<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Core pages -->
  <url><loc>https://threatport.com/</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
  <url><loc>https://threatport.com/about</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://threatport.com/contact</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs</loc><lastmod>2026-05-08</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>

  <!-- Legal -->
  <url><loc>https://threatport.com/privacy</loc><lastmod>2026-05-08</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://threatport.com/terms</loc><lastmod>2026-05-08</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://threatport.com/cookies</loc><lastmod>2026-05-08</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://threatport.com/refunds</loc><lastmod>2026-05-08</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>

  <!-- Docs: Email Security -->
  <url><loc>https://threatport.com/docs/how-to-dmarc</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-spf</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-dkim-on-google-workspace</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-dkim-on-microsoft-365</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-dmarc-on-exchange-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-fix-spf-permerror-too-many-dns-lookups</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-read-dmarc-aggregate-reports</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/spf-record-generator-build-your-record-step-by-step</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prevent-email-spoofing-spf-dkim-dmarc</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-detect-phishing-emails-it-admin-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-email-forwarding-securely</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/email-security-checklist-for-it-admins</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-anti-spam-filters-on-microsoft-365</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-block-spoofed-emails-in-google-workspace</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Web Server Security -->
  <url><loc>https://threatport.com/docs/how-to-install-nginx-on-ubuntu-22-04-24-04</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-nginx-complete-hardening-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-ssl-tls-on-nginx</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-reverse-proxy-with-nginx</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-rate-limiting-on-nginx</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/nginx-performance-tuning-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-install-apache-on-ubuntu</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-apache-hardening-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-ssl-tls-on-apache</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-mod-security-on-apache</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/apache-htaccess-security-rules-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/apache-vs-nginx-which-should-you-use</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-iis-on-windows-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-ssl-on-iis</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/iis-security-hardening-checklist</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-request-filtering-on-iis</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/http-security-headers-complete-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/hsts-implementation-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/content-security-policy-csp-deep-dive</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cors-misconfiguration-how-to-detect-and-fix</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cookie-security-flags-secure-httponly-samesite</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-implement-rate-limiting-on-your-api</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: OS Hardening -->
  <url><loc>https://threatport.com/docs/how-to-harden-ubuntu-server-complete-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-ufw-firewall-on-ubuntu</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-ssh-key-authentication</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-disable-root-login-on-linux</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-fail2ban-for-brute-force-protection</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-automatic-security-updates-on-ubuntu</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-check-open-ports-on-linux-ss-netstat-nmap</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/linux-file-permissions-explained-chmod-chown</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-auditd-for-security-monitoring</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-apparmor-on-ubuntu</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/crontab-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-harden-centos-rocky-linux</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-firewalld-on-centos</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-selinux-practical-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-yum-dnf-automatic-updates</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/windows-server-2022-security-hardening-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-windows-firewall-with-advanced-security</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-group-policy-for-security</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-bitlocker-on-windows-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-disable-smbv1-on-windows-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/windows-event-log-monitoring-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-windows-server-core-minimal-installation</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-windows-defender-on-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-laps-local-admin-password-solution</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/active-directory-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/macos-security-hardening-for-enterprise</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-filevault-encryption</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-macos-firewall</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Network Security -->
  <url><loc>https://threatport.com/docs/dns-record-types-explained-a-aaaa-cname-mx-txt-ns</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-dns-with-dnssec</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prevent-dns-spoofing-and-cache-poisoning</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-dns-over-https-doh-and-dns-over-tls-dot</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-pi-hole-for-network-wide-ad-and-threat-blocking</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-detect-dns-tunneling</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-ssl</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/tls-1-2-vs-tls-1-3-what-changed-and-why</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-certificate-transparency-and-why-it-matters</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-lets-encrypt-with-certbot</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-generate-and-manage-self-signed-certificates</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ssl-tls-cipher-suite-configuration-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-certificate-pinning</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-iptables-on-linux</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-pfsense-firewall-beginner-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-nftables-iptables-replacement</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/firewall-rules-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/network-segmentation-why-and-how</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-detect-rogue-devices-on-your-network</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/whois-and-rdap-domain-registration-lookup-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-wireguard-vpn</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-openvpn-server</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/wireguard-vs-openvpn-which-to-choose</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/vpn-vs-zero-trust-what-s-the-difference</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-split-tunneling-securely</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/open-port-scanning-what-it-reveals-about-your-security</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-network-monitoring-with-zabbix</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-monitor-network-traffic-with-wireshark</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/intrusion-detection-snort-vs-suricata</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Cloud Security -->
  <url><loc>https://threatport.com/docs/aws-s3-bucket-security-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-aws-iam-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/aws-security-group-configuration-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-aws-cloudtrail-for-audit-logging</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-detect-public-s3-buckets</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/aws-shared-responsibility-model-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/azure-security-checklist-for-it-teams</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-azure-network-security-groups-nsg</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/azure-active-directory-security-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-enable-microsoft-defender-for-cloud</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/azure-key-vault-managing-secrets-securely</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/gcp-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-gcp-firewall-rules</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-gcp-audit-logging</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/gcp-iam-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cloud-security-posture-management-cspm-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prevent-cloud-misconfigurations</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/multi-cloud-security-challenges-and-solutions</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-serverless-functions-lambda-azure-functions</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cloud-vs-on-premise-security-key-differences</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Threat Intelligence & Vulnerability Management -->
  <url><loc>https://threatport.com/docs/understanding-cve-scores-cvss-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-a-zero-day-vulnerability</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-a-vulnerability-management-program</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/owasp-top-10-explained-2021-edition</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prioritize-vulnerability-remediation</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-exploit-development-understanding-poc-vs-weaponized</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-find-subdomain-takeover-vulnerabilities</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/typosquatting-how-attackers-impersonate-your-brand</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prevent-sql-injection</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prevent-cross-site-scripting-xss</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-a-man-in-the-middle-attack</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-attackers-use-social-engineering</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-credential-stuffing-and-how-to-prevent-it</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/supply-chain-attacks-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-external-attack-surface-management-easm</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://threatport.com/docs/mitre-att-ck-framework-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/indicators-of-compromise-ioc-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-read-a-threat-intelligence-report</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cyber-kill-chain-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/threat-actor-types-nation-state-criminal-hacktivist</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/api-key-security-how-to-prevent-credential-leaks</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-detect-exposed-credentials-on-github</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/password-security-best-practices-for-organizations</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-credential-exposure-monitoring</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Compliance -->
  <url><loc>https://threatport.com/docs/iso-27001-and-external-security-what-controls-apply</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/nist-cybersecurity-framework-2-0-practical-overview</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/soc-2-type-ii-what-it-teams-need-to-know</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/pci-dss-requirements-simplified</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cis-controls-implementation-guide-for-it-teams</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/gdpr-for-it-teams-practical-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/kvkk-compliance-checklist</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/hipaa-security-rule-it-requirements</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/nis2-directive-what-eu-organizations-need-to-know</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-prepare-for-a-security-audit</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/risk-assessment-methodology-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-write-a-security-policy</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/incident-response-plan-template-and-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/business-continuity-planning-for-it</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: DevOps & CI/CD -->
  <url><loc>https://threatport.com/docs/docker-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-scan-docker-images-for-vulnerabilities</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/kubernetes-security-hardening-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-pod-security-standards-in-kubernetes</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/container-runtime-security-containerd-vs-gvisor</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-secure-a-ci-cd-pipeline</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/github-actions-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/gitlab-ci-cd-security-configuration</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-implement-sast-and-dast-in-your-pipeline</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-sign-and-verify-container-images</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/terraform-security-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-scan-terraform-for-misconfigurations</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ansible-security-hardening-playbooks</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/infrastructure-as-code-security-checklist</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/git-security-preventing-credential-leaks</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-use-github-secret-scanning</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/pre-commit-hooks-for-security</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/dependency-scanning-finding-vulnerable-libraries</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-dependabot-for-security-updates</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: IAM -->
  <url><loc>https://threatport.com/docs/multi-factor-authentication-mfa-complete-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-implement-zero-trust-architecture</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/single-sign-on-sso-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ldap-vs-saml-vs-oauth-vs-oidc-when-to-use-which</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/password-policy-best-practices-for-organizations</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/privileged-access-management-pam-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-radius-authentication</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/role-based-access-control-rbac-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-implement-least-privilege-access</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-just-in-time-jit-access</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Monitoring & Incident Response -->
  <url><loc>https://threatport.com/docs/siem-explained-what-it-is-and-how-it-works</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-centralized-logging-with-elk-stack</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-configure-syslog-on-linux</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/log-management-best-practices</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-set-up-alerting-with-prometheus-and-grafana</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/security-monitoring-checklist-for-small-teams</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/incident-response-101-step-by-step-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-investigate-a-security-breach</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ransomware-response-playbook</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/phishing-incident-response-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-conduct-a-post-incident-review</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/digital-forensics-basics-for-it-teams</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-preserve-evidence-after-a-breach</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: IT Fundamentals & Career -->
  <url><loc>https://threatport.com/docs/what-is-a-firewall-and-how-does-it-work</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-encryption-symmetric-vs-asymmetric-explained</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/tcp-ip-explained-for-beginners</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-a-proxy-server-and-how-does-it-work</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/subnetting-explained-a-visual-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-nat-network-address-translation</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/http-vs-https-what-s-the-difference</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-an-ssl-certificate-and-how-does-it-work</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/what-is-a-cdn-and-how-does-it-work</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-start-a-career-in-cybersecurity</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/top-cybersecurity-certifications-in-2026</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/soc-analyst-what-the-job-actually-looks-like</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/penetration-tester-career-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ciso-career-path-from-analyst-to-executive</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/cybersecurity-interview-questions-and-answers</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/free-cybersecurity-training-resources</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/nmap-cheat-sheet-essential-commands</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/wireshark-for-beginners-packet-analysis-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/burp-suite-basics-getting-started</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/metasploit-framework-beginner-guide</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-use-cyberchef-for-data-analysis</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/shodan-what-it-is-and-how-to-use-it-safely</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/how-to-use-theharvester-for-reconnaissance</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>

  <!-- Docs: Industry & Research -->
  <url><loc>https://threatport.com/docs/state-of-external-attack-surface</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://threatport.com/docs/most-common-security-misconfigurations-we-found-this-quarter</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://threatport.com/docs/email-security-adoption-rates</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ssl-certificate-trends-what-our-data-shows</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/major-data-breaches-of-2026-lessons-learned</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/security-predictions-for-2027</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/ai-in-cybersecurity-opportunities-and-risks</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://threatport.com/docs/the-rise-of-easm-why-attack-surface-management-matters-now</loc><lastmod>2026-05-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>

</urlset>
