<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
    
  <url>
    <loc>https://threatbasis.io/ai-knowledge/advanced-rag</loc>
    <lastmod>2026-02-11T20:51:36.223Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-cost-optimization</loc>
    <lastmod>2026-02-13T19:56:43.613Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-evaluation-and-testing</loc>
    <lastmod>2026-02-13T21:35:38.307Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-guardrails-and-safety</loc>
    <lastmod>2026-02-13T21:35:38.311Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-memory-and-state-management</loc>
    <lastmod>2026-02-12T08:48:19.347Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-model-selection</loc>
    <lastmod>2026-02-13T21:35:38.309Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-observability-and-monitoring</loc>
    <lastmod>2026-02-13T21:35:38.310Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-orchestration-for-security</loc>
    <lastmod>2026-02-11T20:51:36.224Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-red-teaming</loc>
    <lastmod>2026-02-12T08:48:19.341Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/ai-security-tooling-integration</loc>
    <lastmod>2026-02-11T20:51:36.226Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/context-window-management</loc>
    <lastmod>2026-02-25T18:04:04.248Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/defending-against-ai-threats</loc>
    <lastmod>2026-02-25T18:04:04.243Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/embedding-models-and-vector-search</loc>
    <lastmod>2026-02-25T18:04:04.242Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/fine-tuning-for-security</loc>
    <lastmod>2026-02-25T18:04:04.244Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/introduction</loc>
    <lastmod>2026-02-12T08:48:19.347Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/llm-fundamentals-for-security</loc>
    <lastmod>2026-02-25T18:04:04.246Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/llm-security-risks</loc>
    <lastmod>2026-02-25T18:04:04.245Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/multi-agent-security-systems</loc>
    <lastmod>2026-02-12T08:48:19.649Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/prompt-engineering-for-security</loc>
    <lastmod>2026-02-11T18:03:13.192Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/prompt-injection-defense</loc>
    <lastmod>2026-02-12T08:48:19.647Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/siem-llm-integration</loc>
    <lastmod>2026-02-12T08:48:19.648Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/soar-ai-playbooks</loc>
    <lastmod>2026-02-26T09:05:11.727Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/streaming-and-real-time-ai</loc>
    <lastmod>2026-02-26T09:05:11.729Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/ai-knowledge/threat-intelligence-ai</loc>
    <lastmod>2026-02-26T09:05:11.730Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/api-reference/endpoint/create</loc>
    <lastmod>2026-01-04T16:54:48.475Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/api-reference/endpoint/delete</loc>
    <lastmod>2026-01-04T16:54:48.480Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/api-reference/endpoint/get</loc>
    <lastmod>2026-01-04T16:54:48.477Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/api-reference/introduction</loc>
    <lastmod>2026-01-04T16:54:48.478Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io</loc>
    <lastmod>2026-02-13T19:56:45.808Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/advanced-threat-detection</loc>
    <lastmod>2026-01-04T16:54:48.484Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/alert-disposition</loc>
    <lastmod>2026-01-04T16:54:48.483Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/alert-tuning</loc>
    <lastmod>2025-10-05T08:52:20.521Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/api-security</loc>
    <lastmod>2026-01-04T16:54:48.486Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/application-security-testing</loc>
    <lastmod>2026-01-04T16:54:48.485Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/apt</loc>
    <lastmod>2025-10-05T08:52:21.851Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/attack-surface-management</loc>
    <lastmod>2025-10-05T13:47:59.661Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/aws-security</loc>
    <lastmod>2025-10-05T13:47:59.671Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/azure-security</loc>
    <lastmod>2025-10-05T13:47:59.669Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/building-security-teams</loc>
    <lastmod>2025-10-05T16:35:54.634Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/business-continuity-and-disaster-recovery</loc>
    <lastmod>2025-10-05T13:47:59.663Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cloud-compliance-and-governance</loc>
    <lastmod>2025-10-05T13:47:59.665Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cloud-native-security</loc>
    <lastmod>2026-01-04T16:54:50.347Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cloud-security-fundamentals</loc>
    <lastmod>2026-01-04T16:54:50.349Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cloud-security-monitoring</loc>
    <lastmod>2025-10-05T13:48:00.806Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/container-and-kubernetes-security</loc>
    <lastmod>2026-01-04T16:54:51.475Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/container-security-in-devops</loc>
    <lastmod>2026-01-04T16:54:51.473Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cost-optimization-for-security-data</loc>
    <lastmod>2025-10-05T13:48:00.805Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/cryptographic-hashes</loc>
    <lastmod>2025-10-05T08:52:22.636Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/data-encryption-at-rest</loc>
    <lastmod>2025-10-05T13:48:00.804Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/data-loss-prevention</loc>
    <lastmod>2025-10-05T13:48:00.812Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/deception-technologies</loc>
    <lastmod>2025-10-05T13:48:00.808Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/defense-in-depth</loc>
    <lastmod>2025-10-05T08:52:22.641Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/devsecops-pipeline-security</loc>
    <lastmod>2026-01-04T16:54:51.477Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/digital-forensics</loc>
    <lastmod>2026-01-04T16:54:51.476Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/ec2-isolation</loc>
    <lastmod>2026-01-04T16:54:51.857Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/endpoint-security</loc>
    <lastmod>2025-10-05T13:48:01.493Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/enterprise-security-architecture</loc>
    <lastmod>2025-10-05T13:48:01.495Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/gitops-security</loc>
    <lastmod>2025-10-05T13:48:01.494Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/google-cloud-security</loc>
    <lastmod>2026-01-04T16:54:51.855Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/hardware-and-side-channel-security</loc>
    <lastmod>2025-10-05T13:48:01.489Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/high-availability-and-dr-for-security-systems</loc>
    <lastmod>2025-10-05T13:48:01.490Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/incident-response</loc>
    <lastmod>2026-02-11T18:03:14.162Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/infrastructure-as-code-security</loc>
    <lastmod>2025-10-05T13:48:01.491Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/infrastructure-hardening</loc>
    <lastmod>2026-01-04T16:54:51.856Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/input-validation-and-output-encoding</loc>
    <lastmod>2026-02-11T18:03:14.154Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/internal-security-platforms</loc>
    <lastmod>2026-01-04T16:54:52.636Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/iot-security</loc>
    <lastmod>2025-10-05T13:48:02.066Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/key-management</loc>
    <lastmod>2025-10-05T13:48:02.073Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/legal-and-regulatory-considerations</loc>
    <lastmod>2026-01-04T16:54:52.637Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/mobile-application-security</loc>
    <lastmod>2026-01-04T16:54:52.639Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/multi-cloud-security</loc>
    <lastmod>2026-01-04T16:54:52.641Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/network-security-fundamentals</loc>
    <lastmod>2026-02-11T18:03:15.013Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/ot-ics-security</loc>
    <lastmod>2026-02-26T09:05:11.732Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/owasp-top-10-web-vulnerabilities</loc>
    <lastmod>2026-01-04T16:54:52.640Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/performance-engineering-for-security-tools</loc>
    <lastmod>2025-10-05T13:48:02.069Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/policy-as-code-and-ccm</loc>
    <lastmod>2026-01-04T16:54:53.327Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/post-quantum-cryptography</loc>
    <lastmod>2026-01-07T08:20:38.683Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/privacy-engineering</loc>
    <lastmod>2025-10-05T13:48:02.845Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/red-blue-purple-teaming</loc>
    <lastmod>2025-10-05T13:48:02.844Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/regulatory-compliance-frameworks</loc>
    <lastmod>2026-01-04T16:54:53.329Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/resilience-engineering</loc>
    <lastmod>2026-01-04T16:54:53.331Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/risk-assessment-fundamentals</loc>
    <lastmod>2025-10-05T16:35:54.635Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/risk-management-frameworks</loc>
    <lastmod>2026-01-04T16:54:53.330Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/scaling-soc-operations</loc>
    <lastmod>2025-10-05T13:48:02.851Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/secrets-management</loc>
    <lastmod>2026-01-04T16:54:54.138Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/secure-coding-practices</loc>
    <lastmod>2026-01-04T16:54:54.137Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/secure-software-architecture</loc>
    <lastmod>2026-01-04T16:54:54.140Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/secure-software-development-lifecycle</loc>
    <lastmod>2026-01-04T17:50:57.010Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-architecture-patterns</loc>
    <lastmod>2026-01-04T16:54:54.143Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-architecture-review</loc>
    <lastmod>2025-10-05T13:48:03.450Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-auditing-and-assessment</loc>
    <lastmod>2025-10-05T13:48:03.451Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-champions-program</loc>
    <lastmod>2025-10-05T13:48:03.453Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-culture-and-training</loc>
    <lastmod>2025-10-05T13:48:03.454Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-engineering-principles</loc>
    <lastmod>2026-01-04T17:50:57.012Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-frameworks-and-standards</loc>
    <lastmod>2026-01-04T16:54:54.702Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-governance</loc>
    <lastmod>2025-10-19T09:12:47.103Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-governance-and-policy</loc>
    <lastmod>2026-01-04T16:54:54.699Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-maturity-models</loc>
    <lastmod>2026-01-04T16:54:54.701Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-metrics-and-kpis</loc>
    <lastmod>2026-01-04T16:54:54.700Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-operations-center</loc>
    <lastmod>2026-01-05T20:55:21.834Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-orchestration-automation</loc>
    <lastmod>2025-10-05T13:48:04.136Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-program-management</loc>
    <lastmod>2026-01-04T16:54:54.705Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-requirements-engineering</loc>
    <lastmod>2026-01-04T16:54:54.706Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-telemetry-and-data-platform</loc>
    <lastmod>2026-01-04T16:54:54.704Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-testing-automation</loc>
    <lastmod>2026-01-04T16:54:55.341Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/security-tooling-strategy</loc>
    <lastmod>2025-10-05T13:48:04.701Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/session-management</loc>
    <lastmod>2026-01-04T16:54:55.340Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/siem-and-log-management</loc>
    <lastmod>2025-10-05T13:48:04.699Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/software-supply-chain-security</loc>
    <lastmod>2025-10-05T13:48:04.702Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/stakeholder-communication</loc>
    <lastmod>2025-10-05T13:48:04.711Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/third-party-risk-management</loc>
    <lastmod>2025-10-05T13:48:04.713Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/threat-hunting</loc>
    <lastmod>2026-01-04T16:54:55.346Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/threat-modeling-methodologies</loc>
    <lastmod>2026-01-05T20:55:21.834Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/ttps</loc>
    <lastmod>2025-10-05T08:52:26.416Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/vpn-and-remote-access-security</loc>
    <lastmod>2026-01-04T16:54:56.458Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/vulnerability-management</loc>
    <lastmod>2025-10-05T13:48:04.710Z</lastmod>
  </url>

  <url>
    <loc>https://threatbasis.io/knowledge/zero-trust-architecture</loc>
    <lastmod>2026-01-04T16:54:56.457Z</lastmod>
  </url>
</urlset>