<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://info.janusassociates.com/blog/cyber-attack-trends-in-2023</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_550072336.jpeg</image:loc><image:caption>AdobeStock550072336</image:caption><image:title>AdobeStock550072336</image:title></image:image><lastmod>2023-02-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-threat-report-october-2025</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-cyber-threat-featured-image.jpg</image:loc><image:caption>januscyberthreatfeaturedimage</image:caption><image:title>januscyberthreatfeaturedimage</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20Cyber%20Threat%20Report%20October%202025.jpg</image:loc><image:caption>JANUSAssociatesCyberThreatReportOctober2025</image:caption><image:title>JANUSAssociatesCyberThreatReportOctober2025</image:title></image:image><lastmod>2025-10-28</lastmod></url><url><loc>https://info.janusassociates.com/blog/the-difference-between-attack-surface-management-asm-and-vulnerability-management-vm</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_526097152.jpeg</image:loc><image:caption>AdobeStock526097152</image:caption><image:title>AdobeStock526097152</image:title></image:image><lastmod>2023-12-07</lastmod></url><url><loc>https://info.janusassociates.com/blog/penetration-testing-for-your-organization-the-ins-and-outs</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/latest.jpeg</image:loc><image:caption>latest</image:caption><image:title>latest</image:title></image:image><lastmod>2023-03-06</lastmod></url><url><loc>https://info.janusassociates.com/blog/hackers-recruit-it-experts-for-fake-company</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-hacker-company-featured-image.jpg</image:loc><image:caption>janushackercompanyfeaturedimage</image:caption><image:title>janushackercompanyfeaturedimage</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><lastmod>2023-12-27</lastmod></url><url><loc>https://info.janusassociates.com/blog/improve-your-cyber-security-it-compliance-by-hiring-a-vciso</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Improve%20Your%20Cyber%20Security%20&amp;%20IT%20Compliance%20By%20Hiring%20a%20vCISO.png</image:loc><image:caption>JANUSImproveYourCyberSecurityITComplianceByHiringavCISO</image:caption><image:title>JANUSImproveYourCyberSecurityITComplianceByHiringavCISO</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://info.janusassociates.com/blog/top-cyber-security-priorities-for-law-firms-in-2025</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Security%20concept%20Lock%20on%20digital%20screen%2c%20illustration.jpeg</image:loc><image:caption>SecurityconceptLockondigitalscreenillustration</image:caption><image:title>SecurityconceptLockondigitalscreenillustration</image:title></image:image><lastmod>2025-01-16</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-threat-report-december-16-2025</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Security-November-2025-Cyber-Threat-Report-1.png</image:loc><image:caption>JANUSSecurityNovember2025CyberThreatReport1</image:caption><image:title>JANUSSecurityNovember2025CyberThreatReport1</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-cyber-threat-featured-image.jpg</image:loc><image:caption>januscyberthreatfeaturedimage</image:caption><image:title>januscyberthreatfeaturedimage</image:title></image:image><lastmod>2025-12-16</lastmod></url><url><loc>https://info.janusassociates.com/blog/cybersecurity-frameworks-and-compliance-based-on-your-industry</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Cybersecurity%20Framework%20and%20Compliance.jpeg</image:loc><image:caption>CybersecurityFrameworkandCompliance</image:caption><image:title>CybersecurityFrameworkandCompliance</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Cybersecurity%20Framework%20and%20Compliance-1.jpeg</image:loc><image:caption>CybersecurityFrameworkandCompliance1</image:caption><image:title>CybersecurityFrameworkandCompliance1</image:title></image:image><lastmod>2025-11-17</lastmod></url><url><loc>https://info.janusassociates.com/blog/data-breach-protection-keep-your-staff-and-students-cyber-aware-and-safe</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Safer-Internet-Day-2022-SID2022-JANUS-Associates.jpeg</image:loc><image:caption>SaferInternetDay2022SID2022JANUSAssociates</image:caption><image:title>SaferInternetDay2022SID2022JANUSAssociates</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/insider-threats-and-mfa-strengthening-the-human-layer</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Insider-Threats-Blog-Optimized.png</image:loc><image:caption>JANUSInsiderThreatsBlogOptimized</image:caption><image:title>JANUSInsiderThreatsBlogOptimized</image:title></image:image><lastmod>2025-11-19</lastmod></url><url><loc>https://info.janusassociates.com/blog/emerging-trends-in-advanced-penetration-testing</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Emerging%20Trends%20in%20Advanced%20Penetration%20Testing.png</image:loc><image:caption>EmergingTrendsinAdvancedPenetrationTesting</image:caption><image:title>EmergingTrendsinAdvancedPenetrationTesting</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://info.janusassociates.com/blog/managing-cyber-risks-how-to-minimize-the-risk-of-a-ransomware-attack</loc><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/ctc-founding-partner-board-member-patricia-fisher</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20%20Pat%20Fisher%20%20FB.png</image:loc><image:caption>JANPatFisherFB</image:caption><image:title>JANPatFisherFB</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Pat-pic.png</image:loc><image:caption>Patpic</image:caption><image:title>Patpic</image:title></image:image><lastmod>2026-02-10</lastmod></url><url><loc>https://info.janusassociates.com/blog/kaplan-web-series-featuring-lyle-liberman</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_491854250-1-1.jpeg</image:loc><image:caption>AdobeStock49185425011</image:caption><image:title>AdobeStock49185425011</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_243614661.jpeg</image:loc><image:caption>AdobeStock243614661</image:caption><image:title>AdobeStock243614661</image:title></image:image><lastmod>2022-08-10</lastmod></url><url><loc>https://info.janusassociates.com/blog/insider-threat-october-18-2021</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-incident-response-featured-image.jpg</image:loc><image:caption>janusincidentresponsefeaturedimage</image:caption><image:title>janusincidentresponsefeaturedimage</image:title></image:image><lastmod>2023-12-27</lastmod></url><url><loc>https://info.janusassociates.com/blog/advanced-techniques-for-cybersecurity-risk-assessments</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Cyber%20Security%20Concept.%20The%20Word%20of%20Red%20Color%20Located%20over%20Text%20of%20White%20Color.-1.jpeg</image:loc><image:caption>CyberSecurityConceptTheWordofRedColorLocatedoverTextofWhiteColor1</image:caption><image:title>CyberSecurityConceptTheWordofRedColorLocatedoverTextofWhiteColor1</image:title></image:image><lastmod>2025-02-27</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-incident-response-guidance-best-practices</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-best-practices-featured-image.jpg</image:loc><image:caption>janusbestpracticesfeaturedimage</image:caption><image:title>janusbestpracticesfeaturedimage</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/protecting-your-companys-confidential-and-intellectual-property-from-cyber-threats</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/intellectual-property_graphic.jpeg</image:loc><image:caption>intellectualpropertygraphic</image:caption><image:title>intellectualpropertygraphic</image:title></image:image><lastmod>2023-11-09</lastmod></url><url><loc>https://info.janusassociates.com/blog/why-cyber-criminals-are-targeting-law-firms-and-how-to-prevent-them</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_607025502.jpeg</image:loc><image:caption>AdobeStock607025502</image:caption><image:title>AdobeStock607025502</image:title></image:image><lastmod>2024-01-17</lastmod></url><url><loc>https://info.janusassociates.com/blog/8-cybersecurity-onboarding-and-offboarding-best-practices</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Onboarding-Offboarding.png</image:loc><image:caption>JANUSOnboardingOffboarding</image:caption><image:title>JANUSOnboardingOffboarding</image:title></image:image><lastmod>2026-02-17</lastmod></url><url><loc>https://info.janusassociates.com/blog/ny-dfs-issues-guidance-on-ransomware</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/nys-dfs-ransomware.jpg</image:loc><image:caption>nysdfsransomware</image:caption><image:title>nysdfsransomware</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><lastmod>2021-10-07</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-insurance-vs.-general-liability-insurance-whats-the-difference-and-why-does-it-matter</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_108429867.jpeg</image:loc><image:caption>AdobeStock108429867</image:caption><image:title>AdobeStock108429867</image:title></image:image><lastmod>2023-05-03</lastmod></url><url><loc>https://info.janusassociates.com/blog/cisa-releases-analysis-of-fy23-risk-and-vulnerability-assessments</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_297841435.jpeg</image:loc><image:caption>AdobeStock297841435</image:caption><image:title>AdobeStock297841435</image:title></image:image><lastmod>2024-10-01</lastmod></url><url><loc>https://info.janusassociates.com/blog/different-types-of-attack-surfaces-and-how-asd-helps-prevent-them</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Different%20typed%20of%20attack%20surfaces%20and%20how%20ASD%20can%20prevent%20them.jpeg</image:loc><image:caption>DifferenttypedofattacksurfacesandhowASDcanpreventthem</image:caption><image:title>DifferenttypedofattacksurfacesandhowASDcanpreventthem</image:title></image:image><lastmod>2024-01-05</lastmod></url><url><loc>https://info.janusassociates.com/blog/navigating-evolving-ai-cyber-security-threats</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_159116431.jpeg</image:loc><image:caption>AdobeStock159116431</image:caption><image:title>AdobeStock159116431</image:title></image:image><lastmod>2023-09-19</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-threat-report-november-19-2025-breach-security-updates</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Security-November-2025-Cyber-Threat-Report-1.png</image:loc><image:caption>JANUSSecurityNovember2025CyberThreatReport1</image:caption><image:title>JANUSSecurityNovember2025CyberThreatReport1</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-cyber-threat-featured-image.jpg</image:loc><image:caption>januscyberthreatfeaturedimage</image:caption><image:title>januscyberthreatfeaturedimage</image:title></image:image><lastmod>2025-11-19</lastmod></url><url><loc>https://info.janusassociates.com/blog/mars-e-and-the-impact-on-healthcare-organizations</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_494275990.jpeg</image:loc><image:caption>AdobeStock494275990</image:caption><image:title>AdobeStock494275990</image:title></image:image><lastmod>2023-02-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/9/11-a-time-to-reflect</loc><lastmod>2024-09-11</lastmod></url><url><loc>https://info.janusassociates.com/blog/how-to-spot-a-phishing-email</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_208297865.jpeg</image:loc><image:caption>AdobeStock208297865</image:caption><image:title>AdobeStock208297865</image:title></image:image><lastmod>2023-02-24</lastmod></url><url><loc>https://info.janusassociates.com/blog/effective-disaster-recovery-tips-for-your-organization</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_363967429.jpeg</image:loc><image:caption>AdobeStock363967429</image:caption><image:title>AdobeStock363967429</image:title></image:image><lastmod>2022-10-31</lastmod></url><url><loc>https://info.janusassociates.com/blog/critical-threat-news-log4j-flash-alert</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/log4j%20flash%20alert%20janus%20associates.jpg</image:loc><image:caption>log4jflashalertjanusassociates</image:caption><image:title>log4jflashalertjanusassociates</image:title></image:image><lastmod>2021-12-16</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-threat-report-november-2025</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Security-November-2025-Cyber-Threat-Report-1.png</image:loc><image:caption>JANUSSecurityNovember2025CyberThreatReport1</image:caption><image:title>JANUSSecurityNovember2025CyberThreatReport1</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-cyber-threat-featured-image.jpg</image:loc><image:caption>januscyberthreatfeaturedimage</image:caption><image:title>januscyberthreatfeaturedimage</image:title></image:image><lastmod>2025-11-05</lastmod></url><url><loc>https://info.janusassociates.com/blog/cybersecurity-measures-every-small-business-should-implement</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_530442490-1.jpeg</image:loc><image:caption>AdobeStock5304424901</image:caption><image:title>AdobeStock5304424901</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_530442490.jpeg</image:loc><image:caption>AdobeStock530442490</image:caption><image:title>AdobeStock530442490</image:title></image:image><lastmod>2023-06-02</lastmod></url><url><loc>https://info.janusassociates.com/blog/selecting-the-right-services-for-your-organization-ciso-vs-vciso</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_513505963.jpeg</image:loc><image:caption>AdobeStock513505963</image:caption><image:title>AdobeStock513505963</image:title></image:image><lastmod>2022-08-24</lastmod></url><url><loc>https://info.janusassociates.com/blog/giving-thanks-for-cybersecurity</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/_2025-cybersecurity-threat-landscape-nist-ai-janus-1.png</image:loc><image:caption>2025cybersecuritythreatlandscapenistaijanus1</image:caption><image:title>2025cybersecuritythreatlandscapenistaijanus1</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Holiday%20Cyber%20Heartburn%20Antacid.png</image:loc><image:caption>JANUSHolidayCyberHeartburnAntacid</image:caption><image:title>JANUSHolidayCyberHeartburnAntacid</image:title></image:image><lastmod>2025-11-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/cybersecurity-risk-management-framework-janus-associates</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/NIST%20CSF%202.0.png</image:loc><image:caption>NISTCSF20</image:caption><image:title>NISTCSF20</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20Cybersecurity%20and%20Risk%20Management%20Framework.jpg</image:loc><image:caption>JANUSAssociatesCybersecurityandRiskManagementFramework</image:caption><image:title>JANUSAssociatesCybersecurityandRiskManagementFramework</image:title></image:image><lastmod>2026-02-11</lastmod></url><url><loc>https://info.janusassociates.com/blog/the-importance-of-penetration-testing-to-prevent-cyber-attacks</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_339073920-1.jpeg</image:loc><image:caption>AdobeStock3390739201</image:caption><image:title>AdobeStock3390739201</image:title></image:image><lastmod>2023-03-06</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-insurance-and-compliance</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_400172416.jpeg</image:loc><image:caption>AdobeStock400172416</image:caption><image:title>AdobeStock400172416</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://info.janusassociates.com/blog/iapp-privacy-security-risk-2021</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/_IAPP-P.S.R.-2021-social--1200x628-.jpg</image:loc><image:caption>IAPPPSR2021social1200x628</image:caption><image:title>IAPPPSR2021social1200x628</image:title></image:image><lastmod>2021-10-20</lastmod></url><url><loc>https://info.janusassociates.com/blog/effective-cyber-security-awareness-training-for-your-employees</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_253430340.jpeg</image:loc><image:caption>AdobeStock253430340</image:caption><image:title>AdobeStock253430340</image:title></image:image><lastmod>2023-02-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/case-study-keeping-centralized-data-safe</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Blog_Case%20Study-%20Keeping%20Centralized%20Data%20Safe%20%20.jpg</image:loc><image:caption>BlogCaseStudyKeepingCentralizedDataSafe</image:caption><image:title>BlogCaseStudyKeepingCentralizedDataSafe</image:title></image:image><lastmod>2026-01-06</lastmod></url><url><loc>https://info.janusassociates.com/blog/leveraging-ai-for-effective-cyber-security-protection</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AI.png</image:loc><image:caption>AI</image:caption><image:title>AI</image:title></image:image><lastmod>2023-06-15</lastmod></url><url><loc>https://info.janusassociates.com/blog/us-electronic-crimes-task-force-announcement</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20US%20Electronic%20Crimes%20Task%20Force%20Announcement.jpg</image:loc><image:caption>JANUSUSElectronicCrimesTaskForceAnnouncement</image:caption><image:title>JANUSUSElectronicCrimesTaskForceAnnouncement</image:title></image:image><lastmod>2026-02-10</lastmod></url><url><loc>https://info.janusassociates.com/blog/electronic-gaming-machine-vulnerability</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_182324186.jpeg</image:loc><image:caption>AdobeStock182324186</image:caption><image:title>AdobeStock182324186</image:title></image:image><lastmod>2026-01-13</lastmod></url><url><loc>https://info.janusassociates.com/blog/what-is-attack-surface-discovery-asd-and-why-is-it-important</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Attach%20Surface%20Discovery-3.jpeg</image:loc><image:caption>AttachSurfaceDiscovery3</image:caption><image:title>AttachSurfaceDiscovery3</image:title></image:image><lastmod>2023-07-14</lastmod></url><url><loc>https://info.janusassociates.com/blog/data-privacy-week-2026-cybersecurity-data-protection-guide-with-janus</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20-%20Data%20Privacy%20Week%202026%20-%20National%20Cybersecurity%20Alliance%20-%20Champion.jpg</image:loc><image:caption>JANUSAssociatesDataPrivacyWeek2026NationalCybersecurityAllianceChampion</image:caption><image:title>JANUSAssociatesDataPrivacyWeek2026NationalCybersecurityAllianceChampion</image:title></image:image><lastmod>2026-01-29</lastmod></url><url><loc>https://info.janusassociates.com/blog/challenges-small-businesses-face-in-securing-their-enterprise</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20Cyber%20Threat%20Report%20October%202025.jpg</image:loc><image:caption>JANUSAssociatesCyberThreatReportOctober2025</image:caption><image:title>JANUSAssociatesCyberThreatReportOctober2025</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Onboarding-Offboarding.png</image:loc><image:caption>JANUSOnboardingOffboarding</image:caption><image:title>JANUSOnboardingOffboarding</image:title></image:image><lastmod>2025-11-17</lastmod></url><url><loc>https://info.janusassociates.com/blog/dod-announces-cmmc-2.0-cybersecurity-plans</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-CMMC-Dod-2.0-featured-image.jpg</image:loc><image:caption>janusCMMCDod20featuredimage</image:caption><image:title>janusCMMCDod20featuredimage</image:title></image:image><lastmod>2021-11-11</lastmod></url><url><loc>https://info.janusassociates.com/blog/avoiding-online-and-offline-fraud-with-due-diligence-part-ii</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Untitled%20design.png</image:loc><image:caption>Untitleddesign</image:caption><image:title>Untitleddesign</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/10-unseen-impacts-cybersecurity-breaches-can-have-on-your-business</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/10%20Unseen%20Impacts%20Cybersecurity%20Breaches%20Can%20Have%20on%20Your%20Business%20(2).png</image:loc><image:caption>10UnseenImpactsCybersecurityBreachesCanHaveonYourBusiness2</image:caption><image:title>10UnseenImpactsCybersecurityBreachesCanHaveonYourBusiness2</image:title></image:image><lastmod>2025-11-03</lastmod></url><url><loc>https://info.janusassociates.com/blog/third-party-risk-management-ensuring-cybersecurity-measures-beyond-your-organization</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/third%20party%20risk%20management.png</image:loc><image:caption>thirdpartyriskmanagement</image:caption><image:title>thirdpartyriskmanagement</image:title></image:image><lastmod>2023-08-10</lastmod></url><url><loc>https://info.janusassociates.com/blog/ct-expands-data-breach-notification-law</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/2026-JANUS-Connecticut-New-Massive-Breach-Forensic-Mandate.jpg</image:loc><image:caption>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:caption><image:title>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/cyber-security-janus-associates-ct-law-passed.jpeg</image:loc><image:caption>cybersecurityjanusassociatesctlawpassed</image:caption><image:title>cybersecurityjanusassociatesctlawpassed</image:title></image:image><lastmod>2026-03-23</lastmod></url><url><loc>https://info.janusassociates.com/blog/how-to-build-a-resilient-cybersecurity-program</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Businesswoman%20holding%20tablet%20pc%20entering%20password.%20Security%20concept.jpeg</image:loc><image:caption>BusinesswomanholdingtabletpcenteringpasswordSecurityconcept</image:caption><image:title>BusinesswomanholdingtabletpcenteringpasswordSecurityconcept</image:title></image:image><lastmod>2025-10-28</lastmod></url><url><loc>https://info.janusassociates.com/blog/case-study-regional-medical-center-experiences-phishing-attack</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Blog_Case%20Study-%20Keeping%20Centralized%20Data%20Safe%20%20.jpg</image:loc><image:caption>BlogCaseStudyKeepingCentralizedDataSafe</image:caption><image:title>BlogCaseStudyKeepingCentralizedDataSafe</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_68729142.jpeg</image:loc><image:caption>AdobeStock68729142</image:caption><image:title>AdobeStock68729142</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://info.janusassociates.com/blog/why-data-breach-protection-is-essential-for-all-organizations</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_297841435.jpeg</image:loc><image:caption>AdobeStock297841435</image:caption><image:title>AdobeStock297841435</image:title></image:image><lastmod>2024-03-14</lastmod></url><url><loc>https://info.janusassociates.com/blog/managing-cyber-risks-where-to-begin</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_473333948.jpeg</image:loc><image:caption>AdobeStock473333948</image:caption><image:title>AdobeStock473333948</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/staying-ahead-of-a-cybersecurity-attack-in-2023-how-to-prepare</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_493461838.jpeg</image:loc><image:caption>AdobeStock493461838</image:caption><image:title>AdobeStock493461838</image:title></image:image><lastmod>2023-02-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/the-true-value-of-a-ciso</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_335942850.jpeg</image:loc><image:caption>AdobeStock335942850</image:caption><image:title>AdobeStock335942850</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Hire-Virtual-Chief-Information-Security-Officer.jpg</image:loc><image:caption>HireVirtualChiefInformationSecurityOfficer</image:caption><image:title>HireVirtualChiefInformationSecurityOfficer</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/cybersecurity-trends-2026-ai-ransomware-and-resilience-strategies-for-regulated-enterprises</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Hire-Virtual-Chief-Information-Security-Officer.jpg</image:loc><image:caption>HireVirtualChiefInformationSecurityOfficer</image:caption><image:title>HireVirtualChiefInformationSecurityOfficer</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/_2025-cybersecurity-threat-landscape-nist-ai-janus.jpg</image:loc><image:caption>2025cybersecuritythreatlandscapenistaijanus</image:caption><image:title>2025cybersecuritythreatlandscapenistaijanus</image:title></image:image><lastmod>2026-01-14</lastmod></url><url><loc>https://info.janusassociates.com/blog/navigating-the-challenges-of-cyber-insurance-for-your-organization</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/cyber-insurance-janus-associates-optimized.png</image:loc><image:caption>cyberinsurancejanusassociatesoptimized</image:caption><image:title>cyberinsurancejanusassociatesoptimized</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Blog%20infographics%20Cyber%20Attack-01%20(1).jpg</image:loc><image:caption>BloginfographicsCyberAttack011</image:caption><image:title>BloginfographicsCyberAttack011</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://info.janusassociates.com/blog/a-cybersecure-night-before-christmas-how-janus-helps-you-sleep-better-all-year</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/2025-cybersecure-christmas-holiday.png</image:loc><image:caption>2025cybersecurechristmasholiday</image:caption><image:title>2025cybersecurechristmasholiday</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://info.janusassociates.com/blog/due-diligence-and-avoiding-online-and-offline-fraud</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN21003-Cyber-Threat-Horizontal-CTA.png</image:loc><image:caption>JAN21003CyberThreatHorizontalCTA</image:caption><image:title>JAN21003CyberThreatHorizontalCTA</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/jan-due-diligence-avoiding-fraud.jpg</image:loc><image:caption>janduediligenceavoidingfraud</image:caption><image:title>janduediligenceavoidingfraud</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/what-to-do-if-your-business-has-suffered-a-cyber-attack</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/cyber-attack-hacker.jpg</image:loc><image:caption>cyberattackhacker</image:caption><image:title>cyberattackhacker</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/What%20To%20Do%20If%20Your%20Business%20Has%20Suffered%20a%20Cyber%20Attack%20And%20How%20To%20Reduce%20the%20Damage.png</image:loc><image:caption>WhatToDoIfYourBusinessHasSufferedaCyberAttackAndHowToReducetheDamage</image:caption><image:title>WhatToDoIfYourBusinessHasSufferedaCyberAttackAndHowToReducetheDamage</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Employee-Cybersecurity-Awareness-Training.png</image:loc><image:caption>JANUSEmployeeCybersecurityAwarenessTraining</image:caption><image:title>JANUSEmployeeCybersecurityAwarenessTraining</image:title></image:image><lastmod>2025-12-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-security-tips-in-the-age-of-ongoing-attacks</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Associates-Blog-1.png</image:loc><image:caption>JANUSAssociatesBlog1</image:caption><image:title>JANUSAssociatesBlog1</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://info.janusassociates.com/blog/7-ways-advanced-penetration-testing-adapts-to-secure-cloud-based-infrastructures</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_298585331.jpeg</image:loc><image:caption>AdobeStock298585331</image:caption><image:title>AdobeStock298585331</image:title></image:image><lastmod>2024-03-01</lastmod></url><url><loc>https://info.janusassociates.com/blog</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20-%20Data%20Privacy%20Week%202026%20-%20National%20Cybersecurity%20Alliance%20-%20Champion.jpg</image:loc><image:caption>JANUSAssociatesDataPrivacyWeek2026NationalCybersecurityAllianceChampion</image:caption><image:title>JANUSAssociatesDataPrivacyWeek2026NationalCybersecurityAllianceChampion</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20Cybersecurity%20and%20Risk%20Management%20Framework.jpg</image:loc><image:caption>JANUSAssociatesCybersecurityandRiskManagementFramework</image:caption><image:title>JANUSAssociatesCybersecurityandRiskManagementFramework</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Spear%20Phishing.jpg</image:loc><image:caption>SpearPhishing</image:caption><image:title>SpearPhishing</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/_2025-cybersecurity-threat-landscape-nist-ai-janus.jpg</image:loc><image:caption>2025cybersecuritythreatlandscapenistaijanus</image:caption><image:title>2025cybersecuritythreatlandscapenistaijanus</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/2026-JANUS-Connecticut-New-Massive-Breach-Forensic-Mandate.jpg</image:loc><image:caption>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:caption><image:title>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Associates-Anthropic%20Claude%20and%20the%20Pentagon%20What%20Federal%20AI%20Leaders%20Should%20Know%20About%20Supply%20Chain%20Risk.jpg</image:loc><image:caption>JANUSAssociatesAnthropicClaudeandthePentagonWhatFederalAILeadersShouldKnowAboutSupplyChainRisk</image:caption><image:title>JANUSAssociatesAnthropicClaudeandthePentagonWhatFederalAILeadersShouldKnowAboutSupplyChainRisk</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Security-November-2025-Cyber-Threat-Report-Social.png</image:loc><image:caption>IllustrationfeaturingadigitalshieldglobeandinterconnectednetworklinesinblueandgraytonessymbolizingglobalcybersecurityprotectionandintelligenceinlinewithJANUSAssociatesbranding</image:caption><image:title>JANUSSecurityNovember2025CyberThreatReportSocial</image:title></image:image><lastmod>2026-01-14</lastmod></url><url><loc>https://info.janusassociates.com/blog/october-is-cybersecurity-awareness-month-protect-your-digital-frontier-with-knowledge</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Cybersecurity%20Awareness%20Month%202023%20Infographic%20FINAL_508c.jpg</image:loc><image:caption>CybersecurityAwarenessMonth2023InfographicFINAL508c</image:caption><image:title>CybersecurityAwarenessMonth2023InfographicFINAL508c</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/1-1-2.png</image:loc><image:caption>112</image:caption><image:title>112</image:title></image:image><lastmod>2023-10-26</lastmod></url><url><loc>https://info.janusassociates.com/blog/why-spear-phishing-still-works-against-todays-high-value-organization</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Spear%20Phishing.jpg</image:loc><image:caption>SpearPhishing</image:caption><image:title>SpearPhishing</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-threat-report-december-4-2025</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Security-November-2025-Cyber-Threat-Report-1.png</image:loc><image:caption>JANUSSecurityNovember2025CyberThreatReport1</image:caption><image:title>JANUSSecurityNovember2025CyberThreatReport1</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/janus-cyber-threat-featured-image.jpg</image:loc><image:caption>januscyberthreatfeaturedimage</image:caption><image:title>januscyberthreatfeaturedimage</image:title></image:image><lastmod>2025-12-04</lastmod></url><url><loc>https://info.janusassociates.com/blog/8-recovery-tips-every-organization-needs-after-a-data-breach</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20ASSESS%20YOUR%20CURRENT%20MEASURES.png</image:loc><image:caption>JANblogASSESSYOURCURRENTMEASURES</image:caption><image:title>JANblogASSESSYOURCURRENTMEASURES</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20CREATE%20A%20PLAN%20TO%20PREVENT%20FUTURE%20ATTACKS.png</image:loc><image:caption>JANblogCREATEAPLANTOPREVENTFUTUREATTACKS</image:caption><image:title>JANblogCREATEAPLANTOPREVENTFUTUREATTACKS</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20Test%20regularly.png</image:loc><image:caption>JANblogTestregularly</image:caption><image:title>JANblogTestregularly</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20Train%20your%20employees.png</image:loc><image:caption>JANblogTrainyouremployees</image:caption><image:title>JANblogTrainyouremployees</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-INVEST%20IN%20ADVANCED%20SOLUTIONS.png</image:loc><image:caption>JANblogINVESTINADVANCEDSOLUTIONS</image:caption><image:title>JANblogINVESTINADVANCEDSOLUTIONS</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20NOTIFYING%20RELEVANT%20PARTIES.png</image:loc><image:caption>JANblogNOTIFYINGRELEVANTPARTIES</image:caption><image:title>JANblogNOTIFYINGRELEVANTPARTIES</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20OFFER%20PROTECTION%20FOR%20IMPACTED%20CUSTOMERS.png</image:loc><image:caption>JANblogOFFERPROTECTIONFORIMPACTEDCUSTOMERS</image:caption><image:title>JANblogOFFERPROTECTIONFORIMPACTEDCUSTOMERS</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20blog-%20ADDRESSING%20THE%20CAUSE.png</image:loc><image:caption>JANblogADDRESSINGTHECAUSE</image:caption><image:title>JANblogADDRESSINGTHECAUSE</image:title></image:image><lastmod>2024-08-27</lastmod></url><url><loc>https://info.janusassociates.com/blog/business-continuity-incident-response-for-2026</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/2026-JANUS-Business-Continuity-Incident-Response.jpg</image:loc><image:caption>RisingAIdrivencyberattacksfastmovingransomwaredataexfiltrationcampaignsandDoDoutagesnowtestnotjustyourdefensesbutyourabilitytooperatethroughdisruption</image:caption><image:title>2026JANUSBusinessContinuityIncidentResponse</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://info.janusassociates.com/blog/pitfalls-of-cyber-insurance</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/AdobeStock_144073137.jpeg</image:loc><image:caption>AdobeStock144073137</image:caption><image:title>AdobeStock144073137</image:title></image:image><lastmod>2023-02-21</lastmod></url><url><loc>https://info.janusassociates.com/blog/anthropic-claude-and-the-pentagon</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/EMAIL%20CTA%20-%20AI%20FRAMEWORK.jpg</image:loc><image:caption>EMAILCTAAIFRAMEWORK</image:caption><image:title>EMAILCTAAIFRAMEWORK</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS-Associates-Anthropic%20Claude%20and%20the%20Pentagon%20What%20Federal%20AI%20Leaders%20Should%20Know%20About%20Supply%20Chain%20Risk.jpg</image:loc><image:caption>JANUSAssociatesAnthropicClaudeandthePentagonWhatFederalAILeadersShouldKnowAboutSupplyChainRisk</image:caption><image:title>JANUSAssociatesAnthropicClaudeandthePentagonWhatFederalAILeadersShouldKnowAboutSupplyChainRisk</image:title></image:image><lastmod>2026-03-04</lastmod></url><url><loc>https://info.janusassociates.com/blog/connecticuts-new-massive-breach-forensic-mandate</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/2026-JANUS-Connecticut-New-Massive-Breach-Forensic-Mandate.jpg</image:loc><image:caption>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:caption><image:title>2026JANUSConnecticutNewMassiveBreachForensicMandate</image:title></image:image><lastmod>2026-03-23</lastmod></url><url><loc>https://info.janusassociates.com/blog/ransomware-negotiations-for-law-practices-navigating-the-complexities-of-dealing-with-hackers</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20-%20Ransomware%20Negotiations%20for%20Law%20Practices_%20Navigating%20the%20Complexities%20of%20Dealing%20with%20Hackers.png</image:loc><image:caption>JANRansomwareNegotiationsforLawPracticesNavigatingtheComplexitiesofDealingwithHackers</image:caption><image:title>JANRansomwareNegotiationsforLawPracticesNavigatingtheComplexitiesofDealingwithHackers</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/JAN%20-%20Ransomware%20Negotiations%20for%20Law%20Practices_%20Navigating%20the%20Complexities%20of%20Dealing%20with%20Hackers%20(2)-1.png</image:loc><image:caption>JANRansomwareNegotiationsforLawPracticesNavigatingtheComplexitiesofDealingwithHackers21</image:caption><image:title>JANRansomwareNegotiationsforLawPracticesNavigatingtheComplexitiesofDealingwithHackers21</image:title></image:image><lastmod>2024-06-03</lastmod></url><url><loc>https://info.janusassociates.com/blog/cyber-incident-preparedness</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Cyber%20incidents%20now%20routinely%20impact%20operations%2c%20revenue%2c%20safety%2c%20and%20reputation%20across%20all%20sectors%2c%20from%20financial%20services%20to%20critical%20infrastructure.%20NIST%E2%80%99s%20updated%20incident%20response%20guidance%20emphasizes%20that%20organizati.jpg</image:loc><image:caption>CyberincidentsnowroutinelyimpactoperationsrevenuesafetyandreputationacrossallsectorsfromfinancialservicestocriticalinfrastructureNISTsupdatedincidentresponseguidanceemphasizesthatorganizati</image:caption><image:title>CyberincidentsnowroutinelyimpactoperationsrevenuesafetyandreputationacrossallsectorsfromfinancialservicestocriticalinfrastructureNISTsupdatedincidentresponseguidanceemphasizesthatorganizati</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://info.janusassociates.com/blog/ai-powered-risks-pitfalls-navigating-the-cybersecurity-threat-landscape</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/_2025-cybersecurity-threat-landscape-nist-ai-janus.png</image:loc><image:caption>2025cybersecuritythreatlandscapenistaijanus</image:caption><image:title>2025cybersecuritythreatlandscapenistaijanus</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/AI%20is%20changing%20your%20threat%20landscape.jpg</image:loc><image:caption>AIischangingyourthreatlandscape</image:caption><image:title>AIischangingyourthreatlandscape</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://info.janusassociates.com/blog/ransomware-readiness-how-to-prepare-before-an-attack</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/Emerging%20Trends%20in%20Advanced%20Penetration%20Testing.png</image:loc><image:caption>EmergingTrendsinAdvancedPenetrationTesting</image:caption><image:title>EmergingTrendsinAdvancedPenetrationTesting</image:title></image:image><image:image><image:loc>https://info.janusassociates.com/hubfs/Ransomware%20Readiness.png</image:loc><image:caption>RansomwarereadinessconceptillustrationshowingadiverseteamofsmallbusinesslawfirmgovernmentandITleadersstandingtogetherinfrontofadigitalshieldinterfacewithnetworkdiagramsbackupiconsandincidentresponse</image:caption><image:title>RansomwareReadiness</image:title></image:image><lastmod>2025-12-09</lastmod></url><url><loc>https://info.janusassociates.com/blog/managing-cyber-risks-preventing-data-exfiltration</loc><image:image><image:loc>https://info.janusassociates.com/hubfs/JANUS%20Associates%20-%20Managing%20Cyber%20Risks-%20Preventing%20Data%20Exfiltration.png</image:loc><image:caption>JANUSAssociatesManagingCyberRisksPreventingDataExfiltration</image:caption><image:title>JANUSAssociatesManagingCyberRisksPreventingDataExfiltration</image:title></image:image><lastmod>2022-08-08</lastmod></url></urlset>