<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://seconize.co/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://seconize.co/in-the-news/seconize-position-validated-again-as-being-in-the-top-5-cyber-security-startups-of-india-in-2020/</loc><lastmod>2020-01-15T21:30:08+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/883-2/</loc><lastmod>2020-01-15T21:39:16+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/team-outing-prior-to-covid-19-setting-in/</loc><lastmod>2020-02-28T19:48:00+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/seconize-featured-in-the-news-as-one-of-the-key-startups-serving-fsi-fintech-companies-in-south-east-asia/</loc><lastmod>2020-03-31T21:06:00+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/seconize-recognized-as-top-5-cyber-security-startups-of-2020/</loc><lastmod>2020-01-04T18:57:09+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-listed-in-singapore-cyber-security-key-startup-ecosystem/</loc><lastmod>2019-09-07T23:58:52+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/seconize-wins-top-5/</loc><lastmod>2019-12-31T00:22:17+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/meeting-prof-sada/</loc><lastmod>2020-01-08T22:19:32+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/recently-seconize-was-featured-in-this-your-story-article-on-the-latest-cyber-security-trends-outlook-in-the-covid-19-new-normal-scenario/</loc><lastmod>2020-06-18T10:41:50+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/whitepaper-seconize-risk-intelligence/</loc><lastmod>2019-07-05T20:12:58+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/seconize-company-profile/</loc><lastmod>2019-07-05T20:43:00+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/seconize-product-brochure/</loc><lastmod>2019-07-05T20:51:08+00:00</lastmod></url><url><loc>https://seconize.co/blog/cyber-risk-management/</loc><lastmod>2020-09-16T11:06:26+00:00</lastmod></url><url><loc>https://seconize.co/blog/risk-based-vulnerability-management/</loc><lastmod>2020-10-07T12:11:33+00:00</lastmod></url><url><loc>https://seconize.co/blog/assessment-va-pt/</loc><lastmod>2020-10-26T12:20:00+00:00</lastmod></url><url><loc>https://seconize.co/blog/risk-based-compliance-management/</loc><lastmod>2021-04-15T13:43:44+00:00</lastmod></url><url><loc>https://seconize.co/blog/cspm/</loc><lastmod>2021-06-29T10:08:36+00:00</lastmod></url><url><loc>https://seconize.co/blog/auto-remediate/</loc><lastmod>2021-07-22T12:12:16+00:00</lastmod></url><url><loc>https://seconize.co/blog/how-startups-build-security-posture/</loc><lastmod>2021-12-18T06:56:22+00:00</lastmod></url><url><loc>https://seconize.co/blog/cyber-security-services-vs-product/</loc><lastmod>2022-01-07T08:44:15+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/whats-the-roi-of-our-cybersecurity-investments/</loc><lastmod>2022-05-12T13:29:01+00:00</lastmod></url><url><loc>https://seconize.co/blog/9-reasons-to-migrate-from-tvm-to-drc/</loc><lastmod>2022-05-25T11:15:58+00:00</lastmod></url><url><loc>https://seconize.co/blog/how-to-design-a-vulnerability-management-program/</loc><lastmod>2022-05-25T10:51:10+00:00</lastmod></url><url><loc>https://seconize.co/blog/3-steps-to-shift-from-detect-to-predict-breach/</loc><lastmod>2022-05-25T06:07:29+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-centre-part-1/</loc><lastmod>2022-06-14T13:48:05+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/seconize-derisk-centre-part-2/</loc><lastmod>2022-06-15T07:55:53+00:00</lastmod></url><url><loc>https://seconize.co/blog/firefighting-in-the-digital-realm-it-teams-battling-vulnerabilities/</loc><lastmod>2024-03-03T05:20:56+00:00</lastmod></url><url><loc>https://seconize.co/blog/vulnerability-management/</loc><lastmod>2024-02-28T06:23:16+00:00</lastmod></url><url><loc>https://seconize.co/blog/risk-based-vulnerability-management-2/</loc><lastmod>2024-02-15T06:41:36+00:00</lastmod></url><url><loc>https://seconize.co/blog/open-sourcing-of-custom-applications/</loc><lastmod>2024-02-07T07:10:15+00:00</lastmod></url><url><loc>https://seconize.co/blog/migration-of-java-applications/</loc><lastmod>2024-02-04T07:20:32+00:00</lastmod></url><url><loc>https://seconize.co/grc/organizations-face-an-array-of-cybersecurity-threats-and-regulatory-requirements-to-navigate-these-complexities-information-security-infosec-teams-adopt-governance-risk-and-compliance-grc-fram/</loc><lastmod>2024-07-10T17:42:11+00:00</lastmod></url><url><loc>https://seconize.co/grc/why-excel-falls-short-in-cybersecurity-the-case-for-risk-based-vulnerability-management/</loc><lastmod>2024-07-11T21:13:13+00:00</lastmod></url><url><loc>https://seconize.co/grc/managing-cybersecurity-audits-and-compliance/</loc><lastmod>2024-07-11T21:31:29+00:00</lastmod></url><url><loc>https://seconize.co/grc/compliance-audit-management-challenges/</loc><lastmod>2024-07-11T21:36:47+00:00</lastmod></url><url><loc>https://seconize.co/grc/sebi-cybersecurity-and-cyber-resilience-framework-cscrf-announcement/</loc><lastmod>2024-07-11T21:42:15+00:00</lastmod></url><url><loc>https://seconize.co/grc/sebis-new-framework-for-regulated-entities/</loc><lastmod>2024-07-11T22:06:41+00:00</lastmod></url><url><loc>https://seconize.co/grc/automation-in-compliance-audit-management/</loc><lastmod>2024-07-11T22:15:18+00:00</lastmod></url><url><loc>https://seconize.co/grc/rbi-master-direction-on-information-technology/</loc><lastmod>2024-07-11T22:29:04+00:00</lastmod></url><url><loc>https://seconize.co/grc/sebi-framework-for-adoption-of-cloud-services/</loc><lastmod>2024-07-11T22:30:38+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/different-types-of-cyber-risks/</loc><lastmod>2024-07-11T22:35:45+00:00</lastmod></url><url><loc>https://seconize.co/blog/grc-engineering-the-future-of-governance-risk-and-compliance/</loc><lastmod>2018-12-12T11:18:16+00:00</lastmod></url><url><loc>https://seconize.co/grc/the-sellers-guide-to-proactive-cybersecurity-best-practices-for-ma-success/</loc><lastmod>2024-07-17T20:10:59+00:00</lastmod></url><url><loc>https://seconize.co/grc/part-2-the-cyber-risk-assessments-in-m-and-a/</loc><lastmod>2024-07-17T20:17:00+00:00</lastmod></url><url><loc>https://seconize.co/grc/cyber-risk-assessments/</loc><lastmod>2024-07-17T20:23:28+00:00</lastmod></url><url><loc>https://seconize.co/case-studies/black-swan-in-cybersecurity/</loc><lastmod>2024-07-19T13:22:13+00:00</lastmod></url><url><loc>https://seconize.co/blog/cybersecurity-and-cyber-resilience-framework/</loc><lastmod>2024-08-21T06:23:33+00:00</lastmod></url><url><loc>https://seconize.co/in-the-news/sebi-cyber-capability-index-cci/</loc><lastmod>2024-08-21T07:11:04+00:00</lastmod></url><url><loc>https://seconize.co/blog/request-for-proposal-template-for-a-grc-product/</loc><lastmod>2024-09-16T05:55:41+00:00</lastmod></url><url><loc>https://seconize.co/blog/service-level-agreements-in-cybersecurity/</loc><lastmod>2024-09-26T14:52:31+00:00</lastmod></url><url><loc>https://seconize.co/blog/unpacking-the-security-controls-framework-scf/</loc><lastmod>2024-09-26T14:59:26+00:00</lastmod></url><url><loc>https://seconize.co/blog/demystifying-the-zoo-of-cyber-risks/</loc><lastmod>2024-09-26T15:06:29+00:00</lastmod></url><url><loc>https://seconize.co/blog/third-party-risk-management/</loc><lastmod>2024-10-23T08:30:34+00:00</lastmod></url><url><loc>https://seconize.co/blog/understanding-sebis-guidelines-on-outsourcing/</loc><lastmod>2024-10-23T08:36:17+00:00</lastmod></url><url><loc>https://seconize.co/blog/the-cyber-grc-automation-paradox/</loc><lastmod>2024-10-25T06:40:56+00:00</lastmod></url><url><loc>https://seconize.co/blog/navigating-irdai-cyber-security-guidelines/</loc><lastmod>2024-10-25T06:44:23+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/understanding-isms/</loc><lastmod>2024-11-11T08:10:56+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/illusion-of-tick-box-compliance/</loc><lastmod>2024-11-25T06:19:18+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/art-of-grc-audits/</loc><lastmod>2024-11-25T06:28:28+00:00</lastmod></url><url><loc>https://seconize.co/rbvm/it-audit-planning-guide/</loc><lastmod>2024-12-02T05:43:19+00:00</lastmod></url><url><loc>https://seconize.co/blog/plugging-control-gaps/</loc><lastmod>2024-12-09T05:55:48+00:00</lastmod></url><url><loc>https://seconize.co/blog/proposal-template-for-a-grc-product/</loc><lastmod>2024-12-16T05:35:48+00:00</lastmod></url><url><loc>https://seconize.co/blog/security-isnt-a-speed-breaker-cybersecurity-and-sustainable-success/</loc><lastmod>2024-12-23T05:55:42+00:00</lastmod></url><url><loc>https://seconize.co/blog/third-party-risk-management-2/</loc><lastmod>2024-12-30T07:24:36+00:00</lastmod></url><url><loc>https://seconize.co/blog/sebi-cscrf-date-extended/</loc><lastmod>2025-01-03T06:59:15+00:00</lastmod></url><url><loc>https://seconize.co/blog/schrodingers-compliance-and-the-observer-effect-in-it-security/</loc><lastmod>2025-01-06T07:32:19+00:00</lastmod></url><url><loc>https://seconize.co/blog/comparing-grc-products/</loc><lastmod>2025-01-09T07:43:52+00:00</lastmod></url><url><loc>https://seconize.co/blog/tenali-rama-ciso-story/</loc><lastmod>2025-01-13T06:57:29+00:00</lastmod></url><url><loc>https://seconize.co/blog/request-for-proposal-thhhemplate-for-a-grc-product-cyber-governance-risk-and-compliance2/</loc><lastmod>2025-01-17T11:12:53+00:00</lastmod></url><url><loc>https://seconize.co/blog/cyber-risk-scoring/</loc><lastmod>2025-01-20T05:46:36+00:00</lastmod></url><url><loc>https://seconize.co/blog/isms-understanding/</loc><lastmod>2025-01-30T10:17:18+00:00</lastmod></url><url><loc>https://seconize.co/blog/unified-risk-management/</loc><lastmod>2025-02-03T06:28:59+00:00</lastmod></url><url><loc>https://seconize.co/blog/the-seesaw-effect/</loc><lastmod>2025-02-10T06:54:37+00:00</lastmod></url><url><loc>https://seconize.co/blog/vulnerability-management-2/</loc><lastmod>2025-02-17T06:55:39+00:00</lastmod></url><url><loc>https://seconize.co/blog/tackling-misaligned-compliance-efforts/</loc><lastmod>2025-02-24T05:51:06+00:00</lastmod></url><url><loc>https://seconize.co/blog/grc-workflows-as-an-orchestra/</loc><lastmod>2025-03-03T07:29:44+00:00</lastmod></url><url><loc>https://seconize.co/blog/the-six-blind-men-and-the-security-elephant-a-case-for-unified-controls-framework/</loc><lastmod>2025-03-10T06:14:38+00:00</lastmod></url><url><loc>https://seconize.co/blog/reframing-cybersecurity-audits/</loc><lastmod>2025-03-17T04:54:44+00:00</lastmod></url><url><loc>https://seconize.co/blog/karma-and-vulnerabilities/</loc><lastmod>2025-03-24T08:08:45+00:00</lastmod></url><url><loc>https://seconize.co/blog/cybersecurity-and-cyber-resilience-framework-deadline/</loc><lastmod>2025-03-31T06:00:45+00:00</lastmod></url><url><loc>https://seconize.co/blog/super-wicked-problems-in-the-context-of-cybersecurity/</loc><lastmod>2025-04-07T04:56:24+00:00</lastmod></url><url><loc>https://seconize.co/blog/how-small-vulnerabilities-lead-to-massive-breaches/</loc><lastmod>2025-04-14T05:42:57+00:00</lastmod></url><url><loc>https://seconize.co/blog/compliance-monitoring/</loc><lastmod>2025-04-21T05:37:19+00:00</lastmod></url><url><loc>https://seconize.co/blog/the-five-monkeys-and-the-compliance-trap/</loc><lastmod>2025-05-12T09:35:53+00:00</lastmod></url><url><loc>https://seconize.co/blog/proactive-vulnerability-management/</loc><lastmod>2025-05-26T06:14:55+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/types-of-cyber-risks/</loc><lastmod>2025-06-02T06:58:11+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/sbom/</loc><lastmod>2025-06-09T06:19:42+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/faqs-on-cybersecurity-and-cyber-resilience-framework/</loc><lastmod>2025-06-12T13:59:41+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/vulnerability-management-trilemma/</loc><lastmod>2025-06-16T07:13:38+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/irctc-vulnerability/</loc><lastmod>2025-06-19T04:44:11+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/seconize-researchers-discover-and-responsibly-disclose-critical-irctc-vulnerability-exposing-user-data/</loc><lastmod>2025-06-19T05:18:29+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/extension-towards-adoption-and-implementation-of-cscrf-for-sebi-res/</loc><lastmod>2025-07-01T06:04:02+00:00</lastmod></url><url><loc>https://seconize.co/uncategorized/cert-ins-comprehensive-cyber-security-audit-policy-guidelines/</loc><lastmod>2025-07-26T07:05:33+00:00</lastmod></url><url><loc>https://seconize.co/blog/a-case-for-risk-assessment-in-vulnerability-management/</loc><lastmod>2025-08-11T05:43:52+00:00</lastmod></url><url><loc>https://seconize.co/blog/certin-sbom-implementation-free-template/</loc><lastmod>2025-08-11T09:29:17+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-2-2/</loc><lastmod>2025-12-05T06:36:26+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-1-7/</loc><lastmod>2025-07-24T11:37:10+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-1-8/</loc><lastmod>2025-08-10T11:08:02+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-1-9/</loc><lastmod>2025-09-09T11:08:10+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-1-9-v3-2-0/</loc><lastmod>2025-10-10T09:08:16+00:00</lastmod></url><url><loc>https://seconize.co/blog/migrating-from-cisco-vulnerability-management-kenna-to-seconize-derisk-center/</loc><lastmod>2025-12-12T07:32:42+00:00</lastmod></url><url><loc>https://seconize.co/blog/cisco-vulnerability-management/</loc><lastmod>2025-12-12T07:45:18+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-2-3/</loc><lastmod>2025-12-19T07:46:30+00:00</lastmod></url><url><loc>https://seconize.co/blog/seconize-derisk-center-release-notes-v3-2-4/</loc><lastmod>2025-12-24T07:51:20+00:00</lastmod></url></urlset>
