<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://detectioneering.com/2023/03/28/Detectioneering-a-gerund/</loc>
<lastmod>2023-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://detectioneering.com/2023/03/28/don&apos;t-fall-victim-to-poor-opsec/</loc>
<lastmod>2023-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://detectioneering.com/2023/07/08/formulating-a-hypothesis/</loc>
<lastmod>2023-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://detectioneering.com/2024/02/01/what-is-detection-engineering-a-fish-analogy/</loc>
<lastmod>2024-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://detectioneering.com/</loc>
</url>
<url>
<loc>https://detectioneering.com/author/greg-ake/</loc>
</url>
<url>
<loc>https://detectioneering.com/tag/musings/</loc>
</url>
<url>
<loc>https://detectioneering.com/tag/detection-engineering/</loc>
</url>
<url>
<loc>https://detectioneering.com/tag/incident-response/</loc>
</url>
<url>
<loc>https://detectioneering.com/tag/threat-hunting/</loc>
</url>
</urlset>
