<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.komandosecurity.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/glba-cybersecurity-requirements-for-mortgage-lenders-what-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/3a109589-96a7-4480-99d4-2c1ec16021a1/GLBA+Cybersecurity+Compliance.png</image:loc>
      <image:title>Blog - GLBA Cybersecurity Requirements for Mortgage Lenders: What You Need to Know - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/understanding-the-current-state-of-cmmc-requirements-deadlines-and-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/fe9dc5c5-a667-41fc-96f5-08aa9ffff1de/CMMC_Compliance.png</image:loc>
      <image:title>Blog - Understanding the Current State of CMMC: Requirements, Deadlines, and Best Practices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/best-practices-to-secure-your-small-business-in-the-age-of-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/c729b71d-9eb1-4f10-a8f8-889ceb6b80e0/Small-Business-Cybersecurity.jpg</image:loc>
      <image:title>Blog - Best Practices to Secure Your Small Business in the Age of AI - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/why-every-business-needs-a-risk-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/2188fbf0-c6b5-4bbd-ab70-12cebf0cbfef/risk-assessment.png</image:loc>
      <image:title>Blog - Why Every Business Needs a Risk Assessment - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/leveraging-nist-csf-to-strengthen-your-cybersecurity-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/ed888e40-7613-4b9e-8d30-4c34ee61aa9e/NIST-CSF.jpg</image:loc>
      <image:title>Blog - Leveraging NIST CSF 2.0 to Strengthen Your Cybersecurity Program - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/navigating-microsoft-365-security-a-guide-for-business-owners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/45b53df9-b3ec-40fa-8875-f2e6e644a562/M365_Security.jpg</image:loc>
      <image:title>Blog - Navigating Microsoft 365 Security: A Guide for Business Owners - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/understanding-data-breach-notification-laws-across-all-50-states</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/a0508d41-8e3a-45bd-b50c-2a3e8a47b15d/Data_Breach_Laws.jpg</image:loc>
      <image:title>Blog - Understanding Data Breach Notification Laws Across All 50 States - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/achieving-soc-2-compliance-securing-trust-and-business-opportunities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/fbc48016-c83e-4b64-af16-b0419228b535/SOC+2_compliance.png</image:loc>
      <image:title>Blog - Achieving SOC 2 Compliance: Securing Trust and Business Opportunities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/top-three-cyber-threats-facing-businesses-in-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/a8a8d159-f2ab-4755-af4b-df508e9ce0dc/cyber-threats.png</image:loc>
      <image:title>Blog - Top Three Cyber Threats Facing Businesses in 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/understanding-changes-in-sec-cybersecurity-reporting-requirements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/29e34ac1-a24b-4187-8603-79dead73cd89/SEC_compliance.jpg</image:loc>
      <image:title>Blog - Understanding Changes in SEC Cybersecurity Reporting Requirements - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/navigating-the-complexities-of-fedramp-compliance-tips-for-success</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/1d61bf71-a042-427f-9647-dd145b51d6a2/FedRAMP.jpg</image:loc>
      <image:title>Blog - Navigating the Complexities of FedRAMP Compliance: Tips for Success - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/blog/what-is-the-cost-of-a-data-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/aa2acfa8-a723-4fd7-884b-edf1ea0c2f7c/data-breach.png</image:loc>
      <image:title>Blog - What is the Cost of a Data Breach? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/540adfd9-0292-4ef1-ab33-725ec02784d6/icon-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/8c6c2e09-e985-4650-a118-d4b29b2b040e/icon-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/5f68df9b-1559-4bdb-926d-3bb6e26499a9/icon-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/0355cc08-520d-4f80-9ef9-f1bd747aa9ab/kristof-pasternak.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/1581df19-6bab-4094-8522-31cf22391510/CISSP_logo.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/38f24fd9-6728-4087-abc5-40fbcf0fb555/kristof-pasternak.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/9495f711-96f0-4a65-8b9d-e91b0783e850/CISSP.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/4fd8c5bb-826d-4679-a72f-6da8de5560cf/CGRC.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/3fa8b4cb-7c78-41fc-a2d2-d041e58ff5a4/CCSP.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/6a35b103-bb79-4bb5-8d5e-4b86100b9bd9/CEH-logo.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/fractional-ciso</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/540adfd9-0292-4ef1-ab33-725ec02784d6/icon-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/schedule-a-call</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-14</lastmod>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/mentoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-30</lastmod>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/regulatory-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/5f68df9b-1559-4bdb-926d-3bb6e26499a9/icon-3.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/risk-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6576729e6cfadc362899ca42/8c6c2e09-e985-4650-a118-d4b29b2b040e/icon-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-14</lastmod>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/terms-of-use</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-14</lastmod>
  </url>
  <url>
    <loc>https://www.komandosecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
</urlset>

