<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.abstract.security</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/abstract-canvas</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/platform</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integrations</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/platform/collection</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/platform/detections</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/platform/ai-enabled-secops</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/platform/retention</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/company</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/newsroom</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/contact-us</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/partners</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/manifesto</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/rsa-2026</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/modern-day-siem-migration-strategy</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/security-data-pipeline-platforms-market-guide</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/events</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/abstract-intel-gallery</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/abstract-splunk-data-reduction-calculator-app</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/case-studies</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/abstract-security-technical-product-brief</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/applied-security-data-strategy-ebook</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/reports/priced-to-move</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/newsletter</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/for-startups</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blackhat-2026</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/10-cybersecurity-focus-areas-that-actually-move-the-needle</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/2025-security-data-pipeline-platforms-market-guide</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/abstract-and-chris-camacho-threat-intelligence-the-next-evolution</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/abstract-security-amazon-security-lake-ocsf-upgraded-security-data-management</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/abstract-security-joins-forces-with-analytica42-to-supercharge-integration-delivery-to-google-secops-and-more</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/abstract-security-partners-with-netskope-to-turn-security-data-into-real-time-decisions</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/abstract-security-welcomes-omegablack-to-growing-roster-of-new-customers</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/ai-agents-and-automated-socs-centering-end-to-end-workflows-for-real-impact</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/automating-macos-incident-response-dfir-as-code-in-action-against-appleprocesshub</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/breaking-the-siem-mold-security-data-operations-whats-next-live-at-black-hat</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-achieving-fortune-50-security-with-a-smb-budget</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-detection-doesnt-fail-first-data-does</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-follow-the-money</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-how-i-mentor</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-rebooting-security-operations-mission-first-people-always</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-state-of-enterprise-detection-engineering-for-a-modern-soc</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-stop-automating-the-soc-start-automating-remediation</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-the-tactician-and-the-strategist-in-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/c2-corner-why-i-mentor</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/climbing-the-mountain-again-and-again</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/contagious-interview-evolution-of-vs-code-and-cursor-tasks-infection-chains-part-2</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/contagious-interview-evolution-of-vscode-and-cursor-tasks-infection-chains</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/contagious-interview-tracking-the-vs-code-tasks-infection-vector</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/critical-apache-tika-vulnerability-cve-2025-66516-enables-xxe-injection</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/critical-cisco-vulnerabilities-cve-2026-20079-and-cve-2026-20131</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/critical-ivanti-epmm-vulnerabilities-cve-2026-1281-cve-2026-1340</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/critical-mongodb-vulnerability-cve-2025-14847-mongobleed</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/critical-react-server-components-rce-cve-2025-55182-what-you-need-to-patch-now</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/dfir-as-code-scaled-and-repeatable-incident-response</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/dune-security-and-abstract-security-partner-to-deliver-real-time-detection-and-automated-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/enabling-the-mongodb-logging-firehose</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/ep-1-cal-poly-incubator-interview</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/ep-2-jon-oltsik-future-of-security-operations</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/from-frameworks-to-flywheels-measuring-security-momentum</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/from-mandate-to-maturity-how-cisas-zero-trust-maturity-model-2-0-and-csa-methodologies-advance-enterprise-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/from-market-guide-to-real-world-abstracts-influence-in-the-industry-and-enterprise</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/gainsight-breach-saas-supply-chain-attack-exposes-salesforce-integrations</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/how-abstract-security-delivers-measurable-roi-and-enhances-your-cloud-siem</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/how-abstract-turns-security-from-a-cost-center-to-a-competitive-edge</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/how-attackers-disable-cloudtrail-without-calling-stoplogging-or-deletetrail</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/how-juul-labs-rebuilt-its-security-operations-using-abstract</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/how-to-triage-npm-malware-incidents</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/inside-the-web-of-scattered-spider-dfir-lessons-and-the-future-of-modern-detection</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/integrating-security-data-pipelines-with-detection</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/introducing-abstract-lakevilla-pipeline-powered-analyst-ready-and-efficient-storage</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/introducing-c2-corner</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/moving-laterally-through-abuse-of-managed-identities-attached-to-vms</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/reclaiming-the-pipeline-real-time-detection-without-blowing-the-budget</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/redefining-the-soc-why-ai-elevates-not-replaces-the-next-generation-of-analysts</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/salesforce-forensics-telemetry-for-detection-response</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/security-data-pipelines-have-become-the-center-of-the-soc-the-market-knows-it-and-so-do-we</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/shift-left-detections-with-abstract</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/shifting-detection-left-how-to-decouple-siem-detection-criteria-for-modern-security-operations</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/shrinking-the-stack-of-needles</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/startup-partnerships-lessons-from-the-front-lines</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/strengthening-integrations-in-the-abstract-security-platform</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/the-invisible-enemy-unmasking-microsoft-365s-logging-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/thinking-beyond-the-budget-why-your-security-team-isnt-a-cost-center</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/trust-and-community-the-peer-to-peer-security-advantage</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/uncovering-compromised-git-admins-how-to-detect-actors-like-thecom</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/what-is-a-security-data-pipeline-platform-sdpp-and-why-do-security-teams-need-one</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/why-health-isac-selected-abstract-security-to-support-its-internal-siem-operations</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/blog/why-your-siem-needs-a-data-pipeline-management-platform</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/policies/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/policies/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/aws-security-lake</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/crowdstrike-falcon</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/elastic-security</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/google-secops</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/palo-alto-cortex-xsiam</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/integration/splunk</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/abstract-security-joins-forces-with-analytica42-to-supercharge-integration-delivery-to-google-secops-and-more</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/breaking-the-siem-mold-security-data-operations-whats-next-live-at-black-hat</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/from-market-guide-to-real-world-abstracts-influence-in-the-industry-and-enterprise</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/priced-to-move-webinar</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/siem-is-a-state-of-mind-webinar</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/videos/your-pipeline-is-your-security-engine-not-your-plumbing</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/events/detectcon</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/events/health-isac-2026</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/events/night-at-the-mercantile</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/events/rsa-2026</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/use-cases/migrate-siems-easily</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/use-cases/reduce-data-volume-costs</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/use-cases/speed-up-detection-get-the-whole-story</loc>
    </url>
    <url>
        <loc>https://www.abstract.security/case-studies/juul</loc>
    </url>
</urlset>