<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.core6.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.core6.com/resources/an-integrated-approach-to-handling-outage-risks-and-cyber-threats/</loc>
		<lastmod>2021-07-11T16:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/05/1d-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/bbva-improves-hadr-control/</loc>
		<lastmod>2021-07-12T12:38:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2012/11/iStock_000018280555_ExtraSmall.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/solution-datasheet-recoverguard/</loc>
		<lastmod>2021-07-12T12:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/03/RG_banner-1200x600-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/solution-datasheet-availabilityguard-nxg-for-hybrid-it/</loc>
		<lastmod>2021-07-12T12:47:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/04/AG-hybrid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/5-questions-to-ask-when-evaluating-an-it-outage-prevention-solution/</loc>
		<lastmod>2021-07-12T12:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/07/5_Questions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/products/availabilityguard-public-cloud/certsys/</loc>
		<lastmod>2021-07-13T10:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/09/Group-200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/products/availabilityguard-public-cloud/cloudzone/</loc>
		<lastmod>2021-07-13T10:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/09/Group-201.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-unspoken-gaps-data-storage-security-and-cyber-resilience/</loc>
		<lastmod>2021-11-08T10:23:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2019/06/gaps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-jim-brady-ciso-at-fairview-health-services/</loc>
		<lastmod>2022-11-07T13:34:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/James-Brady.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/rubrik-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2023-03-30T12:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/03/Rubrik-logo-V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/mythbusting-hey-i-got-it-covered-we-already-have-a-vulnerability-scanning-tool/</loc>
		<lastmod>2023-09-11T12:51:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/10/maxresdefault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-convergence-of-storage-security-key-implications-live-event/</loc>
		<lastmod>2023-12-21T11:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/12/InsightJam-V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/gil-hecht-ceo-of-continuity-at-cyber-resiliency-summit/</loc>
		<lastmod>2023-12-21T16:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/12/SiliconAngle-TheCube-video-screenshot-3-with-Gil-Hecht.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/dell-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/08/Dell_EMC_logo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/netapp-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/netapp-eps-vector-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/cisco-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/08/Cisco.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/veritas-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/01/Veritas_Technologies-Logo-V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ibm-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/08/ibm-logo-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/brocade-by-broadcom-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T15:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/brocade-logo-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/pure-storage-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T16:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/08/pure-storage-vector-logo-small.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/cohesity-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T16:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/07/cohesity-logo-new.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/commvault-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T16:22:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/08/Commvault-Logo-social.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/veeam-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-08-29T16:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/01/Veeam_logo-v3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/hitachi-common-vulnerabilities-and-exposures-cves/</loc>
		<lastmod>2024-09-01T16:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/09/Hitachi_Vantara_Logo-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/storage-data-protection-survey-results/</loc>
		<lastmod>2025-03-26T15:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/MR13_Storage-_-Data_2024_v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-lessons-learned-ransomware-proofing-storage-backups/</loc>
		<lastmod>2025-03-26T15:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/05/CISO-Lessons-Learned-Picture2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/quick-start-guide-to-iso-27040-storage-security/</loc>
		<lastmod>2025-03-26T15:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/05/ISO-Quick-Start-Guide-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-three-steps-to-safeguard-your-backups-from-ransomware/</loc>
		<lastmod>2025-03-26T16:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/09/Image-Three-Steps-to-Safeguard-Your-Backups-From-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-cisos-guide-to-iso-iec-27040-storage-security/</loc>
		<lastmod>2025-03-26T16:58:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/01/Mockup-CISO-Guide-to-ISO-27040-Whitepaper-2-V2-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/4-urgent-reasons-to-harden-your-storage-backups/</loc>
		<lastmod>2025-03-26T16:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/Pic-for-Infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-storage-managers-quick-guide-to-ransomware-resiliency/</loc>
		<lastmod>2025-03-26T17:04:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/MR10-The-Storage-Managers-Guide-to-Ransomware-Resiliency-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/infographic-5-steps-to-secure-backups-from-ransomware/</loc>
		<lastmod>2025-03-26T17:07:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/06/Secure-Backups-From-Ransomeware-V2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-state-of-storage-backup-security-report-2023/</loc>
		<lastmod>2025-05-26T09:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/03/MR03-The-state-of-storage-_-backup-security-report-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-2025-security-maturity-of-storage-data-protection-systems/</loc>
		<lastmod>2025-05-28T14:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2015/05/MR13_The_2025_Security_Maturity_of_Storage-_-Data_Protection_Systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-how-to-securely-configure-your-dell-storage-backups/</loc>
		<lastmod>2025-07-30T10:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/05/Dell-Continuity-Webinar-banner-on-demand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-averting-disaster-how-to-automate-storage-backup-compliance/</loc>
		<lastmod>2025-07-30T13:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/03/Veeam-webinar-on-demand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/hardening-enterprise-backups-essential-best-practice-guide/</loc>
		<lastmod>2025-09-07T08:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/08/front-cover-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/storage-leaders-virtual-panel-2026-trends-threats-transformations-2/</loc>
		<lastmod>2026-01-19T14:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/LinkedIn-Images-6-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-storage-leaders-guide-2-2/</loc>
		<lastmod>2026-02-02T11:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/01/Storage-Leaders-Guide-mockup3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-guide-the-2026-infrastructure-security-outlook/</loc>
		<lastmod>2026-02-02T11:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/12/CISO-Point-of-View-Infrastructure-Security-Guide1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/major-ransomware-attack-storageguard-ai/</loc>
		<lastmod>2026-02-16T16:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Screenshot-2026-02-16-182149.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/instant-audit-evidence-for-the-ciso-storageguard-ai-2/</loc>
		<lastmod>2026-02-16T16:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/02/Screenshot-2026-02-16-182258.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-autonomous-threats-preparing-storage-and-backup-for-ai-era/</loc>
		<lastmod>2026-03-19T10:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2026/03/LinkedIn-Images-23-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/from-ransomware-a-joint-continuity-ciso-mag-webinar/</loc>
		<lastmod>2026-04-07T14:47:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Image-From-Ransomware-Beyond-A-joint-Continuity-CISO-Mag-Webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-securing-storage-the-final-frontier/</loc>
		<lastmod>2026-04-07T14:47:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/Image-Securing-storage-backup-the-final-frontier.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-4-fundamental-strategies-to-secure-your-storage-backup/</loc>
		<lastmod>2026-04-07T14:48:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/09/4-Fundamental-Strategies-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-configuring-storage-the-forgotten-threat-vector/</loc>
		<lastmod>2026-04-07T14:48:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/02/LinkedIn-Images-webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/storageguard-video/</loc>
		<lastmod>2026-04-07T14:53:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/video_cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/mitigating-cyber-threats-amidst-tool-proliferation-strategies-for-enhanced-data-protection-and-organizational-cybersecurity/</loc>
		<lastmod>2026-04-11T07:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/11/Power2Protect-image-podcast.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-the-ever-changing-role-of-data-and-the-implications-for-data-protection-storage-security/</loc>
		<lastmod>2026-04-11T08:03:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/12/CISO-Point-of-View-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/el-al-airlines-uses-continuity-softwares-availabilityguard-to-proactively-identify-service-availability-risks/</loc>
		<lastmod>2026-04-11T08:03:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/01/787.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/idc-case-study-taking-a-proactive-approach-to-it-infrastructure-resiliency/</loc>
		<lastmod>2026-04-11T09:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2016/08/Life-Insurance-case-study.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/swisscom-adopts-proactive-configuration-validation-to-meet-resilience-goals-and-prevent-outages/</loc>
		<lastmod>2026-04-11T09:57:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2018/05/Swisscom_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-why-organizations-fail-to-recover-from-cyberattacks-and-how-to-avoid-their-mistakes/</loc>
		<lastmod>2026-04-11T09:57:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/04/RecoverGuard-Webinar-May-2025-Final.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/establishing-secure-configuration-baselines-best-practice-guide-for-storage-backup-systems/</loc>
		<lastmod>2026-04-11T09:57:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/01/Best-Practice-Guide-for-Storage-Backup-Systems-Image2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/on-demand-ciso-virtual-panel/</loc>
		<lastmod>2026-04-11T10:02:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/07/CISO-Panel-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/virtual-panel-mastering-security-posture-management-safeguarding-public-private-clouds/</loc>
		<lastmod>2026-04-11T10:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/04/Virtual-Event-narrow-160425-V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/spotlight-on-reliability-continuity-software-empowers-the-aws-well-architected-framework/</loc>
		<lastmod>2026-04-11T10:03:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/04/Spotlight-on-Reliability-Continuity-Empowers-the-AWS-Well-Architected-Framework.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-protecting-storage-a-little-less-conversation-a-little-more-action/</loc>
		<lastmod>2026-04-11T10:06:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/08/Image-Protecting-Storage-Backup-a-Little-Less-Conversation-a-Little-More-Action.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-matthew-lang-former-ciso-at-secu-state-employees-credit-union/</loc>
		<lastmod>2026-04-11T10:07:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/10/Matthew-Lang.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/availabilityguard-2-minute-explainer/</loc>
		<lastmod>2026-04-11T10:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2013/10/2-min-no-play-button.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-how-to-defend-against-known-unknown-storage-backup-ransomware-threats-2/</loc>
		<lastmod>2026-04-11T10:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/11/On-Demand-Webinar-V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-tunde-oni-daniel-vp-cyber-technology-at-onemain-financial/</loc>
		<lastmod>2026-04-11T13:22:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/hqdefault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/financial-services-2025-research-report/</loc>
		<lastmod>2026-04-11T13:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/09/Magazine09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/continuous-assurance-for-the-aws-well-architected-framework-why-what-how/</loc>
		<lastmod>2026-04-11T13:25:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2020/09/webinar640.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/virtual-panel-vulnerability-management-trends-innovations-to-watch-in-2025/</loc>
		<lastmod>2026-04-11T13:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/01/Virtual-Panel-Top-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-configuration-made-easy-practical-baselines-for-storage-backups-2/</loc>
		<lastmod>2026-04-11T14:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2025/10/LinkedIn-Images-84.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/webinar-best-practices-to-secure-your-backup-data-protection-environment/</loc>
		<lastmod>2026-04-11T14:18:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2024/02/Post-Webinar-Best-Practices-Picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/mythbusting-our-storage-is-too-deep-to-reach-and-too-obscure-to-attack/</loc>
		<lastmod>2026-04-11T14:21:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/09/Our-Storage-Is-Video-Bite.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/mythbusting-if-my-data-is-encrypted-why-do-i-need-to-secure-my-storage/</loc>
		<lastmod>2026-04-11T14:22:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/09/Why-do-I-need-to-secure-my-storage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-most-overlooked-security-issues-facing-the-financial-services-sector/</loc>
		<lastmod>2026-04-11T14:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2023/06/Financial-IT-Magazine-Cover-Picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/security-intelligence-report-analysis-of-storage-backup-security-in-the-financial-services-banking-sector/</loc>
		<lastmod>2026-04-12T12:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/Survey-Report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-dummies-guide-to-ransomware-resiliency-for-enterprise-storage-backup/</loc>
		<lastmod>2026-04-12T12:55:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/04/MR03-The-Dummies-Guide-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/video-bites/</loc>
		<lastmod>2026-04-12T12:55:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Continuity-Video-Bites-Covers-1280-x-720.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/4-myths-cisos-still-believe-and-why-theyre-wrong/</loc>
		<lastmod>2026-04-12T13:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/11/Cheat-Sheet-Top.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-ashish-thapar-vp-consulting-apac-ntt-security/</loc>
		<lastmod>2026-04-12T13:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Ashish-Thapar-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-bob-turner-ciso-at-university-of-wisconsin/</loc>
		<lastmod>2026-04-12T13:08:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/08/CISO-Point-of-View-Bob-Turner-CISO-at-University-of-Wisconsin.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-dick-wilkinson-ciso-new-mexico-supreme-court/</loc>
		<lastmod>2026-04-12T13:08:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Dick-Wilkinson-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-endre-jarraux-walls-ciso-at-customers-bank/</loc>
		<lastmod>2026-04-12T13:08:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Endre-Jarraux-Walls-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-erdal-ozkaya-regional-ciso-at-standard-chartered-bank/</loc>
		<lastmod>2026-04-12T13:09:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Erdal-Ozkaya-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-garrett-smiley-ciso-at-serco/</loc>
		<lastmod>2026-04-12T13:09:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Garrett-S.-Smiley-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-glen-hymers-head-of-data-privacy-compliance-at-uk-cabinet-office/</loc>
		<lastmod>2026-04-12T13:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Glen-Hymers-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-ian-thornton-trump-ciso-at-cyjax/</loc>
		<lastmod>2026-04-12T13:09:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Ian-Thornton-Trump-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-kami-mofrad-former-svp-third-party-cyber-security-citi/</loc>
		<lastmod>2026-04-12T13:09:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Kami-Mofrad-featured-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-kristen-sanders-ciso-at-water-authority/</loc>
		<lastmod>2026-04-12T13:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/08/CISO-Point-of-View-Kristen-Sanders-CISO-at-Water-Authority.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-marc-ashworth-ciso-at-first-bank/</loc>
		<lastmod>2026-04-12T13:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Marc-Ashworth-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/ciso-point-of-view-mashup-the-importance-of-securing-storage-backup/</loc>
		<lastmod>2026-04-12T13:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/10/maxresdefault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/cyberweek-2021-continuity-session/</loc>
		<lastmod>2026-04-12T13:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Doron-Cyber-Week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/everything-you-wanted-to-know-about-securing-your-storage-but-were-afraid-to-ask/</loc>
		<lastmod>2026-04-12T13:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Whitepaper_-_Everything_you_wanted_to_know_about_securing_your_storage_but_were_afraid_to_ask_-_mock-up_2-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/how-can-storageguard-help-me/</loc>
		<lastmod>2026-04-12T13:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/02/video-bites-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/how-to-succeed-with-cloud-storage-hardening/</loc>
		<lastmod>2026-04-12T13:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/06/How-to-succeed-with-Cloud-Storage-Hardening-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/mythbusting-i-have-backups-so-what-could-possibly-go-wrong/</loc>
		<lastmod>2026-04-12T13:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/02/video-bites-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/nist-guide-for-storage-security-2/</loc>
		<lastmod>2026-04-12T13:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/NIST-Featured-Picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/part-i-simulated-cyberattack-on-storage-backup-systems/</loc>
		<lastmod>2026-04-12T13:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Video-Storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/part-ii-simulated-cyberattack-on-storage-backup-systems/</loc>
		<lastmod>2026-04-12T13:12:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/08/Part-II-Simulated-Cyberattack-on-Storage-Backup-Systems.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/storage-security-audit-checklist/</loc>
		<lastmod>2026-04-12T13:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Whitepaper_-_Security_Audit_Checklist_-_mock-up_2-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/sunil-varkey-chief-technology-officer-forescout-technologies/</loc>
		<lastmod>2026-04-12T13:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Sunil-Varkey-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-state-of-storage-security-infographic/</loc>
		<lastmod>2026-04-12T13:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Whitepaper_-_The_State_of_Storage_Security_Infographic_-_mock-up-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-state-of-storage-security-report/</loc>
		<lastmod>2026-04-12T13:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Whitepaper_-_The_State_of_Storage_Security_Report_-_mock-up-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/the-storage-security-handbook/</loc>
		<lastmod>2026-04-12T13:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2021/07/Whitepaper_-_The_Storage_Security_Handbook_-_mock-up-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/when-why-and-how-to-create-a-secure-backup-strategy-6-steps-to-success/</loc>
		<lastmod>2026-04-12T13:14:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/04/Mock-up-Whitepaper-When-Why-How-to-Create-a-Secure-Backup-Strategy-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.core6.com/resources/why-do-i-need-to-secure-my-storage-backup/</loc>
		<lastmod>2026-04-12T13:14:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.core6.com/wp-content/uploads/2022/02/Video-Bites.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->