<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://nomicnetworks.com</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/compare</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/cins-community</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/company</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/compliance</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/solutions/hq</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/solutions/insight</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/instant-demo</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/solutions/managed-network-detection-response</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/solutions/managed-security-operations</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/solutions/outpost</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/partners</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/smart-managed-security</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/contact</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/thank-you</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/home---back-up-copy</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/non-beatae</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/porro-explicabo-nesciunt-nihil</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/quia-aliquid-deleniti</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/ted-gruenloh</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/veniam-sed-vitae-aut</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/team/voluptate-pariatur-rerum-provident</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/beyond-the-siem-network-visibility-for-municipal-cybersecurity---season-2-ep-1</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/biggest-news-so-far-this-year-our-name-change-of-course</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/city-of-bryan</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/crowdstrike-shines-a-light-on-resiliency</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybers-focus-on-leadership-these-days</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybersecurity-challenges-in-local-government-ep-2</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybersecurity-collaboration-in-city-government-ep-5</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybersecurity-in-financial-services-ep-3</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybersecurity-in-healthcare-with-firelands-regional-medical-center-ep-1</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/cybersecurity-in-manufacturing-ep-4</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/diamonds-in-the-rough-volume-ii</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/does-anyone-have-any-idea-whats-going-on</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/doesnt-matter-how-big-or-small-you-are</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/dont-put-all-your-security-eggs-in-one-basket</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/dont-take-our-word-for-it</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/farmers-merchants-bank</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/fighting-for-dollars-is-nothing-new</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/how-are-you-weathering-the-storm</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/how-do-you-stop-the-budget-bleeding</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/if-it-aint-broke-dont-fix-it</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/it-all-starts-at-the-top</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/land-of-confusion</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/m-capital-advisors</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/mind-the-gap-ai-attacks-vs-legacy-systems</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/playing-catch-up</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/ransomwares-future-is-still-pointing-up-and-to-the-right</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/smart-security-on-a-budget-march-2025-cins-brief</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/south-peninsula-hospital</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/suny-delhi</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/that-awkward-moment-when-a-stranger-tells-you-youve-been-hacked</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/the-edge-is-dead-reprise</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/the-edge-is-having-a-moment-april-2025-cins-brief</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/the-edge-is-popular-for-all-the-wrong-reasons-cins-brief-august-2025</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/the-key-to-good-cybersecurity-dont-be-a-jerk</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/this-one-never-gets-old</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/welcoming-our-new-overlords</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/well-hes-not-wrong</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/what-black-hat-gets-wrong</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/whats-gov-got-to-do-with-it</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/whos-the-ciso-feb-2025-cins-brief</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/why-is-roi-such-a-dirty-word</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/why-make-a-hard-job-harder-may-2025-cins-brief</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/resources/your-cyber-insurance-isnt-just-insurance-anymore</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/author/joe-pettit</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/author/musa-nadir</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/author/ted-gruenloh</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/whitepapers/nomic-networks-managed-network-detection-and-response</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/city-of-bryan</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/farmers-merchants-bank</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/gulf-coast-water-authority</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/m-capital-advisors</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/newton-kansas</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/south-peninsula-hospital</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/case-study/suny-delhi</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/3-criteria-for-evaluating-network-detection-and-response-ndr-vendors</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/5-security-misconceptions-that-persist-in-government-today</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/6-free-threat-intelligence-sources-you-cant-live-without-in-2025</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/8-security-misconceptions-that-still-persist-in-government-today</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/apis-and-protocols-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/are-ips-and-ids-still-relevant</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/autonomous-threat-defense</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/best-cybersecurity-awareness-training-for-employees-in-2023</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/best-cybersecurity-awareness-training-tips-for-employees-in-2025</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/bidens-post-solarwinds-eo-underscores-need-for-better-smb-security</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/big-social-engineering-attacks-small-warning-signs</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cis-20-101-the-essential-introduction-to-cis-controls-implementation</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cis-controls-in-the-real-world</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cisa-warns-even-mature-organizations-are-still-slipping-up-on-the-basics</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cisos-lean-on-more-than-just-technical-skills-as-they-face-new-threats-an-interview-with-ian-thornton-trump</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cyber-hygiene-cyber-health-and-cybersecurity-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cyber-insurance-what-do-cisos-recommend</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybercriminals-have-small-town-usa-in-their-crosshairs-how-to-fight-back</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-in-a-siem-less-world-part-i</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-in-a-siem-less-world-part-ii</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-in-city-government-taken-to-new-heights-an-interview-with-shane-mcdaniel</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-is-more-than-cves</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-reaction-vs-prediction-vs-preparation</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/cybersecurity-teams-struggle-to-fix-vulnerabilities-amid-budget-cuts-and-layoffs</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/ensuring-security-for-iot-and-legacy-apps-when-the-cloud-isnt-an-option</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/escalating-cyber-danger-at-the-edge</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/exploring-with-outpost-4-6</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/finding-security-gaps-why-edr-needs-ndr</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/going-passwordless-ish</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/going-siem-less-in-2025-saving-time-money-and-headaches</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/grab-our-ebook-the-essential-introduction-to-cis-20-implementation</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/how-insight-outsmarts-the-competition</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/how-to-build-a-siem-less-architecture-for-your-small-business</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/is-cyber-insurance-worth-the-cost-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/lack-of-visibility-is-impacting-organizations-ability-to-respond-to-attacks</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/leaning-on-network-flows-to-monitor-zero-trust-implementations</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/misconfigurations-the-unforced-errors-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/navigating-the-newly-passed-state-and-local-cybersecurity-improvement-act</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/network-cloaking-a-secret-weapon-for-managed-network-detection-response</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/network-security-misconceptions-in-government</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/new-cis-controls-tool-to-analyze-the-likelihood-of-a-ransomware-incident</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/no-really-is-defense-in-depth-still-a-thing</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/nomic-insight-what-are-flows-and-why-are-they-important</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/nomics-role-in-the-incident-response-lifecycle</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/penetration-test-vulnerability-scan</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/quick-cybersecurity-wins-with-autonomous-threat-defense</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/security-poverty-line</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/sentinel-ips-is-now-nomic-networks</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/sentinel-outpost-4-6</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/spotting-insider-threats</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/takeaways-from-the-tagitm-and-giants-conferences</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-411-on-threat-intelligence-what-it-is-how-its-used-and-why-its-critical-to-network-security</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-cins-army-sharing-cyber-threat-intelligence-for-10-years</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-edge-is-dead-long-live-the-edge</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-first-tagitm-industry-partner-award-goes-to-nomic-networks</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-golden-vector-how-to-lobby-for-your-cybersecurity-budget</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-perfect-storm-critical-infrastructure-attacked-more-often-but-lacks-layered-defenses</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-power-of-word-of-mouth-the-secret-weapon-of-sme-cybersecurity-providers</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-role-of-threat-intelligence-in-todays-cyber-landscape</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/the-smbs-guide-to-incident-response</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/there-ought-to-be-a-law-texas-sb-820-mandates-cybersecurity-for-schools</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/thwarting-opportunistic-attackers-by-reducing-the-public-attack-surface</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/tis-the-season-core-competencies-of-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/tool-sprawl-what-it-is-and-how-to-overcome-it</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/top-5-steps-to-guarantee-cis-controls-success</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/true-support-tales-all-roads-lead-to-ransomware</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/trust-but-verify-why-you-should-have-a-spotter-for-zero-trust</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/visibility-what-will-save-us-from-being-next-months-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/vulnerability-assessment-and-ongoing-management</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/we-wrote-our-first-blog-about-internet-safety-month-6-years-ago-whats-changed</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/what-are-the-legal-consequences-of-violating-cybersecurity-compliance-standards</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/what-is-network-detection-and-response-ndr-and-why-does-it-need-to-be-managed</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/what-most-smaller-organizations-get-wrong-when-choosing-managed-cybersecurity</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/what-the-nist-2-0-changes-really-mean-for-the-cybersecurity-industry</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/what-type-of-hacker-targets-smbs</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/whats-new-in-cis-controls-v8</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/which-smbs-are-the-most-confident-in-their-security</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/why-build-vs-buy-isnt-always-the-right-calculus-for-detection-and-response</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/why-smbs-need-to-secure-the-network-not-just-the-endpoint</loc>
    </url>
    <url>
        <loc>https://nomicnetworks.com/blog/why-vpns-and-edge-services-are-under-siege-and-what-to-do-about-it</loc>
    </url>
</urlset>