<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.deeptempo.ai/about</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/request-demo</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/become-partner</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/platform</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/assessment-request</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/home-b</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/why-deeptempo</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/partners</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/2026-is-the-year-of-ai-powered-attacks-heres-the-evidence</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/anomalies-are-not-enough</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/anomaly-detection-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/attackers-dont-use-indicators-and-detection-shouldnt-either</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/beyond-the-patchwork-why-cybersecurity-needs-holistic-context-not-more-tools</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/building-vigil</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/cyber-take-your-dadgum-medicine</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/dead-drop-resolvers-malwares-quiet-rendezvous-and-why-adaptive-defense-matters</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/deeptempo-wins-global-infosec-award-for-advanced-threat-identification</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/defcon-33-recap-where-defenders-found-their-edge</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/detecting-attacks-in-operational-technology-environments-the-tac-deployment</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/detection-gap-encrypted-east-west</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/edr-is-not-enough-here-is-the-proof</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/empowering-defenders-how-better-tools-create-better-security-teams</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/evading-rule-based-detection---part-1-c2-beaconing</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/evading-rule-based-detection---part-2-lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/evading-rule-based-detection---part-3-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/foundation-models-explained-the-technology-revolution-hiding-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/foundation-models-vs-analyst-copilots</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-burnout-to-breakthrough-how-cybersecurity-leaders-see-2025-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-markov-chains-to-behavioral-foundation-models</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-packets-to-patterns-how-foundation-models-detect-network-threats</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-reactive-to-predictive-building-tomorrows-security-operations-center-eric-zietlow-eric-zietlow-13-min-read</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-stackstorm-to-deeptempo</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/from-vertical-saas-to-vertical-foundational-intelligence</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/general-foundation-models-and-their-general-problems</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/how-ai-powered-security-actually-works-beyond-the-hype</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/incident-response-without-a-security-team-a-survival-guide-for-small-companies</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/introducing-vigil---your-ai-soc-open-source</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/invisible-c2----thanks-to-ai-powered-techniques</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/kerberoasting-the-attack-that-collects-without-connecting</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/living-off-the-land-why-our-security-theater-is-missing-the-real-show</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/living-off-the-land-why-your-network-sees-attacks-as-normal-traffic</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/llms-are-helpful---loglms-are-better-for-incident-identification</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/loglm-and-jepa-parallel-paths-to-intelligent-world-models</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/measuring-what-matters-detection-engineering-beyond-the-dashboard</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/network-visibility-is-the-foundation-not-the-solution</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/nists-new-ai-security-framework-what-mid-market-companies-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/post-quantum-security-why-your-organization-needs-to-start-planning-now</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/reasoning-models-with-context-layers-vs-vertical-ai-models</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/rules-rules-everywhere-why-signature-based-detection-falls-short-against-ai-threats</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/shadow-ai-the-unauthorized-security-risk-hiding-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/slow-credential-abuse</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-adversary-who-never-gets-tired-what-a-6-hour-ai-red-team-engagement-means-for-your-soc</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-ai-arms-race-how-were-building-tomorrows-threats-while-fighting-yesterdays-wars</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-cisos-dilemma-proving-cybersecurity-roi-in-an-ai-first-world</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-cisos-impossible-task-leading-security-in-an-age-of-asymmetric-warfare</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-compliance-technology-stack-automating-audit-readiness</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-cybersecurity-paradox-why-were-falling-behind-while-standing-still</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-cybersecurity-transformation-building-security-from-first-principles-with-foundation-models</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-dwell-time-problem-why-attackers-maintain-access-for-weeks-before-striking</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-emperors-new-security-tools-building-a-mitre-att-ck-based-network-monitor-in-under-an-hour</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-great-convergence-how-foundation-models-will-merge-security-development-and-operations-into-something-new</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-great-security-detection-illusion-why-your-ai-powered-tools-are-still-just-playing-by-rules</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-hidden-war-when-machines-attack-machines</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-human-cost-of-a-broken-system-why-cybersecuritys-best-are-walking-away</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-log-paradox-swimming-in-data-starving-for-intelligence</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-loglm-revolution-teaching-ai-to-think-like-a-network</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-loglm-revolution-turning-cybersecurity-upside-down-by-burning-the-haystack</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-metrics-mirage-how-security-kpis-are-hiding-your-real-risk</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-promise-of-cybersecurity-foundation-models</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-rise-of-agentic-ai-attackers</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/the-software-you-trust-is-the-attack-surface-you-forgot</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/training-your-own-llm-a-complete-guide-from-theory-to-code</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/understanding-loglm-the-deep-learning-foundation-model-built-for-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/vertical-foundation-models-in-production</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/watching-the-watcher-how-we-evaluated-deeptempo-with-the-help-of-a-large-bank-in-new-york</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/we-tested-against-the-cic-datasets-how-did-we-do</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/were-losing----but-it-cant-get-any-worse-right</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/what-a-mesh----gnns-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/what-the-ai-soc-summit-got-right</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/what-the-latest-anthropic-report-means-for-cyber-defense-and-why-deeptempo-exists</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/when-ai-attacks-compress-time-to-exploit-windows-from-weeks-to-minutes</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-ai-powered-exfiltration-still-looks-like-exfiltration-to-a-loglm</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-ai-soc-isnt-enough-when-your-detection-layer-misses-the-attack</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-deep-learning-beats-traditional-ml-anomaly-detection-for-todays-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-deeptempo-chose-flow-data-as-our-first-data-source</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-intent-based-detection-is-the-next-step-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-isnt-anomaly-detection-well-regarded-in-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-network-threats-are-winning</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-soc-analysts-spend-most-of-their-time-gathering-context-not-analyzing-threats</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-todays-detection-stack-cant-keep-up-with-ai-driven-attacks</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-traditional-ai-defense-is-failing-against-modern-threats</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-valid-credentials-make-lateral-movement-nearly-invisible-to-traditional-tools</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/why-we-built-a-cyber-world-model</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/wizs-security-graphdb-vs-deeptempos-loglm</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/your-tech-is-old-your-business-models-are-archaic-and-you-are-burned-out</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/zero-shot-detection-in-practice</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/blogs/zero-trust-maximum-confusion-why-securitys-hottest-buzzword-is-missing-the-point</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/cribl-and-deeptempo-partner-to-deliver-deep-learning-powered-telemetry-management-and-threat-detection-for-the-next-era-of-secops</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/deeptempo-assembles-elite-advisory-council-featuring-security-leaders-from-google-chronicle-snowflake-vectra-ai-and-sentinelone</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/deeptempo-completes-bny-ascent-program-to-advance-ai-driven-cybersecurity-innovation</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/deeptempo-emerges-from-stealth-mode-with-deep-learning-based-snowflake-native-app-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/deeptempo-enhances-cybersecurity-with-fine-tuning-and-mitre-mapping</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/deeptempo-expands-leadership-team-with-strategic-hires-across-security-product-and-business-development</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/media-alert-deeptempo-at-black-hat-usa-2025-def-con-33-and-bsides-las-vegas</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/media-alert-deeptempo-at-crowdstrike-fal-con-2025</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/newsroom/whats-behind-googles-warning-of-escalating-ai-generated-malware</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/behavioral-vs-signature-detection</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/browser-based-workspace-attacks-why-zero-trust-isnt-enough-when-your-browser-becomes-the-perimeter</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/detecting-intent-not-indicators-the-shift-security-teams-must-make-in-2026</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/detection-engineering-workflows-for-ai-augmented-socs</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/evaluating-ai-based-detection-systems</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/foundation-models-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/living-off-the-land-techniques-and-network-indicators</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/supply-chain-attacks-go-industrial</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/what-is-a-loglm</loc>
    </url>
    <url>
        <loc>https://www.deeptempo.ai/learning-center/when-ransomware-stops-encrypting-the-shift-from-crypto-ransomware-to-pure-data-extortion</loc>
    </url>
</urlset>