<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.core6.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.core6.com/blog/</loc>
		<lastmod>2026-04-12T12:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.core6.com/blog/what-is-configuration-drift/</loc>
		<lastmod>2024-04-24T15:45:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/02/drift-boat-small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/gartner-calls-for-storage-backup-hardening-to-combat-ransomware/</loc>
		<lastmod>2025-10-23T04:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/07/LinkedIn-Images-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/top-15-security-controls-for-storage-backup-systems/</loc>
		<lastmod>2025-10-23T04:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/04/Blog-post-Top-15-Security-Controls.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/customer-story-securing-national-banks-last-line-of-defense/</loc>
		<lastmod>2025-10-23T04:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/05/Blog-Post-Case-Study-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/05/Picture1-blog-post-14.5.25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/05/Picture2-blog-post-14.5.25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/05/Case-Study-Blog-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-cisos-guide-to-cyber-recovery/</loc>
		<lastmod>2025-10-23T04:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/01/LinkedIn-Ads-2025-01-02T122315.806.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/01/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/01/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backups-under-attack-6-things-to-do-about-it/</loc>
		<lastmod>2025-10-23T04:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/02/Blog-Post-main-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/02/Blog-Post-Backups-Under-Attack-Image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/02/Dennis-Hahn-Omdia-quote-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/02/MR11-The-Storage-Managers-Guide-to-Ransomware-Resiliency-1-1024x643.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storage-data-protection-trends-innovations-to-watch-in-2025/</loc>
		<lastmod>2025-10-23T04:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/Trend-Innovations-to-watch-in-2025.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/securityweek_logo-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/03/cso-logo-1-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/securityweek_logo-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storage-backups-under-attack-this-is-what-to-do-about-it/</loc>
		<lastmod>2025-10-23T04:07:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/LinkedIn-Ads-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Breaking-News-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/linked-in-cover-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Dennis-Hahn-Omdia-quote.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Turquoise-Simple-Modern-Linkedin-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backup-blog-bites-5-building-a-solid-backup-asset-inventory/</loc>
		<lastmod>2025-10-23T04:07:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/05/Backup-Blog-Bites-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/05/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/05/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-cisos-guide-to-storage-backup-cyber-resiliency/</loc>
		<lastmod>2025-10-23T04:07:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/12/CISO-Guide-blog-post-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/top-4-predictions-for-storage-and-backup-security-in-2023/</loc>
		<lastmod>2025-10-23T04:07:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/2023-predictions-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/Capture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/6-steps-to-ensure-compliance-for-your-storage-backup-systems/</loc>
		<lastmod>2025-10-23T04:07:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/Joel-Fulton-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/gartner-shines-a-light-on-storage-security/</loc>
		<lastmod>2025-10-23T04:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/gartner-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/why-storage-security-can-no-longer-be-left-unattended/</loc>
		<lastmod>2025-10-23T04:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/05/shutterstock_161893277-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/emmanuel-ikwuegbu-h5xEHzfepNk-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Read-chapter-2-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/five-common-storage-security-misconfigurations/</loc>
		<lastmod>2025-10-23T04:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/01/iStock_000020680047_ExtraSmall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/06/dsa_ticket_example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/06/dsa_conf_change_log_rep_example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/misconfigurations-lead-to-a-lawsuit/</loc>
		<lastmod>2025-10-23T04:07:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/02/bbandt1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/is-your-it-environment-resilient-to-the-coronavirus/</loc>
		<lastmod>2025-10-23T04:07:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/03/Mar20_05_1207693087.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/container-technology-container-orchestration-resilience/</loc>
		<lastmod>2025-10-23T04:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/06/containers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/look-where-youre-going-said-mom/</loc>
		<lastmod>2025-10-23T04:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/05/mom-blog1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/shift-left-to-get-resilience-right/</loc>
		<lastmod>2025-10-23T04:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/07/shifting-left-blogX1200-e1567933355192.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/07/res-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/early-proactive-testing-assures-resilience-in-the-cloud/</loc>
		<lastmod>2025-10-23T04:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/08/changes-ahead.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-lesson-of-the-black-friday-outages-it-resilience-is-paramount/</loc>
		<lastmod>2025-10-23T04:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/11/black-friday-2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/farewell-to-2018-in-2019-lets-conquer-the-it-resilience-challenge/</loc>
		<lastmod>2025-10-23T04:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/12/greetings_20191.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-story-of-the-irss-11-hour-outage-on-tax-day-2018/</loc>
		<lastmod>2025-10-23T04:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/01/irs-outage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/stories-we-tell-and-the-real-reasons-for-it-outages/</loc>
		<lastmod>2025-10-23T04:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/11/StoriesWeTell-board22.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/configuration-validation-automation-a-hidden-availabilityguard-gem/</loc>
		<lastmod>2025-10-23T04:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/09/SDDC_450x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-meet-regulatory-expectations-for-cyber-resilience/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/06/regulatory-and-compliance-word-cloud-672x372.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/a-what-if-analysis-that-prevents-unplanned-maintenance-related-outages/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/09/san-what-if-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/09/san-what-if-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/09/san-what-if.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/outages-at-airlines-and-airports-why/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/06/Picture21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/banking-in-a-time-of-it-transition/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/01/out-of-order_180117_2_830X450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-pace-of-innovation-how-do-you-keep-up-with-it/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/07/pace-of-innovation-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/07/azure-az.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/ensuring-resilience-assurance-for-insurers/</loc>
		<lastmod>2025-10-23T04:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/09/Insurance-Terms-Glossary-Dictionary.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-tech-behind-the-worlds-biggest-delivery-operation-on-christmas-eve/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/12/xmax_0001_Layer-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/a-four-point-strategy-for-tackling-it-emergencies/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/10/emergency9-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/election-day-meltdown-at-the-polls/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/11/US-elections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-state-of-the-private-cloud/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/11/The-State-of-the-Cloud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/11/risk-per-environment.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/11/shop-type.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/2016-top-picks/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/12/greetings_201606.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/are-banking-outages-inevitable/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/01/out-of-order_180117_2_830X450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-mobile-operators-can-ensure-service-availability/</loc>
		<lastmod>2025-10-23T04:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/02/telecom-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-season-of-it-forgiveness-and-how-to-avoid-it/</loc>
		<lastmod>2025-10-23T04:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/09/etsy-worldpay-outage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-prevent-outages-with-it-analytics-in-4-steps/</loc>
		<lastmod>2025-10-23T04:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/02/4-ways-IT-operations-analytics-prevent-outages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/inconsistent-san-io-configuration/</loc>
		<lastmod>2025-10-23T04:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/09/shifting-to-the-cloud-info.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-ensure-your-it-resilience/</loc>
		<lastmod>2025-10-23T04:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/04/Ensure-IT-Resilience_450X300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/04/Top-resilience-strategies.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/04/Top-challenges-Infographic-short.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/04/analytics-effectiveness.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/04/collaboration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/port-group-configuration-inconsistency-between-cluster-hosts/</loc>
		<lastmod>2025-10-23T04:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/08/hp-benchmark.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/to-outsource-it-operations-or-not-to-outsource/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/IT-Outsourcing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/comptia-4th-annual-trends-in-managed-services-5-638.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/comptia-4th-annual-trends-in-managed-services-8-638.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-software-defined-datacenter-is-here-sort-of/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/09/SDDC_450x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/09/Project-Plans.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/09/Confidence.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-avoid-configuration-drifts/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/10/21743144_s_450x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/what-can-it-operations-learn-from-self-driving-cars/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/11/self-driving-car.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/2015-most-popular-resources-list/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/12/BestOf2015_450X300_211215.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/become-an-infrastructure-hero/</loc>
		<lastmod>2025-10-23T04:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/12/Infratructure-HERO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/why-do-infrastructure-people-get-fired/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/06/infrastructure_fired_850.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/is-the-ground-shaking-beneath-your-it-infrastructure/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/06/IT-near-misses.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/3-vmware-storage-issues-you-want-to-avoid/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/05/450X300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/05/diagrams_d_6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-analytics-drive-it-operations-analytics-infographic/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/06/blog-_ITOA-infographic-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/06/ITOA-infographic-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/four-things-you-need-to-do-before-your-next-outage/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/06/IT-planning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-day-after-what-should-united-nyse-wsj-do-next/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/07/wallstreet-outage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/07/Causes-for-outages.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/is-it-the-end-of-five-nines-availability/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/07/five-nines-availability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/are-your-it-analytics-solving-yesterdays-problems/</loc>
		<lastmod>2025-10-23T04:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/Yesterday-IT-analytics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/use-of-analytics-by-company-size.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/IT-analytics-use-cases.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/risk1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-cost-of-data-loss-downtime-to-enterprises/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/12/the-cost-of-data-loss.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/12/disruption_causes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/infrastructure-mania-winner-announced/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/01/post12b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/what-does-it-take-to-be-an-infrastructure-master/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/02/post14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-it-operations-analytics-inoculate-against-outages/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/02/post15.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-stages-of-it-operations-analytics/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/03/image-blog_450x300-_4_250315.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/it-operations-turn-to-predictive-analytics/</loc>
		<lastmod>2025-10-23T04:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/04/image-blog_450x300-_6_250315.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/04/meet-vs-frequency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/04/ITOA-usage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-one-report-every-business-continuity-manager-is-asking-for/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2012/11/post4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2013/04/BC-dashboard-report-click.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/another-hidden-downtime-risk-that-will-come-back-to-bite-you/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2012/01/post6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/another-hidden-downtime-risk-that-can-come-back-to-bite-you/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/11/post3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/new-survey-enterprise-service-availability-business-continuity-benchmarks/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2012/03/post2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-spookiest-it-infrastructure-threats/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/10/post5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-top-10-cluster-availability-risks/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/10/post1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/6-steps-to-ensure-service-availability/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/11/post8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/are-you-ready-for-the-infrastructure-mania/</loc>
		<lastmod>2025-10-23T04:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/12/post-contest.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-escalating-war-on-enterprise-backups-and-how-to-fight-back/</loc>
		<lastmod>2025-12-23T14:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/09/LinkedIn-Images-2025-12-23T155611.599.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/ai-has-changed-the-rules-of-cyber-defense-how-to-respond/</loc>
		<lastmod>2026-01-19T14:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/LinkedIn-Images-11-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/AI-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/Banner-10-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/lessons-from-cisos-2026-infrastructure-security-outlook/</loc>
		<lastmod>2026-02-10T14:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/LinkedIn-Images-13-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/ciso.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/mark2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Rick2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Erdal2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Girish2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/matthew2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Gernette2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/bob2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/mark2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Girish2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/mats2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/guide-to-dora-and-its-impact-on-storage-backup-ict-assets-part-1/</loc>
		<lastmod>2026-02-16T14:01:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/DORA-Blog-Post1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-demonstrate-backup-compliance-a-practical-guide/</loc>
		<lastmod>2026-02-16T14:02:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Veeam-Continuity-blog-post-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Watch-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Watch-002-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/five-backup-lessons-learned-from-the-unitedhealth-ransomware-attack/</loc>
		<lastmod>2026-02-16T14:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/Breaking-News-picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/dont-rely-on-immutable-backup-for-protection-against-ransomware/</loc>
		<lastmod>2026-02-16T14:07:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Blog-banner-Dont-Rely-On-Immutable-Backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/PowerProtect-DD-risk-example-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Myths-image-3-003.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Pic-for-blog-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/to-fight-ransomware-we-need-to-fill-the-cultural-gap/</loc>
		<lastmod>2026-02-16T14:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/05/Battle-of-the-sans-without-the-logo-or-badge-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/05/Battle-of-the-sans-without-the-logo-or-badge-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/05/Headlines-Picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-dummies-guide-to-ransomware-resiliency-for-enterprise-storage-backup/</loc>
		<lastmod>2026-02-16T14:07:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/06/The-dummies-picture-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/06/Picture1-dummies-blog-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/06/Picture2-dummies-blog-post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/exploited-and-exposed-storage-and-backup-systems-are-under-attack/</loc>
		<lastmod>2026-02-16T14:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/06/Blog-post-exploited-and-exposed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/five-reasons-why-storage-and-backup-are-cybersecuritys-weakest-links/</loc>
		<lastmod>2026-02-16T14:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/08/cyber-security-weakest-link.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/top-8-most-common-storage-misconfigurations-and-vulnerabilities/</loc>
		<lastmod>2026-02-16T14:18:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/storage-vendor-graph-005.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/Demographics-by-Storage-Vendor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/analyzing-the-security-of-dell-emc-storage-backup-systems-four-highlights/</loc>
		<lastmod>2026-02-16T14:19:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/04/Blog-image-3-002.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/when-why-and-how-to-create-a-secure-backup-strategy/</loc>
		<lastmod>2026-02-16T14:19:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/battle-of-backup1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/ai-security-for-storage-and-backup-systems-storageguard-mcp/</loc>
		<lastmod>2026-03-12T15:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/LinkedIn-Images-17-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/SG-AI-image-6-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/Banner-10-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/closing-gartner-automated-security-control-assessment-biggest-gap-storage-and-backup/</loc>
		<lastmod>2026-03-08T13:43:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/03/LinkedIn-Images-19-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/securing-ai-storage-how-storageguard-hardens-nvidia-accelerated-vast-data/</loc>
		<lastmod>2026-03-17T09:22:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/03/LinkedIn-Images-18-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/03/Twitter-Header-Banner-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/cyberstorage-comes-of-age-why-security-posture-management-is-critical-for-storage-and-backup/</loc>
		<lastmod>2026-03-30T09:32:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/03/LinkedIn-Images-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-seven-habits-of-effective-it-executives/</loc>
		<lastmod>2026-04-06T16:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/Effective-IT-Executives.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/2-who-tracks-KPIs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/3-most-common-KPIs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/08/5-way-to-improve-operational-excellence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/itoa-coming-of-age/</loc>
		<lastmod>2026-04-06T17:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/weather_450x300_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/Wikibon-big-data-forecast.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/jobgraph.png.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/traffic1-177x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/traffic2-202x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/traffic3-176x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/Weather1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/Weather2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/03/weather3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/service-outages-the-way-forward/</loc>
		<lastmod>2026-04-06T17:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/08/IT-Service-Outage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/what-can-airlines-learn-from-banks-and-insurers/</loc>
		<lastmod>2026-04-06T17:58:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/02/airline-outages.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/02/risk-posture-full.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/best-practice-guide-meeting-backup-requirements-for-cyber-insurance-coverage/</loc>
		<lastmod>2026-04-06T18:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Meeting-Backup-Requirements-for-Cyber-Insurance-Coverage-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Backup-and-Recovery-Policies-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Picture11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Information-Systems-Protection-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Data-backups-are-performed-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Has-this-been-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Do-you-have-a-backup-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Basic-Risk-Questions-Picture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Please-describe-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Redundancy-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Business-Impact-Picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/02/Continuity-Video-Covers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/dual-authorization-in-storage-and-backup-systems-a-technical-guide/</loc>
		<lastmod>2026-04-06T18:06:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Blog-Post-Image-Dual-Authorization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/image-12.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-real-reason-airline-and-other-systems-go-down/</loc>
		<lastmod>2026-04-07T12:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/08/delta-outage-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/gearing-up-for-gartner-it-symposium-xpo-in-october/</loc>
		<lastmod>2026-04-07T13:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/09/gartner-invitation-XPO1-with-booth-number.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/howm-i-doin-the-numbers-please/</loc>
		<lastmod>2026-04-07T13:34:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/10/130220-how-im-doin-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/08/slide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-road-to-recovery-starts-well-before-a-cyberattack-ever-occurs/</loc>
		<lastmod>2026-04-07T13:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/11/road-to-recovery.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/ransomware-is-real-ask-travelex-but-not-now-theyre-too-busy-trying-to-recover/</loc>
		<lastmod>2026-04-07T13:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/01/travelex.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/extreme-times-call-for-intelligent-measures/</loc>
		<lastmod>2026-04-07T13:36:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/04/extreme-times.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storageguard-now-enables-automatic-storage-security-risk-remediation-and-change-tracking/</loc>
		<lastmod>2026-04-07T13:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/07/cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/cs-dell-emc-powermax-benchmark-cs-dell-emc-vmax-benchmark/</loc>
		<lastmod>2026-04-07T13:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/07/cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/cs-dell-emc-powermax-benchmark-cs-dell-emc-vmax-benchmark-2/</loc>
		<lastmod>2026-04-07T13:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/07/cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/nist-sp-800-209-security-guidelines-for-storage-infrastructure/</loc>
		<lastmod>2026-04-07T13:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/08/nist.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/4-predictions-for-storage-and-backup-security-in-2022/</loc>
		<lastmod>2026-04-07T13:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/shutterstock_2051876483.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/duotone-18-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storageguard-vs-rapid7-insightvm-a-comprehensive-comparison/</loc>
		<lastmod>2026-04-07T13:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/08/InsightVM-V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backup-blog-bites-3-the-backup-immutability-dos-donts-checklist/</loc>
		<lastmod>2026-04-07T13:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/Backup-Blog-Bites-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/beyond-the-vault-hardening-your-backups-for-cyber-resilience/</loc>
		<lastmod>2026-04-07T14:42:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/LinkedIn-Images-10-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/meet-the-one-click-resiliency-snapshot-report/</loc>
		<lastmod>2026-04-07T14:49:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/10/Resiliency-Snapshot-Report.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/11/Infrastructure-Resiliency-Snapshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/new-data-protection-methods-and-the-impact-on-securing-storage-backup/</loc>
		<lastmod>2026-04-07T14:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/CISO-Point-of-View-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/dont-rely-on-your-storage-backup-vendors-for-security/</loc>
		<lastmod>2026-04-07T14:50:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/a-driver-1309385-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/driving-1470169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-storage-managers-quick-guide-to-ransomware-resiliency-part-2/</loc>
		<lastmod>2026-04-07T14:52:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/09/Joel-Reich-Blog-Post-V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-storage-managers-quick-guide-to-ransomware-resiliency/</loc>
		<lastmod>2026-04-07T14:52:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/09/Joel-Reich-Blog-Post-V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storage-backup-log4j-vulnerability-status/</loc>
		<lastmod>2026-04-11T07:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/LinkedIn-whitepaper-ads-Centralized.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/log4shell-impact-on-storage-backup-systems/</loc>
		<lastmod>2026-04-11T07:28:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/LinkedIn-whitepaper-ads-Centralized.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/whats-wrong-with-storage-and-backup-ransomware-protection-capabilities/</loc>
		<lastmod>2026-04-11T07:46:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/battle-of-backup1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/challenging-to-maintain-complex-hybrid-it-environments-of-airlines-have-potential-misconfigurations-which-can-lead-to-outages/</loc>
		<lastmod>2026-04-11T07:47:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/09/Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/09/Picture2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/securing-enterprise-storage-and-backup-systems-how-to-establish-an-effective-business-case-and-get-management-support/</loc>
		<lastmod>2026-04-11T07:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/startae-team-36Aai16fubc-unsplash-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Blinders.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Dick-Wilkinson-pic-2-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/new-mexico-supreme-court-002.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/calling-all-enterprises-on-aws-get-a-free-14-day-availabilityguard-nxg-for-aws-trial-and-start-on-your-road-to-it-resilience-in-the-aws-cloud/</loc>
		<lastmod>2026-04-11T08:03:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/02/free-trial.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/6-things-financial-services-cisos-should-do-to-prepare-for-the-new-digital-operational-resilience-act-dora/</loc>
		<lastmod>2026-04-11T08:04:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/LinkedIn-Ads-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Breaking-News.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Analysis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/not-again-some-thoughts-and-useful-information-following-the-epic-facebook-outage-and-its-recent-mini-echo/</loc>
		<lastmod>2026-04-11T08:06:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/04/Facebook-shutterstock_1097373872_i.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storage-backup-security-in-the-financial-services-and-banking-sector-highlights-from-the-2021-survey-report/</loc>
		<lastmod>2026-04-11T08:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/538-003.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Banner-to-the-full-report.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Chart-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Chart-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Chart-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Chart-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/hidden-risks-critical-assets-why-its-time-to-rethink-the-security-of-your-storage-backup-systems/</loc>
		<lastmod>2026-04-11T08:08:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/04/Blog-Post-FS-ISAC-Presentation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/continuity-joins-dell-technologies-etc-program-to-help-protect-customers-storage-and-data-protection-systems/</loc>
		<lastmod>2026-04-11T08:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/03/Dell-Continuity-Blog-Post-Banner-V4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/03/Blog-Continuity-Joins-Dell-Technologies-ETC-Program.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-storageguard-helps-financial-institutions-meet-dora-requirements-for-storage-and-backup-systems/</loc>
		<lastmod>2026-04-11T09:54:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/LinkedIn-Images-3-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/DORA-post-AI-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/after-the-johnson-controls-ransomware-attack-heres-an-8-point-security-checklist-for-your-backups/</loc>
		<lastmod>2026-04-11T09:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/10/Johnson-Ransomware-Attack-V2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/10/Headlines-Picture-Johnson-Controls-International-Suffers-Massive-Ransomware-Attack-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/best-practices-for-setting-secure-configuration-baselines-for-your-storage-backup-systems-part1/</loc>
		<lastmod>2026-04-11T09:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/11/Best-Practices-blog-post-part1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/11/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-storageguard-can-assist-with-cisas-advised-mitigations-for-newly-emerged-blacksuit-ransomware/</loc>
		<lastmod>2026-04-11T09:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/CISA-Recommendations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/best-practices-for-setting-secure-configuration-baselines-for-your-storage-amp-backup-systems-part2/</loc>
		<lastmod>2026-04-11T09:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Blog-post-Image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Continuous-Secuirty-Improvment-Validating-Image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Image-2-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Image-3-002-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Image-4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/Image-5-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/12/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/are-your-backups-safe-from-ransomware/</loc>
		<lastmod>2026-04-11T09:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/04/Blog-Picture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/dell-and-core6-secure-insurance-firm-storage-backup-systems/</loc>
		<lastmod>2026-04-11T09:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/09/LinkedIn-Images-2025-12-23T155329.724.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/where-vulnerability-scanners-fall-short-securing-storage-and-backup-systems/</loc>
		<lastmod>2026-04-11T09:56:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/11/Blog-Image-Where-Vulnerability-Scanners-Fall-Short-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/11/image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/protecting-your-cloud-environment-from-outages-with-availabilityguard-6-4-release/</loc>
		<lastmod>2026-04-11T09:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/02/300X300_blog_CLOUD_2320215.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/chaos-or-control-take-charge-and-manage-the-resilience-of-your-mushrooming-cloud-environments/</loc>
		<lastmod>2026-04-11T09:57:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/10/mushrooms.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/10/evolution-cloud-1024x670.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/five-levels-of-configuration-baselines-roadmap-to-hardening-storage-backups/</loc>
		<lastmod>2026-04-11T09:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/10/LinkedIn-Images-86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/10/Why-config-baselines-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/10/Config-Tiered-Baselines2-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/a-practical-framework-for-solving-the-infosec-infrastructure-battle-over-enterprise-storage-security/</loc>
		<lastmod>2026-04-11T09:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/battle-of-sans-image-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/duotone-17-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/John-Meakin-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Marc-quote-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Ramaswamy-quote-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/trust-but-verify-the-challenge-with-outsourcing-security-of-your-storage-backups-to-msps/</loc>
		<lastmod>2026-04-11T10:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/07/Trust-But-Verify-Picture-V4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/07/State-of-storage-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/07/Jim-Brady-CISO-quote.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-new-battleground-why-storage-and-backup-systems-are-now-top-targets-for-cyber-threats/</loc>
		<lastmod>2026-04-11T10:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/05/The-New-Battlegound-Blog-Post-Image-V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/go-ahead-move-to-software-defined-storage-weve-got-your-back-configuratively-speaking/</loc>
		<lastmod>2026-04-11T10:03:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/08/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/catch-my-drift-how-to-easily-manage-configuration-drift-in-your-storage-backup-systems/</loc>
		<lastmod>2026-04-11T10:03:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/05/Blog-post-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/exploitable-storage-and-backup-vulnerabilities-a-growing-threat-to-enterprise-security/</loc>
		<lastmod>2026-04-11T10:03:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/08/Blog-image-Exploitable-Storage-and-Backup-Vulnerabilities-V2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/08/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/08/image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/security-baselines-for-enterprise-storage-systems-is-yours-being-followed/</loc>
		<lastmod>2026-04-11T10:04:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2013/09/6bulbs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/06/dsa_ticket_example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/06/dsa_analysis_summay-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/sec-alerts-financial-firms-to-risks-associated-with-storage-practices-for-sensitive-data/</loc>
		<lastmod>2026-04-11T10:05:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/06/SEC-alert.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-do-hackers-gain-access-to-your-core-data-storage-systems-may-be-the-weakest-link/</loc>
		<lastmod>2026-04-11T10:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/duotone-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Storage-security-tips-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backup-blog-bites-1-is-your-immutable-backup-vulnerable-to-time-spoofing-attacks/</loc>
		<lastmod>2026-04-11T10:07:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Backup-Blog-Bites.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Picture4-for-blog-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/cyber-resilience-a-critical-component-of-any-comprehensive-cyber-security-strategy/</loc>
		<lastmod>2026-04-11T10:07:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/02/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/how-to-keep-your-cyber-vault-and-backup-systems-hardened/</loc>
		<lastmod>2026-04-11T10:14:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/10/LinkedIn-Images-91.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backup-blog-bites-2-to-ad-or-not-to-ad-your-backup-system-that-is-the-question/</loc>
		<lastmod>2026-04-11T10:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/LinkedIn-Ads-43-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Faceoff-3-002-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/why-you-cannot-afford-it-infrastructure-glitches-this-holiday-season/</loc>
		<lastmod>2026-04-11T10:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2014/11/post9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/backup-blog-bites-4-how-to-validate-the-configuration-of-your-immutable-backups/</loc>
		<lastmod>2026-04-11T12:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/Backup-Blog-Bites-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/03/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/ciso-point-of-view-discover-how-other-cisos-deal-with-the-complexity-of-data-protection-and-storage-security/</loc>
		<lastmod>2026-04-11T12:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/Feature-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/Statistics-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/CISOs-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/lessons-from-enterprise-storage-leaders-2026-trends-threats-transformations/</loc>
		<lastmod>2026-04-11T12:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/LinkedIn-Images-15-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/Banner-2-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/storage-security-mythbusting-4-myths-cisos-still-believe-and-why-theyre-wrong/</loc>
		<lastmod>2026-04-11T12:31:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/shutterstock_340890053-Feature-image-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Designed-Myth-1-Title.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Designed-Myth-2-Title.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Designed-Myth-3-Title.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Designed-Myth-4-Title.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/gartner-promotes-the-need-for-heightened-storage-backup-security-to-combat-ransomware/</loc>
		<lastmod>2026-04-11T12:31:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/Gartner-cyberstorage-quote-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/Figure_1_Gartner-Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/the-most-critical-and-overlooked-security-issues-facing-financial-services/</loc>
		<lastmod>2026-04-11T12:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/01/Image-for-social.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/Hive-image-002.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/The-unspoken-gap-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/3D-Lego-Block-PowerPoint-Diagram-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/5-takeaways-from-the-new-gartner-hype-cycle-for-storage-data-protection-2022/</loc>
		<lastmod>2026-04-11T13:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/gartner-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/Picture1-gartner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/Picture2-gartner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/what-security-leaders-need-to-know-about-iso27040-storage-backup-security/</loc>
		<lastmod>2026-04-11T13:26:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/LinkedIn-Images-8-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/nis2-compliance-why-your-storage-backup-environment-matters-more-than-ever/</loc>
		<lastmod>2026-04-11T13:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/06/NIS2-Compliance-V2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/06/NIS2-Image-002.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/6-out-of-box-strategies-to-help-enterprise-security-pros-secure-their-storage/</loc>
		<lastmod>2026-04-11T13:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Storage-security-tips-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Erdal-Ozkaya.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Standard-Chartered-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/Read-Chapter-4-banner-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/is-your-it-infrastructure-ready-for-the-next-metallic-balloon/</loc>
		<lastmod>2026-04-11T14:18:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2017/03/oil-gas-fuel-manufacturing_830x450.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/3-steps-to-successfully-move-to-a-software-defined-datacenter/</loc>
		<lastmod>2026-04-11T14:19:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/06/SDDC-post.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/locking-down-backups-strengthening-security-posture-against-cyber-threats/</loc>
		<lastmod>2026-04-11T14:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/03/LinkedIn-Images-Blog-Post-March-2025.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/03/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/03/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/new-thinking-on-security-and-resilience-for-key-enterprise-storage-systems/</loc>
		<lastmod>2026-04-11T14:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/11/dsa-inner-core.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/virtualization-everything-is-different-nothing-has-changed/</loc>
		<lastmod>2026-04-11T14:21:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/11/virtualization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/validating-the-security-posture-of-cohesity-dataplatform-with-storageguard/</loc>
		<lastmod>2026-04-11T14:21:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/08/Cohesity-and-Continuity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/enhancing-enterprise-security-with-the-essential-eight-and-storageguard/</loc>
		<lastmod>2026-04-11T14:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/08/Blog-post-pic-Engancing-Enterprise-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/08/image-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/confronting-the-velocity-of-change-with-agile-it-operations/</loc>
		<lastmod>2026-04-11T14:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/01/blog11b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/sec-alerts-financial-firms-regarding-increased-risk-of-ransomware-attacks/</loc>
		<lastmod>2026-04-11T14:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/06/SEC-alert.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/blog/19-of-the-worst-it-outages-in-2019-a-recap-of-being-let-down/</loc>
		<lastmod>2026-04-12T12:56:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/12/1.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->