<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//identitysecurity.ms/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://identitysecurity.ms/blog/</loc>
		<lastmod>2025-06-02T06:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/ai-is-improving-retail-customer-experience/</loc>
		<lastmod>2024-08-27T09:16:36+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/top-programming-languages-for-ai-development/</loc>
		<lastmod>2024-08-29T03:09:42+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post2-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/demystifying-machine-learning-a-beginners-guide/</loc>
		<lastmod>2024-08-29T03:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/ai-revolutionizing-customer-experience-in-retail/</loc>
		<lastmod>2024-08-29T03:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/post-img-end.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/the-future-ai-in-healthcare-revolutionizing-care/</loc>
		<lastmod>2024-08-29T03:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/harnessing-predictive-analytics-in-business/</loc>
		<lastmod>2024-08-29T03:13:10+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/ai-education-personalized-learning-and-more/</loc>
		<lastmod>2024-08-29T03:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post7.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/top-programming-languages-for-ai-development-2/</loc>
		<lastmod>2024-08-29T03:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post8.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/how-our-ai-services-can-transform-your-business/</loc>
		<lastmod>2024-08-29T03:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2024/08/img-sg-post9.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/power-of-least-privilege-for-server-security-for-it-professionals/</loc>
		<lastmod>2025-04-18T08:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/detection-threat-via-privileged-access-management-pam/</loc>
		<lastmod>2025-04-18T08:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/enterprise-privileged-management/</loc>
		<lastmod>2025-04-18T08:41:49+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/15751-2/</loc>
		<lastmod>2025-05-09T08:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/building-resilient-secrets/</loc>
		<lastmod>2025-05-09T11:10:44+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/can-a-single-password-safeguard-your-most-critical-system/</loc>
		<lastmod>2025-05-09T11:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/can-a-single-password-safeguard-your-most-critical-system-2/</loc>
		<lastmod>2025-05-09T15:42:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/can-a-single-password-safeguard-your-most-critical-system-3/</loc>
		<lastmod>2025-05-09T15:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/cyber-security-practices-with-bert-blevins-and-bryce-nichols/</loc>
		<lastmod>2025-05-09T18:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/better-security-methods-for-spreadsheet/</loc>
		<lastmod>2025-05-10T04:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Rectangle-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/when-disaster-strikes-what-happens-to-your-privileged-account-access/</loc>
		<lastmod>2025-05-10T04:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/tech-wizards-reset-their-email-password/</loc>
		<lastmod>2025-05-10T04:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/how-to-reset-their-email-passwords/</loc>
		<lastmod>2025-05-10T04:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/delinea-discovery-scan_-uncover-hidden-privileged-accounts-with-ease/</loc>
		<lastmod>2025-05-11T08:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/delinea-discovery_-uncover-hidden-privileged-accounts-and-secure-your-network/</loc>
		<lastmod>2025-05-11T08:09:06+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/A-Passion-for-Knowledge-Sharing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/delinea-remediation-steps_-secure-your-business-with-confidence/</loc>
		<lastmod>2025-05-11T08:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/delineas-secret-policies-revealed_-unlocking-advanced-security-strategies/</loc>
		<lastmod>2025-05-11T08:17:22+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/disaster-recovery-scenario-step-by-step-setup-_-5-critical-disaster-recovery-mistakes/</loc>
		<lastmod>2025-05-11T08:22:18+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Group-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/why-would-you-even-want-to-store-passwords-in-a-vault/</loc>
		<lastmod>2025-05-12T06:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/tech-wizards-reset-their-email-password-2/</loc>
		<lastmod>2025-05-12T07:10:10+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Vector-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/how-to-reset-their-email-passwords-2/</loc>
		<lastmod>2025-05-12T07:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/A-Passion-for-Knowledge-Sharing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/what-happens-when-someone-login-into-privileged-accounts/</loc>
		<lastmod>2025-05-12T07:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/when-disaster-strikes-what-happens-to-your-privileged-account-access-2/</loc>
		<lastmod>2025-05-12T07:16:06+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/why-would-you-even-want-to-store-passwords-in-a-vault-2/</loc>
		<lastmod>2025-05-12T07:21:37+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/Data-Security-2-Landing_Page_Ilustrasi-8-02-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/hiding-passwords-in-system/</loc>
		<lastmod>2025-05-13T09:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-unlimited-admin-mode/</loc>
		<lastmod>2025-05-13T09:03:22+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/A-Passion-for-Knowledge-Sharing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-privilege-manager-within-the-pixels/</loc>
		<lastmod>2025-05-13T09:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10221132-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-file-inventory-privilege-manager/</loc>
		<lastmod>2025-05-13T09:10:37+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Group-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-delinea-launchers_-simplify-and-streamline-your-access/</loc>
		<lastmod>2025-05-13T09:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/color-Logo-2-2-e1751749354989.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-privilege-manager-client-system-settings/</loc>
		<lastmod>2025-05-14T06:36:39+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-privilege-manager-groups/</loc>
		<lastmod>2025-05-14T06:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Vector-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-privilege-manager-monitoring-policies/</loc>
		<lastmod>2025-05-14T06:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Rectangle-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-privilege-managers-application-blocking/</loc>
		<lastmod>2025-05-14T06:45:09+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-the-agent-utility-in-privilege-manager/</loc>
		<lastmod>2025-05-14T06:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-file-inventory-privilege-manager-2/</loc>
		<lastmod>2025-05-15T09:10:20+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/exploring-delinea-launchers_-simplify-and-streamline-your-access-2/</loc>
		<lastmod>2025-05-15T09:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/elevating-privileges-at-the-desktop-level/</loc>
		<lastmod>2025-05-15T09:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/protect-your-accounts-from-hackers-with-multi-factor-authentication-mfa-login/</loc>
		<lastmod>2025-05-15T09:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/how-to-enable-multi-factor-authentication-mfa-on-delinea-accounts/</loc>
		<lastmod>2025-05-15T09:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/Data-Security-2-Landing_Page_Ilustrasi-8-02-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/privileged-accounts-and-pam-bert-blevins/</loc>
		<lastmod>2025-05-28T06:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/Untitled-design-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/privileged-remote-access-pam-for-vendors-contractors-and-supply-chain/</loc>
		<lastmod>2025-05-28T06:09:38+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/Untitled-design-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/protect-your-data-how-to-enable-multifactor-authentication-mfa-in-minutes/</loc>
		<lastmod>2025-05-28T06:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/remote-application-delinea-simplifying-secure-access-management/</loc>
		<lastmod>2025-05-28T06:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://identitysecurity.ms/rotating-the-passwords-in-red-hat-linux/</loc>
		<lastmod>2025-05-28T06:19:28+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/secure-your-secrets-mfa-unlocked-for-ultimate-protection/</loc>
		<lastmod>2025-05-29T06:24:40+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/securely-locking-down-privileged-accounts/</loc>
		<lastmod>2025-05-29T06:27:15+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/securing-service-accounts-with-pam/</loc>
		<lastmod>2025-05-29T06:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/Untitled-design-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/setup-assign-a-marketing-folder-in-delinea-with-bert-blevins/</loc>
		<lastmod>2025-05-29T06:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10221134-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/setup-assign-a-role-in-delinea-with-bert-blevins/</loc>
		<lastmod>2025-05-29T06:31:04+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/05/4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/shadow-it-for-networking/</loc>
		<lastmod>2025-05-30T05:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Rectangle-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/tech-wizards-reset-their-email-password-3/</loc>
		<lastmod>2025-05-30T05:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/top-benefits-of-remote-access-with-delinea-secure-seamless-and-efficient/</loc>
		<lastmod>2025-05-30T05:53:40+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-approval-policies-in-privilege-manager/</loc>
		<lastmod>2025-05-30T05:57:32+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10221132-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/shadow-admins-exposed-real-life-examples-and-how-to-secure-your-network/</loc>
		<lastmod>2025-05-30T06:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-justification-policies-in-privilege-manager/</loc>
		<lastmod>2025-05-31T10:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Vector-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-otp-within-secret-server/</loc>
		<lastmod>2025-05-31T10:47:05+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-password-complexity-and-character-sets-in-secret-server/</loc>
		<lastmod>2025-05-31T10:49:25+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Rectangle-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-user-management-in-privilege-manager/</loc>
		<lastmod>2025-05-31T10:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Vector-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-the-approval-workflow-process/</loc>
		<lastmod>2025-05-31T10:51:50+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/understanding-workstation-policies-in-privilege-manager/</loc>
		<lastmod>2025-06-01T10:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/unlock-secure-access-with-delineas-privileged-remote-access-service/</loc>
		<lastmod>2025-06-01T10:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Vector-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/updating-secrets-within-secret-server/</loc>
		<lastmod>2025-06-01T10:10:40+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/unlocking-the-secret-level-of-mfa-security/</loc>
		<lastmod>2025-06-01T10:10:49+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Rectangle-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/welcome-to-our-deep-dive-into-a-critical-aspect-of-cybersecurity-bert-blevins/</loc>
		<lastmod>2025-06-01T10:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/A-Passion-for-Knowledge-Sharing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/what-happens-when-someone-login-into-privileged-accounts-2/</loc>
		<lastmod>2025-06-02T05:50:01+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/Group-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/what-is-cloud-identity-discovery/</loc>
		<lastmod>2025-06-02T05:51:49+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/cybersecurity-data-protection-concept-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/when-disaster-strikes-what-happens-to-your-privileged-account-access-3/</loc>
		<lastmod>2025-06-02T05:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/10001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/why-service-account-management-is-critical/</loc>
		<lastmod>2025-06-02T06:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/why-vaulting-privileged-accounts-with-secret-server/</loc>
		<lastmod>2025-06-02T06:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://identitysecurity.ms/why-would-you-even-want-to-store-passwords-in-a-vault-3/</loc>
		<lastmod>2025-06-02T06:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://identitysecurity.ms/wp-content/uploads/2025/04/2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->