat+Modeling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/PCI+DSS+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Breach+%26+Attack+Simulation+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Threat+Intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SAFE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Compensating+Controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOAR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Outcome-driven+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Act+854</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Harvest+Now+Decrypt+Later</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SAST%2C+DAST</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Scammers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/API+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/General</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Incident+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Operations+Center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Managed+Security+Service+Provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Partners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/M%26A+Due+Diligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Penetration+Testing+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SolarWinds+Attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Supply+Chain+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/DDoS+Attack+Simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Security+Orchestration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/PCI+Approved+Scanning+Vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Enterprise+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cloud+Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Penetration+Test+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/SOC+Roles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Data+Breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Tiktok+Fraud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Protection-Level+Agreements+%28PLA%29</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+for+Executives</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Companies+in+Malaysia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Deepfakes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Application+Security+Assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/cybersecurity+workforce+crisis+solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Data+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Trusted+MSSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cybersecurity+Consulting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/Cyber+Defence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/insights-blog/tag/IT+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.akati.com/main</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/people</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/notfound</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/mss</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/managed-isoc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/governance-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/cyber-hygiene</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/security-consulting-service-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/xdr</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/attack-surface-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/brand-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/cti</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/pcidss-compliancecertification</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/iso-270012022-compliancecertification</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/web-applicationtesting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/redteaming</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/penetrationtesting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/cyber-incident-response</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/irsos</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/pcidss-asv-vulnerability-scan-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/bnm-rmit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/sc-technology-risk-management-independent-review</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/mas-trm-independent-review</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/paynet-third-party-acquirer-tpa-system-audit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/paynet-cyber-resilience-independent-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/incident-response-dfir-retainer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.akati.com/ncii-cybersecurity-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
</urlset>

