<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.mach37.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-04-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550209563262-35EDF1LXG1A1YR89DWZW/image-asset.jpeg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/2a374dd6-7640-4b0b-abed-894064db2e96/Forbes+logo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676015065704-TYODBZFJG0Q47548SWDI/MACH37+Lockheed-Martin+Ventures+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1675277551355-O243IYFA87F2J5NDACJQ/vipc+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/10bc24e5-d5e2-4c5f-b6b7-2944a456eb69/Blu+Venture+Investors+logo.jfif</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/dcca3220-242e-4d92-8e16-42a965462e67/Ultratech+Capital+Partners.jfif</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676039277082-H3R33FNE2QERLEVU8966/MACH37+Next+Billion+Ventures+logo.png.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/45ca1a43-58ba-4df5-82d4-40e0a4d41bbc/K+Street+Capital+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/b9bf5d8a-5d3a-4c90-9fb1-b5da3a8de669/Cyber+Capital+Partners+logo.jfif</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/ba4e4d64-7dbf-4680-b5b3-d6492160f257/Strategic+Cyber+Ventures+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/9f8eceb8-628d-404d-a6cc-3da8302c722e/Paladin+Capital+Group+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/eb2ecc96-1bba-47d1-9db1-a8c77ffb636a/DC+Ventures+Capital+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676060965346-DLRVRFUPUHD69OAXZWXK/MACH37+TEDCO+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/4a51ede9-49c4-4138-85b9-19fd801f5b5b/DC+Revolution+Venture+Capital+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/85cb167f-34e5-4602-9509-d3ee45ff1655/Sands+Capital+Venture+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676015065704-R4ZQ5XC6DCVKQOFACPTT/MACH37+NextGen+Venture+Partners+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676015755817-A3T8QQTIBRT13IY3I7UE/MACH37+GulaTech+Adventures+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676015755817-JJNYEC3UY4XGF501PEM2/MACH37+Forgepoint+Capital+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676061060706-7JAMPIP3HNK5Y0K8ORNR/MACH37+Riverbend+Capital+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011514302-K6R4Z4A27PBEECN8VHSA/MACH37+Mentor+IQT+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011526616-QBF4YE8RJF6LLVVW9H73/MACH37+Mentor+RSA+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011528339-AJET6NIY85LMPNHHRVLD/MACH37+Mentor+Rapid7+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011529026-MWM414RQ7LP54640KTW4/MACH37+Mentor+FireEye+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011523886-G83A4HKZREXS4ZZ33VCF/MACH37+Mentor+Raytheon+Technologies+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011529288-LWECX1VDD7OL272PDSUV/MACH37+Mentor+McAfee+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011525700-UF0GAIGGLHDXD41K2Q3W/MACH37+Mentor+RedSeal+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011524396-BZZ3V7434H1OFETAHULL/MACH37+Mentor+Qualys+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011626102-1L7DFFLAPIHEKBXWBW3N/MACH37+Mentor+zscaler+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011515943-C3U9R1D8YA69HZ86YHBH/MACH37+Mentor+General+Dynamics+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011522715-IGKFCUFJW3OCSB2VKW7V/MACH37+Mentor+Verisign+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011516850-YTSL8SQJWH7HK9KBF3AF/MACH37+Mentor+HP+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011517713-8TRG2NTGBELF66CF28P3/MACH37+Mentor+LinkedIn+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011518676-1CCB0KONPIU1H59MPTQ2/MACH37+Mentor+AT%26T+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011519507-PR29XX578L1T1HE6VZ8X/MACH37+Mentor+Haystax+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011520343-ZXMVGLFSFH3QLILKVEQT/MACH37+Mentor+IBM+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011522086-YIFXYEDOWKF3UTLMK956/MACH37+Mentor+PricewaterhouseCoopers+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011521231-E5GH1E1SD9ZXPGPKXS2X/MACH37+Mentor+Wells+Fargo+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011524777-9K5DBHD6527HKAFF02UJ/MACH37+Mentor+VISA+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011931649-OS2KNAVP2HYWQ8D6L6OE/MAch37+Mentor+Silicon+Valley+Bank+SVB+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011514284-GH53PPCYWW7XTC5Z13DJ/MACH37+Mentor+Appian+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011526993-AXKM2NYL4MT7IUCZN75R/MACH37+Mentor+BoxTone+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011523561-8CNR9K5X0DW03A4ZG8OG/MACH37+Mentor+Ellucian+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011525264-9I4NLT1A0Y6MJ4E6YTZO/MACH37+Mentor+Opendns+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011526118-CHBBQNVH5DF8I0MXVCVB/MACH37+Mentor+Global+Cyber+Alliance+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011527516-O3G2V40QJZZ3P9KPL5DT/MACH37+Mentor+Time+Warner+Cable+Logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011515126-E9N0MUB3WWGPO9Y1DODB/MACH37+Mentor+ThreatQuotient+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011522981-WBRL8YU7ZIRRR8SPG91Z/MACH37+Mentor+Cognito+Corp+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676011527925-ZDEQBBDPXSFCN86GB7F6/MACH37+Mentor+Fairhaven+Capital+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589898726996-M1ETDAQAIUA7H1449WFF/blulogo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/dcca3220-242e-4d92-8e16-42a965462e67/Ultratech+Capital+Partners.jfif</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041301799-TQZB68XKZB0RW4ZW4HTK/MACH37+perk+AWS.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041301481-ZGWQG3930WXX8GS2N2A8/MACH37+perk+Microsoft-for-Startups.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041412758-QYQQYVEJ0OOHKHV5FNX1/MACH37+perk+Google+Cloud.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041302284-F97CS4J6WYU8747RJVWC/MACH37-perk-GitHub-logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1686863158182-E4WF6FPY67TU2YI11O2W/MACH37+-+Auth0-by-Okta+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041302976-YH428EY6KUBB6BZXPZZ3/MACH37+perk+Plaid+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041300801-E8YIX1QFL7A1XRQ86K26/MACH37+perk+HubSpot+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041299279-YC3EN0OZT7QY5PWVRDSH/MACH37+perk+Twilio+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041299274-RHE5F8D94YXNLLWFCAVA/MACH37+perk+rippling+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041300019-POPU4QU5845RDH4REF9J/MACH37+perk+MongoDB+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041300166-QRMCXU94DBA4JKGQR809/MACH37+perk+segment+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041304274-6CESSHW0NXE7QBR73REI/MACH37+perk+User+Testing+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041302588-LGUQPRHUOMT6WY18DHZX/MACH37-perk-Miro-logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041609880-DR9ID1IUFQJ61IR9EWXP/MACH37+perk+Stripe+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041304433-7XG85H9FCC78J4YL56GO/MACH37+perk+Mercury+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041301132-O4JY6VIBX5WHX0V9EDLR/MACH37+perk+Brex+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041305225-UMR6ODQ6HTBM8CKP1NBL/MACH37+perk+American+Express+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041303535-PJVAVVCECFXOOT2R9GD1/MACH37+perk+Sprout+Social+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041303685-DWAT0782M9OMW69GRW0U/MACH37+perk+1Password+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676041305011-BEGQPY7XN1LW7TGRWW56/MACH37+perk+Carta+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042770827-NBOFN0GTJHZU4OMT1RRS/MACH37+featured+in+TechCrunch+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013030776-7U7VRZIW3NFZDBN3X4U8/MACH37+featured+in+VentureBeat+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013026403-9YUMTYTF2FHAJNXIOLMS/MACH37+featured+in+StartupBeat.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042771578-7OT8J7GL7LP96MO3OIY8/MACH37+featured+in+Fortune+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/2a374dd6-7640-4b0b-abed-894064db2e96/Forbes+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013030625-GMZ0FXIGBOF2XBG0XN79/MACH37+featured+in+yahoo+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013029801-H9GAOXFRS8FPWAK7FXV1/MACH37+featured+in+washington+post+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013029919-MCYODJ3ML0QE6LAXV74K/MACH37+featured+in+Washingtonian+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013027255-CR8EDWEZGB3UKFAAWMYV/MACH37+featured+in+WashingtonExec+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013028149-87JZKJTHY9FGQD7ZDCSF/MACH37+featured+in+GovConWire+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013027383-6K0JIFGDUHKX7Z0WA12B/MACH37+featured+in+SC+Magazine+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013028134-LY2DNQNZWSFS804T5OKL/MACH37+featured+in+tech.co+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042769204-0TXFHCIGX9M6EB94CL1I/MACH37+featured+in+Tecnical.ly+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042770101-CIZ1JMUJW7CRKDQCWY49/MACH37+featured+in+Benzinga+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013028987-SI2EB5C4UCQVDE6B4IJ0/MACH37+featured+in+CyberSecurityIntelligence+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013029027-0ZPP57BDIPSB76C0UPHS/MACH37+featured+in+CyberSecurityTV+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676013031498-1AWH641AL2673GVQFA9K/MACH37+featured+in+VirginiaBusiness+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042769192-88H6ZD0NJWBADE5MLFA2/MACH37+featured+in+SpaceNews+logo.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042770087-DXVRFHHSERP6QLHBE01R/MACH37+featured+in+FinSMEs+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1676042771001-Y2BR9QVP9JPU6KEHZEZB/MACH37+featured+in+Authority+Magazine+logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763487814-UOQ17UZDWI5SM69Z9YF0/cyberalgorithms.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2015</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628816697-Y715RO3N8SK16ZGRQSG2/Steelmntnlogo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2016</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765410684-7SA9VUX4Y0CH2B1ZDB8B/syncurity.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2014</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/a64f0719-d0e3-49bb-bbd9-d57204efa74a/MACH37+Virgil+Security+logo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2015</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/b84f220e-ced2-48b3-974f-9f09979a150d/MACH37+Atomicorp+logo.jpg</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2015</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/763ed8c7-9b25-49bd-8392-1e3eb8f5b2b6/MACH37+Huntress+logo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2015</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/163d9d1e-0f17-460f-8e10-1347c031ba18/MACH37+Hyperqube+logo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2017</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625737322-22E8Q1UVGO3KQS5LP87F/runsafelogo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2017</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/f2db983b-3012-4e2f-9de2-bdb18b0a5e5f/MACH37+ThreatLocker+logo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2017</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/f9f74517-c2c4-48ba-8b56-f003b2b420bd/foretracelogo.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2021</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/7c28d99f-e46d-40ae-93d9-96ed89081755/MACH37+BreachBits+logo.jpg</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>MACH37 Graduate, Fall 2019</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/f9f74517-c2c4-48ba-8b56-f003b2b420bd/foretracelogo.png</image:loc>
      <image:title>Home</image:title>
      <image:caption>Foretrace is an External Attack Surface Management (EASM) platform, integrating genuine attacker techniques for reconnaissance, perimeter monitoring, and footprinting to allow its users to see organizations’ environments through the eyes of an adversary. For MSPs monitoring customers, security departments monitoring themselves and their vendors, insurance providers underwriting cyber policies, and beyond – Foretrace provides an authentic external view using actual intelligence collection methodologies found in MITRE PRE-ATT&amp;CK, and/or are employed by cyber adversaries and red teams. Foretrace believes that identification of external gaps and information exposure should be simplified and that its continuous monitoring should be woven into the fabric of security operations through automation of current attacker techniques - all with cost-efficient software and strategies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/da2135df-e76e-41ab-b38a-b18214f33697/infoseclogo.png</image:loc>
      <image:title>Home</image:title>
      <image:caption>Infosec Mates is a MSSP that is currently working on building Infosec Metrics. Infosec Metrics is a cyber intelligence tool that provides businesses with a standardized risk score, that can be used to measure their security risk posture and compare to their industry peers. Infosec Metrics also provides organizations with a compliance score based on their industry specific regulatory requirements.  Infosec Metrics integrates and synthesizes data from an organization’s disparate sources, external and internal, and combines them with threat intelligence feeds to provide meaningful metrics for the organization’s leadership team to make informed strategic and operational decisions.   Infosec Metrics breaks down the cyber risk rating of organizations based on the NIST framework categories and helps leadership understand the areas of improvement and prioritize security programs. Please schedule a meeting using the link provided for a product demo or a discussion with the founders</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/4f618b73-b6fa-4cd9-93f4-39885c452dfc/solefixlogo.jpg</image:loc>
      <image:title>Home</image:title>
      <image:caption>SOLEFIX CTC is a Digital Learning Solution Center for Pupils and Students in Nursery Schools, Primary Schools, Secondary Schools, and Post Secondary Schools. Empowerment of pupils and Students in Orphanage in information and Communication Technology. Empowerment of unemployed, drop out Students and inmates in the correctional centers to become useful to the society.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/6bfb1ac2-c9ef-4bc7-9528-d37361d5d0b2/trinitylogo.png</image:loc>
      <image:title>Home</image:title>
      <image:caption>Founded in 2019, TrinityEco Pte Ltd is an aspiring sustainability tech company in Singapore, that provides a sustainability tech platform for investors and organizations alike to automate and digitalize sustainability reporting, financing, and commercialization. As sustainability is a complex ecosystem challenge, TrinityEco recognized the importance of delivering sustainable, data-centric solutions to some of the most complex business and social challenges to governments and multinational organizations to help them quickly adapt to the changing needs of their customers and suppliers, business ecosystems and their people, while navigating the financial and operational challenges in this dynamic business ecosystem. Trinity’s goal is to mobilize and enable businesses, governments, communities towards sustainability action with real-time data intelligence and business acumen for empowered decision making. They participate actively from the beginning of our interaction, right from designing and innovating on challenges, providing a holistic ecosystem solution backed with analytical data models, and assisting in the implementation. Using highly intricate, credible, and efficient mapping algorithms, TrinityEco help investment firms to source for ESG investments and improve the ESG ratings of their assets</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/e44efe94-cacd-4f9e-a2c2-558df232e85f/trustlessailogo.png</image:loc>
      <image:title>Home</image:title>
      <image:caption>TRUSTLESS.AI is bringing unimagined freedom and peace of mind for your private communications, social networking, e-banking and AI, and that of your close associates, via an ultra-secure 2mm-thin mobile device, carried in a custom leather wallet or embedded in the back of your next smartphone. While being a stand-alone personal computing device, it also seamlessly interacts with your smartphone for Internet connection, data transfers, and bi-directional HW authentication. The Seevik pod achieves previously unimagined levels of privacy and security by applying extreme levels of ethically-aligned security review in relation to complexity - to all IT and processes that are critically involved in the life-cycle, including for legitimate lawful access mechanisms - as verified by a uniquely independent and democratic Trustless Computing Certification Body, that was launched in Geneva last June.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2025/12/8/ai-vs-ai-the-new-cybersecurity-arms-race</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2025/11/28/the-ai-arms-race-why-the-legacy-security-architecture-is-fundamentally-broken-and-how-to-build-adaptive-speed-to-win</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/3ca1809d-9511-4a0c-bbbd-13c9a41af284/Screenshot+2025-11-28+at+8.31.13+AM.png</image:loc>
      <image:title>Blog - The AI Arms Race: Why the Legacy Security Architecture is Fundamentally Broken, and How to Build Adaptive Speed to Win - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2025/11/14/agentic-ai-and-edr-forensics-grade-defense-mssps-can-deliver-to-smbs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2025/10/29/the-future-of-data-privacy-zero-knowledge-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/12/11/addressing-the-growing-demand-for-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/11/29/intellectual-property-theft-hiring-practices-and-geopolitical-challenges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/11/5/digital-legacy-preserving-memories-for-generations-to-live-eternally</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/10/21/embracing-the-future-of-cybersecurity-remote-guardians-vision-in-an-ai-driven-world</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/5/24/democratizing-ai-security-ai-for-an-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/5/2/ai-is-the-sixth-intelligence-discipline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-03</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2024/1/8/enhancing-productivity-and-accelerating-remediation-the-power-of-osint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2023/12/18/revolutionizing-incident-resolution-a-deep-dive-into-cloud9s-cyberintelligence-engine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2023/12/11/navigating-cyber-compliance-safeguarding-business-success-in-the-digital-era</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2023/12/4/revolutionizing-aircraft-maintenance-the-kquika-trakt-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/pens-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-18</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/to-pivot-or-not-to-pivot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/8/5/cracking-the-code-the-secret-behind-cybersecurity-startup-success</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/7/26/the-need-for-speed-startup-accelerators-explained</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/7/20/the-startup-storm-is-approaching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/0c47d4e2-4601-406a-9acb-83eee6f69387/Seed.jpg</image:loc>
      <image:title>Blog - The Startup Storm is Approaching - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/72024a7c-6774-46cc-ade0-a047543fb7af/Series+A.jpg</image:loc>
      <image:title>Blog - The Startup Storm is Approaching - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/971c3f39-b74d-4510-97e8-327b07201d85/Series+B.jpg</image:loc>
      <image:title>Blog - The Startup Storm is Approaching - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/40e69f56-6534-4627-ab6b-54801f35e5be/Series+C.jpg</image:loc>
      <image:title>Blog - The Startup Storm is Approaching - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/7/15/the-source-matters-the-unofficial-case-of-us-sbir-startup-funding-v-china</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/6/21/the-precipice-of-monopoly-what-a-us-bill-could-mean-for-the-future-of-big-tech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/6/21/the-seaflower-trojan-horse-campaign-how-to-protect-your-digital-wallet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/af55e14f-35f1-498f-bba3-8c4dd3ffbec4/Dual-Factor+Authentication.png</image:loc>
      <image:title>Blog - The Seaflower Trojan Horse Campaign: How to Protect Your Digital Wallet</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/6/21/its-alive-could-artificial-intelligence-really-be-near-human-intelligence-levels-</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/private-equity-deals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/zelenskyy-deepfake</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/gdpr-vs-ccpa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/4/8/offensive-security-vulnerability-assessment-vs-penetration-testing-vs-red-teaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/hacking-tutorial</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/russia-ukraine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/israeli-startups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/state-privacy-laws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/3/2/hybrid-warfare-in-the-russiaukraine-conflict</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/7c69b6c2-4bc1-41fd-8bcc-c9242622832a/tweet.png</image:loc>
      <image:title>Blog - ‘Hybrid Warfare’ in the Russia/Ukraine Conflict - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/57b683f9-0a71-44a5-a56c-48287141f3be/wiper.png</image:loc>
      <image:title>Blog - ‘Hybrid Warfare’ in the Russia/Ukraine Conflict - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/federal-privacy-laws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/pow-vs-pos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cryptocurrency-contrarian</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/dei-startups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/utility-crypto</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/securing-metaverse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-02-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/9f67304f-5e97-4c1e-9ef8-092d6256b833/metaverse.png</image:loc>
      <image:title>Blog - Securing the Metaverse - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/cd4e585d-607c-4caf-8a98-9ec855722d1f/headset.png</image:loc>
      <image:title>Blog - Securing the Metaverse - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/db8e9301-4749-4351-b7b7-20e3f366b2cc/identity.png</image:loc>
      <image:title>Blog - Securing the Metaverse - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/1/31/it-security-governance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cmmc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cookie-fines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/a5bee473-f7c6-40e7-aa87-6cb60b0bc333/france+cookie.png</image:loc>
      <image:title>Blog - Meta and Google fined $238M by French Privacy Watchdog: How to think about cookies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/14425cec-06ec-4c96-991a-360e99b1d1c4/cookie.png</image:loc>
      <image:title>Blog - Meta and Google fined $238M by French Privacy Watchdog: How to think about cookies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/aa13fa5a-0892-4900-8c68-66af18da1f65/amazon.png</image:loc>
      <image:title>Blog - Meta and Google fined $238M by French Privacy Watchdog: How to think about cookies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2022/1/13/log4j-obtego</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/c54ffd93-0511-47d9-8ea8-dc2c80bc39cc/nmap.png</image:loc>
      <image:title>Blog - The Log4J Vulnerability That Didn’t Have to Exist - Make it stand out</image:title>
      <image:caption>Invis Means Zero Open Ports</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/browsing-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/692f21de-6ad3-4fc1-a831-79d30172c978/alert.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Safely Browsing the Web - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/29114463-71df-46ad-9567-bb3abce88f8e/browseralert.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Safely Browsing the Web - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/ac76a24d-4fda-4d67-817f-3f83e1d0582a/linkcheck.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Safely Browsing the Web - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021-year-review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/log4j</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/996432fe-9ba5-4910-a485-8b5450e3fdd5/log4j.png</image:loc>
      <image:title>Blog - Understanding the Log4j Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/15876363-27c9-4cbc-9c6f-7313cdfb5a95/moderninfra.png</image:loc>
      <image:title>Blog - Understanding the Log4j Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021/12/28/defi-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/pw-mfa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-12-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/053338a1-024c-45e9-ad45-db79f9d4059e/pw.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Passwords and Multi-factor Authentication - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/android-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-12-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1d3adc76-e1d9-4688-aa2d-c150d5e48d3a/smartlock.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Android Device - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/90baea11-aaae-4b6f-9b57-c967e8a88fd2/playprotect.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Android Device - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/04a2ac1f-6bdc-4a1e-b0b4-2a44223d0223/androidvirus.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Android Device - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/contrarian-view</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-12-13</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/scalability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/iphone-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/582a8d50-2662-495b-830a-ca87c22380bc/touchid.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: iPhone Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/67170a3e-5d3b-453a-834e-d271427ce38e/1panel.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: iPhone Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/299ae92f-f9d0-43bb-9f9f-fffa2d28e6cd/3panel.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: iPhone Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/pc-security-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-11-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/e6588c37-0997-4d40-8bc4-99d0c0b9a1b9/update.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: PC Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/59bec0cd-ce66-4f2d-b6b1-7d6ee70c5b5f/providers.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: PC Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/cdd5c012-4f93-477f-9bdc-01c04b2eff9c/backups.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: PC Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/home-wifi-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-11-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/db59b801-c7a3-4210-9252-18b36f3f6958/firewall.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Home Network and Staying Safe on Public Wi-Fi - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/60f979b7-791a-49ab-89c2-928de3ab8bfb/vpn.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Home Network and Staying Safe on Public Wi-Fi - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/afccf1bb-8e5d-47f3-a8f9-e1be2bb82d26/padlock.png</image:loc>
      <image:title>Blog - MACH37 Cybersecurity Guide: Securing Your Home Network and Staying Safe on Public Wi-Fi - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/dark-huntor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/ddcba1f6-09bb-4dca-8343-04ecf40829f3/tor.png</image:loc>
      <image:title>Blog - Operation Dark HunTor: What is the Dark Web? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/35e5cfcb-2a5c-4743-ae49-fcc582dbc2a2/tor+relays.png</image:loc>
      <image:title>Blog - Operation Dark HunTor: What is the Dark Web? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/differentiate-your-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/social-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/windows11-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/e63c5d7f-efc3-49ea-803b-57263ed2d996/window11.png</image:loc>
      <image:title>Blog - Windows 11 Release: What's new for security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/2cbb4403-f8d5-4354-ac70-5a736bd792ac/install.png</image:loc>
      <image:title>Blog - Windows 11 Release: What's new for security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/quantum-crypto</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/ae816649-74d4-4b28-9ad1-88975e2a0c82/bitlock.png</image:loc>
      <image:title>Blog - Cryptocurrencies and Quantum Computing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/10767dee-b11b-4b00-ad8b-b331c3727c09/51.png</image:loc>
      <image:title>Blog - Cryptocurrencies and Quantum Computing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/bracing-crpto</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cryptocalypse</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1634218151161-C47JJCP16ZR20CIDB7X2/sym+vs+asy.png</image:loc>
      <image:title>Blog - What is the Cryptocalypse? When is it coming? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1634218044711-4Y98DZ4T7SPDQR3LIOYL/tree.png</image:loc>
      <image:title>Blog - What is the Cryptocalypse? When is it coming? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/medical-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1634092442079-O8YIM0EZVR2EUKEL2KWE/pacemaker.png</image:loc>
      <image:title>Blog - Growing Regulation of Medical Device Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1634092416107-FXXRLZTLTIIZY5OPZ20F/healthnet.png</image:loc>
      <image:title>Blog - Growing Regulation of Medical Device Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1634092386697-Y1JVQGLOCKJWRQ2FDWYR/fda.png</image:loc>
      <image:title>Blog - Growing Regulation of Medical Device Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/5g</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1633638261251-MLQ1I14R7F0GM5TE8DZB/5g3.png</image:loc>
      <image:title>Blog - The Race to Secure 5G - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1633638224828-0073VXFRGPWOIDTSUUAR/5g2.png</image:loc>
      <image:title>Blog - The Race to Secure 5G - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1633638188936-XPG3RO15GAI6QE1GAZDC/5g1.png</image:loc>
      <image:title>Blog - The Race to Secure 5G - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/automotive-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1633398799624-MKMM15NUAUBBX6MFBZHG/lgcybellum.png</image:loc>
      <image:title>Blog - Automotive Security in 2021 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/privacy-innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/resurge-ransom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1632521333941-ENMHXJSCA825P6CFVS0A/blackmatterules.png</image:loc>
      <image:title>Blog - Resurge of Russian Ransomware Gangs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1632521296016-EBKKATRWW733OTO823ZU/chat1.png</image:loc>
      <image:title>Blog - Resurge of Russian Ransomware Gangs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1632521266648-F3D5QEL5HNDQOTUSXKFD/chat2.png</image:loc>
      <image:title>Blog - Resurge of Russian Ransomware Gangs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1632521240140-V7YEDA69LERH47T030BE/conti.png</image:loc>
      <image:title>Blog - Resurge of Russian Ransomware Gangs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cyber-insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/russia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/yandex</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1631885378385-ZJ43G78BUQU1W30TDAXV/meris.png</image:loc>
      <image:title>Blog - Yandex Survives Record DDoS Attack From New Meris Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1631885427010-IK33939EHSVO29TV4FLT/protect.png</image:loc>
      <image:title>Blog - Yandex Survives Record DDoS Attack From New Meris Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/usa-hacker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/anonymous</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1631192486379-9OPI0ZJOLKYWPV2781I8/anonweb.png</image:loc>
      <image:title>Blog - Hacker Profile: Anonymous - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/iran-profile</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/whitehouse-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/tmobile-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1630358919229-Z0GYKN8PSXWIY4VPRAW5/tmobile.png</image:loc>
      <image:title>Blog - T-Mobile Breach: Who’s behind it and what YOU can do to protect yourself - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1630358949806-DDMIXYYX6XJUKVV6WSMN/hacker.png</image:loc>
      <image:title>Blog - T-Mobile Breach: Who’s behind it and what YOU can do to protect yourself - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1630358983409-N5CMRW3GYNSKKA87SZL7/pswdcheck.png</image:loc>
      <image:title>Blog - T-Mobile Breach: Who’s behind it and what YOU can do to protect yourself - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/china-hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/afghan-footprints</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/sase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628788967799-CGJ0M5I2JAYU1BMOTMQ2/sase.png</image:loc>
      <image:title>Blog - Emerging Concept: Secure Access Server Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628789016090-Z30T7VXUK6U3QO6S5UXY/hubspoke.png</image:loc>
      <image:title>Blog - Emerging Concept: Secure Access Server Edge - Make it stand out</image:title>
      <image:caption>Old hub and spoke architectures can be replaced with SASE models</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628789166743-WZ75S5I60SBZUAJDS0VU/sasecomp.png</image:loc>
      <image:title>Blog - Emerging Concept: Secure Access Server Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/web3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628178350843-S395ZJFLCSETHFY9CYFM/webhistory1.png</image:loc>
      <image:title>Blog - Web3: The New Internet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628178380228-ERJ8PLWZ474QIGQFX82J/staticweb.png</image:loc>
      <image:title>Blog - Web3: The New Internet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628178407750-0YAOG0PLUIQE35K565FY/web2.png</image:loc>
      <image:title>Blog - Web3: The New Internet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628178438549-IKPSSIMPPESSIZDRWQOR/web2v3.png</image:loc>
      <image:title>Blog - Web3: The New Internet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1628178652267-LYG3N9JD71XBKQJCQWXW/table.png</image:loc>
      <image:title>Blog - Web3: The New Internet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cyber-unicorns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918401724-XNW7XGMPT6R5ZZ4NXH13/seed.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918451156-428YFGD0RLQ35U1XEB8F/unicorn.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918479916-YURSKDOJ6T45Y18ZOF20/armis.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918504583-P3M6Z96O8AVK62G0ZUA3/idme.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918526172-C4PI5UY1F6EW8YKI5PQ4/orca.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918553978-DUHRXA9DW4RDHAV4J0MG/sign.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627918586639-M68QUMJJI6L81L95UW6K/axonius.png</image:loc>
      <image:title>Blog - 2021's Surge in Cybersecurity Unicorns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/pegasus-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627428008823-KNDRZ7MBDIFX4L7N4VQU/pegasus.png</image:loc>
      <image:title>Blog - What is the Pegasus project and what have we learned from it? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1627428286006-45RDGU6BM89J28TUC3VL/targets.png</image:loc>
      <image:title>Blog - What is the Pegasus project and what have we learned from it? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/iot-blockchain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626995438742-59ED6NMNT5XPF7O4AJSD/iotapp.png</image:loc>
      <image:title>Blog - Securing IoT Data With Blockchain Technology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626995479930-ZG0MNXXLKHAJ1XPQ3MH9/suppchain.png</image:loc>
      <image:title>Blog - Securing IoT Data With Blockchain Technology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626995491974-7J2QLJL5UOVDXPO147R5/aryia.png</image:loc>
      <image:title>Blog - Securing IoT Data With Blockchain Technology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/token-economy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626707848031-RFGJ1EVLLV40H8US2A3M/webhistory.png</image:loc>
      <image:title>Blog - Token Economy - The Future of Digital Enterprises? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626707934989-TF9IRCS3SOLSWNYXT1YK/feedback-loop.png</image:loc>
      <image:title>Blog - Token Economy - The Future of Digital Enterprises? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626707980640-PC4FMTCD4058VHJZN361/tokenkeyboard.png</image:loc>
      <image:title>Blog - Token Economy - The Future of Digital Enterprises? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/crypto-fueling-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626374480421-SWYFOQSKM593S5VIUS7B/bitlock.png</image:loc>
      <image:title>Blog - How Cryptocurrencies Could be Fueling Ransomware Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626374549469-YZKRTGRU3AMYF76NVLU4/bitanon.png</image:loc>
      <image:title>Blog - How Cryptocurrencies Could be Fueling Ransomware Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626374576662-CXFW390WLXJURMC5203X/bittrace.png</image:loc>
      <image:title>Blog - How Cryptocurrencies Could be Fueling Ransomware Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/blockchain-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626126614446-LDGJMXWZUHHHY69Y0ZZZ/blocksec.png</image:loc>
      <image:title>Blog - What is blockchain and why is it a powerful cybersecurity solution? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626127003621-FJK9VU90IIDEYRBHT1ND/blok.png</image:loc>
      <image:title>Blog - What is blockchain and why is it a powerful cybersecurity solution? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1626127047130-SI0DV1W7IX5NCW4A02Q6/blok_org.png</image:loc>
      <image:title>Blog - What is blockchain and why is it a powerful cybersecurity solution? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/kaseya-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625778623942-4DNCSA074E82YM81IF7R/revil.png</image:loc>
      <image:title>Blog - Kaseya Ransomware Attack: Hackers Demand $70 Million for Joint Ransom - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021/7/7/ransomware-attacks-are-coming-soon-to-a-business-near-you-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/ciem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625600140422-LVNM549O7WOGPWMQ41T1/cloudiam.png</image:loc>
      <image:title>Blog - Cloud Infrastructure Entitlements Management (CIEM) - Why Identity Management in the Cloud is Difficult - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625600198514-NV4CRYZQQKZTCGIBAYOW/solar.png</image:loc>
      <image:title>Blog - Cloud Infrastructure Entitlements Management (CIEM) - Why Identity Management in the Cloud is Difficult - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625600259659-EEV87HTXUYHIZY2CAG9H/ciem.png</image:loc>
      <image:title>Blog - Cloud Infrastructure Entitlements Management (CIEM) - Why Identity Management in the Cloud is Difficult - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/cyber-response-times</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625184529092-JXYYFBVB92I9DE744YEQ/patch.jpg</image:loc>
      <image:title>Blog - Response Time to Critical Vulnerabilities as a New Security Metric - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625184644284-ZV43H8UH970VLKAXBXIP/lock.png</image:loc>
      <image:title>Blog - Response Time to Critical Vulnerabilities as a New Security Metric - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625184696893-HD4VJ91LLA0DZHDT0GQR/auspex.jpg</image:loc>
      <image:title>Blog - Response Time to Critical Vulnerabilities as a New Security Metric - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/colonial-pipeline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625091405582-Y4E30STWDTIFPUCZD4M0/passwordless.png</image:loc>
      <image:title>Blog - The Colonial Pipeline Hack and the Possibility of a Passwordless Future - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1625091550510-1E2UW7601TMVEV2RFIDA/cysecure.png</image:loc>
      <image:title>Blog - The Colonial Pipeline Hack and the Possibility of a Passwordless Future - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021/1/27/launch-day-guest-speaker-bryan-ware-next5-founder-amp-president</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021/1/19/cyberstanc-introduces-newest-addition-ripx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1611078749254-PEDMZYRMUI2HB80DJLL2/Screen+Shot+2021-01-19+at+12.52.17+PM.png</image:loc>
      <image:title>Blog - Cyberstanc Introduces Newest Addition - RIPx!</image:title>
      <image:caption>RIPx project comes with multiple specialized APIs that allows you to scan your files and get IOCs on the run. Scanner API Scan Ransomware/malicious file with Scrutiny and Swatbox engine. Block malware before it uploaded or shared to Storage or any Cloud platform. Build services to move malicious files to quarantined buckets. Extract Archive File Uploads with multiple file upload features. Built your own IOCs Lab. IOC API Global data exchange for IP, Domain Name, Hash, URL related detection, and integrate with your security control for increasing the detection process by 2times(2X). Threat detection Data exchange for internal TIP, SOAR, XDR, EDR, SIEM or WAF/IPS/NGFW, and other security device logs Correlation and traceability of external security events, etc. Using the Dark Web for Threat Intelligence</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1611078863728-8U1CM517LUY1UKX4BMLD/Screen+Shot+2021-01-19+at+12.54.10+PM.png</image:loc>
      <image:title>Blog - Cyberstanc Introduces Newest Addition - RIPx!</image:title>
      <image:caption>Our services enable companies to understand the nature of Ransomware threats; threat actor campaign, their TTPs mapped to MITRE ATT&amp;CK, and validates your current security posture. When it comes to detecting and mitigating threats, speed is crucial – we block attacks via known vectors, reducing the damage caused by advanced attacks and enhancing overall security strategy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2021/1/7/its-past-time-to-hide-the-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/12/22/20-years-of-cyber-attacks-that-call-for-international-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/12/22/3srh4tqy93nttbnt00pzbi9x4bvv5c</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/12/22/world-leaders-of-encryption-is-no-longer-in-the-united-states</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/7/12/spring-2020-launch-day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1608672990643-JMXVVYEUAWSQXK9QPBVW/S20Results</image:loc>
      <image:title>Blog - Spring 2020 Launch Day</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/6/5/propel-the-well-the-importance-of-connection-amp-support-for-social-wellbeing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2020/4/21/welcome-spring-2020-cohort</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/12/01/atomicorp-mach37-alumnae-interview-with-michael-shinn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/11/20/cyber-algorithms-acquired-by-thychotic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/11/02/cyph-mach37-alumnae-interview-with-ryan-lester-and-josh-boehm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/10/14/guest-blog-by-michael-wellman-virgil-securitys-4-million-series-a-round-is-about-more-than-just-fundraising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739951115-H7DMJE8ULYYOGGHHFNN8/virgil-founders-at-techcrunch-crunchies.jpg</image:loc>
      <image:title>Blog - Guest Blog by Michael Wellman:  Virgil Security’s $4 Million Series A Round Is About More Than Just Fundraising</image:title>
      <image:caption>Michael Wellman and Dmitry Dain, founders of Virgil Security</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/10/12/virgil-security-raises-a-4-million-series-a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739950914-WZ1Q7VJN5HN5771MK4H7/virgil-co-founders-with-rick-gordon.png</image:loc>
      <image:title>Blog - Virgil Security Raises a $4 Million Series A</image:title>
      <image:caption>virgil-co-founders-with-rick-gordon</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/09/29/mach37-alum-hill-top-security-wins-virginia-velocity-tour-nova-award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-09-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/09/22/piercematrix-mach37-alumnae-interview-roy-stephan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/08/25/mach37-spring-class-2016-interview-hilltop-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739946228-02UAZDUEJ9W89PPI6E7X/2016-06-14-m37-demo-day-08-htsi-dsc_3364.jpg</image:loc>
      <image:title>Blog - Mach37 Spring Class 2016 Interview: Hilltop Security</image:title>
      <image:caption>2016-06-14 - M37 Demo Day - 08 - HTSI - DSC_3364</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739946314-T5CIWRQXBU1OY3E2PKSK/htsi.png</image:loc>
      <image:title>Blog - Mach37 Spring Class 2016 Interview: Hilltop Security</image:title>
      <image:caption>HTSI</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/08/10/mach37-spring-16-class-interview-unblinkr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/07/27/three-year-update-lessons-learned-so-far-from-the-mach37-experiment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739945383-IN5QZUEJFPNVXEYH43C9/mach37blog3years.png</image:loc>
      <image:title>Blog - Three-Year Update: Lessons Learned (So Far) From The Mach37 Experiment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/06/28/mach37-spring-16-class-interview-pcpursuit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-28</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2016/01/26/a-tale-of-four-cities-with-apologies-to-dickens</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739937146-GX2S3JQDW2N8J91GZM4A/slide2-e1453580781721.png</image:loc>
      <image:title>Blog - A Tale of Four Cities (with apologies to Dickens)</image:title>
      <image:caption>Slide2</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739937248-LVJ3E9ZBQ5RYZ86RT7Y5/slide4-e1453580739173.png</image:loc>
      <image:title>Blog - A Tale of Four Cities (with apologies to Dickens)</image:title>
      <image:caption>Slide4</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739937782-OJF8EV2I7Y8W6TFBJHR7/slide1-e1453581303776.png</image:loc>
      <image:title>Blog - A Tale of Four Cities (with apologies to Dickens)</image:title>
      <image:caption>Slide1</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739937346-NZ47M5Z9USZ4PZKU0PRQ/slide3-e1453581533969.png</image:loc>
      <image:title>Blog - A Tale of Four Cities (with apologies to Dickens)</image:title>
      <image:caption>Slide3</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1671739938249-LP4H2ZSP124MVZ5CQ1M8/st-apts.png</image:loc>
      <image:title>Blog - A Tale of Four Cities (with apologies to Dickens)</image:title>
      <image:caption>ST Apts</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2015/10/08/cyber-insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2015/06/09/bring-your-own-keys-bringing-trust-into-saas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-09</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2015/06/02/cisos-dont-want-your-analytical-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2015/03/16/the-innovation-kill-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2015/01/19/differentiating-cybersecurity-startups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-01-19</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/11/02/information-security-can-we-win</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-02</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/09/23/cto-smackchat-so-what-do-you-do</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/07/30/why-mach37-loves-the-hacker-community</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/06/02/the-cyber-security-market-is-hot-heres-why</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-02</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/05/19/industrial-cyber-espionage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-05-19</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/04/21/cto-smackchat-the-dreaded-pivot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/04/10/security-spaces-worth-watching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/04/04/to-mach-or-not-to-mach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-04-04</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/02/11/cto-smackchat-minimalism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/01/28/reflections-on-mach37-f13-and-some-news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/01/17/achilles-heel-sales</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/01/15/thesalmonspeaks-net-neutrality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2014/01/08/cto-smackchat-technology-is-not-innovation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2013/12/06/you-dont-scale</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-12-06</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2013/11/18/what-type-of-entrepreneur-are-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2013/08/28/stay-east-young-man</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-28</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2013/08/14/creating-a-market-focused-and-product-oriented-company-is-not-a-part-time-job</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/blog/2013/08/08/the-cyber-beltways-innovation-dislocation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2013-08-08</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/2025</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/2025/2025/6/18/calling-all-artists-bring-cyber-to-life-through-art</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-11</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/startups</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550210044386-OUSTSHBSJC9U6W663Y9X/image-asset.jpeg</image:loc>
      <image:title>Startups</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/about-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550209592420-7R2Q0FBYMYW90TGQXOAZ/image-asset.jpeg</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/mentors</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550699195625-P6GACQF0WS4S8JWVG07H/image-asset.jpeg</image:loc>
      <image:title>Mentors</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550698865240-L3RBCC12F0EZUVQNXWK6/image-asset.jpeg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722449502-KV273YNZFS6PXZ6XU8RS/download.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722385788-Y1SRT1V5ZEOVTDYEBGFW/novachamberlogo.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722394707-T86VKW1PSJDMH4L34DSY/MTC35years-tagline.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1675277551355-O243IYFA87F2J5NDACJQ/vipc+logo.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589898726996-M1ETDAQAIUA7H1449WFF/blulogo.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722454147-LOFGLRDTWA0R4IGZZNNW/AED.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1675277280911-326LF25SRQ8BLP5K0QQZ/Loudoun+Economic+Development+logo.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589898696477-40RT49D6RLX2MPQ4R9QU/merlinlogo.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722489672-IWP5HSMF8N9SN4Q4GVYM/AWS.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1574444633369-JSNPJA02H409C6HC0FYK/f6slogo.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722591516-F75H79YBZXAWYJFUD8EB/GoogleForStartups.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722611713-V7I433FT6WWWH7LRCNJ0/SecureSet.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722717584-60TVEX8VSMR36W0MSIL2/SAPHana.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722809403-1374DR5Y2Q3CGTYQYFRW/Gartner.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722819043-CXD4TE2N2A6MHIU9YOQE/CARTA.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722826020-YXMGWW1VFXU1OOC5F2JM/Virtru.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722842499-3ZD0ZRNA44LPL0UK50KQ/Glidr.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1550722930151-YQZOBINH6JUL9TJJK55R/Cyberscoop.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144616532-TTZZ03W1ZWBHNRQDDOXQ/Commonwealth-Cyber-Initiative.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144846781-L0JCYMF6ARUURQN659P4/columbia-university-logo-png--1200.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144858582-67TTQS4DUZNMRD33BUJ5/LANG-2626512416.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144878516-QCCEF2JJPQKR4RFC0O23/usafa-logo-wide.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589898683849-M0DDL8IVMJFILP90DZC9/gmulogo.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144894887-VVVQ5QF5ABK4E4D02R3O/University_of_Mary_Washington-3289823004.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1683144906326-NIL82TZTLM95B6U4GFX7/Marymount.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/our-team</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1659125835712-IANXEIDD7YCYEJK52Q4L/unsplash-image-CH6-cfiY2Yo.jpg</image:loc>
      <image:title>Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/f61bee9c-fdc2-4b5d-aebb-f5f6ef919b54/VentureScope-Jason+Chen.jpg</image:loc>
      <image:title>Team - JASON CHEN - CEO &amp; Executive Director</image:title>
      <image:caption>Jason is VentureScope’s Founder and CEO and MACH37’s CEO and Executive Director. He is a business strategist, entrepreneur, and early stage venture investor with more than 19 years of experience leading business planning and consulting engagements for entrepreneurs, small businesses, and multi-national organizations in both the private and public sector. Jason is a former Techstar’s Entrepreneur-In-Residence and was the Director of their Startup Next Cybersecurity DC pre-accelerator program that was designed to provide cyber startups with expertise and mentorship. In addition to founding VentureScope, Jason also co-founded HackEd, a cybersecurity hands-on-keyboard cybersecurity training company, and WeatherAlpha, a weather data analytics company. Jason holds a MA from Harvard University, and a BA from the University of Virginia. He is also certified in InnoCentive’s Problem Deconstruction and Challenge-Driven Innovation methodologies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/04487807-9778-4b86-bb17-ed80920d8444/VentureScope-Jennifer+Quarrie.jpg</image:loc>
      <image:title>Team - JENNIFER ADDIE - COO, CWO &amp; Strategy Director</image:title>
      <image:caption>Jennifer is a professional innovation strategist, entrepreneur and investor who facilitates organizations through all stages of innovation and acceleration, from startups to large enterprises across the public and private sectors.  Leveraging decades of international business experience to help organizations transform, bridge cultures and de-risk ventures, Jennifer’s approach to innovation emphasizes effective problem deconstruction, strategy development, methodological integration, applied cognitive and behavioral approaches, iterative and experiential learning, and holistic wellbeing practices.  As COO and CWO of VentureScope® and MACH37 Cyber Accelerator® she helps lead the consulting, investment, emerging tech scouting, training, accelerator operations and entrepreneurial wellbeing practices.  Jennifer also serves as an adjunct professor of Entrepreneurship teaching Lean Startup at seven universities, a Creative Problem Solving (CPS) facilitator, a certified instructional systems designer (CISD), and leader in entrepreneurial wellbeing with a BA in Cognitive Neuroscience from the University of Virginia as well as a Master of Science in Creativity and graduate certificate in Creativity and Change Leadership from the International Center for Studies in Creativity (ICSC) at the State University of New York (SUNY) Buffalo State.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/cf24529f-52e1-4c1a-b8ff-77da4379cd45/Headshot+4_Lindsey+Polley_Color.jpg</image:loc>
      <image:title>Team - DR. LINDSEY POLLEY de LOPEZ, PhD - Director of Cyber &amp; Space Intelligence</image:title>
      <image:caption>Dr. Polley is VentureScope’s Director of Disruptive Technologies, and MACH37’s Director of Cyber &amp; Space Intelligence. She is a futurist who specializes in the emergent landscape around cyber and “cyber-adjacent” technologies, providing C-Suite and SES-Level leadership with strategic and advisory services related to the research and analysis of disruptive technologies within the commercial sector. Dr. Polley also leads embedded strategic advisory cells that provided emergent technology solution identification for segments of the DoD, with an emphasis on space applications. Prior to joining, Dr. Polley served as a defense and policy researcher at the RAND Corporation where she worked on cyber and defense-related science &amp; technology projects spanning the DoD, DHS, and the IC. Her doctoral research examined the United States Government’s Vulnerabilities Equities Process for assessing software vulnerabilities, and the intricacies of balancing the various equities involved. She has been featured in several high-profile outlets, including SXSW, Lawfare, OODA Loop, America’s Future Series events, GEOINT Symposium, and the international Ground Systems Architecture Workshop.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/4801c9b2-9de9-4f3b-a443-18a7f4b3ecd1/IMG_7291+%281%29.jpg</image:loc>
      <image:title>Team - SARAH SAFER - Community Engagement Specialist</image:title>
      <image:caption>Sarah is a graduate of Rutgers University, where she earned her degree in Psychology. During her undergraduate studies, she also studied at the Hebrew University of Jerusalem, expanding her academic focus through international coursework and cross-cultural learning experiences. She enjoys bridging people, process, and community to ensure strong impact.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/s19</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589896861411-TDPP3Y55XZ758A18TIYM/IMG_8756.jpg</image:loc>
      <image:title>S19</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555274866843-0LHWLBRQ0B8FHWDUO9KB/FM%2BLogo%2BHorizontal%2BLight%2BBG.jpg</image:loc>
      <image:title>S19</image:title>
      <image:caption>FortMesa operates at the intersection of behavioral economics and security economics. FortMesa's security triage methodology guides organizations in developing and maintaining a comprehensive security strategy which manages most cyber losses and reduces overall cyber costs. FortMesa uses a variety of nudges and boosts to stimulate security action and reduce resistance factors. FortMesa maximizes security task compliance by delivering the right task at the right time to key individuals throughout the organization. FortMesa's team-based workflows effectively defend from cyber losses without without specialized cyber labor, and where security teams exist FortMesa acts as a force-multiplier by coordinating support across the organization.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555273949935-Z3R32ABF1DA0QJGP4X5M/Asset+6%4011x.png</image:loc>
      <image:title>S19</image:title>
      <image:caption>At Aryia, we are leveraging blockchain to disrupt the invasive smart speaker industry by building the first blockchain-powered smart speaker with focus on privacy while creating an entire ecosystem around it. We answer today’s data privacy concerns by giving users control over their data while also rewarding them for any involvement in the Aryia ecosystem. Rewards can later be spent within the decentralized voice-skills marketplace. Aryia aims to provide a powerful voice enabled A.I. solution for both individuals and corporations, either in the shape of a proprietary smart speaker or, in future, as a third-party device. Our goal is to disrupt the smart-speaker marketplace and challenge today's security and data collection practices by letting individuals take control of their own private information.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555274205448-S05643FFU0RI6RH3CZNV/blk+and+red.png</image:loc>
      <image:title>S19</image:title>
      <image:caption>We believe that every business man or woman should have access to certified cybersecurity talent to keep their starting, growing, or established companies safe and secure. Malwork has the capability to end the talent gap problem through its proprietary PAAS technology. Our platform provides the necessary cybersecurity skill-sets by acting as a Workforce multiplier for companies without Cybersecurity personnel; allowing for talented Security Analyst, CISO’s and Security Engineers to lend their talents to small virtual teams to build and maintain a secure company infrastructure with 24/7 access to cyber services.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555274233650-RV2RPXHT8W1ULZ72752Q/DefiniSec+Logo</image:loc>
      <image:title>S19</image:title>
      <image:caption>Definitive Data Security was created in 2014 to manage application data and email despite growing Cybersecurity threats. In 2015 we released SSProtect and KODiAC Cloud Services, delivering patented innovations that require attackers to compromise endpoints and SaaS cloud resources to access managed content. With fine-grained 2FA and native application workflow integration, we delivered the first protection and management solution to impose almost no impact on application selection and use while retaining full infrastructure flexibility. In 2016, we expanded our service foundation with policy-based Collaboration, automated Backup/ Restore, Disaster Recovery services, Sabotage Remediation, and finally our Objective Disclosure Risk Reporting services. Each was designed to maximize Incident Response, Recovery, and Forensic operation efficiency while together as a whole aligned to maintain business and operational continuity in the most challenges circumstances. Today, we are working with VARs, MSPs, and ISVs to address the unique needs of finance, health care, government, entertainment, and other industries with our scalable, secure data management platform that’s easy to deploy, administer, and use.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f18</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-12-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555624491886-5M093AWBJ82YZ0NDACV9/image-asset.jpeg</image:loc>
      <image:title>F18</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555623795811-H7LEVNOV9DL16TXVIMVA/ANOVA+INTELLIGENCE+logo+hi+res.gif</image:loc>
      <image:title>F18</image:title>
      <image:caption>ANOVA Intelligence finds the nation-state malware others miss. We arm enterprise and industrial targets with US intelligence agency-grade deep forensic analysis and the critical intel required to defend IT &amp; OT systems.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555623958783-ALA6J6IW5510WWPGWAJ2/Plutus_logo.png</image:loc>
      <image:title>F18</image:title>
      <image:caption>Plutus Privacy Security offers a solution to combat identity fraud. The use of Plutus' patented user authentication process coupled with existing cell phone location technology, which can successfully authenticate one's information and prevent fraud. This can be used at any point of sales terminals, ATMs, online shopping, loan applications, just to name a few.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555623977660-TQUO9EXAII0HMSGFRUU7/SicurroLogo.png</image:loc>
      <image:title>F18</image:title>
      <image:caption>Sicuro Innovations LLC is a cybersecurity software product company with embedded solutions that autonomously manage security for Internet of Things (IoT). Sicuro's proprietary artificial intelligence (AI) program, Hades, and its embedded security software platform, Osmium, concurrently combine edge-level optics and threat mitigation with cloud-based threat analysis to produce actionable global intelligence and threat deterrence for IoT devices.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f17</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-05-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625187071-UTA56OK6KBDH754VFDDK/image-asset.jpeg</image:loc>
      <image:title>F17</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625737322-22E8Q1UVGO3KQS5LP87F/runsafelogo.png</image:loc>
      <image:title>F17</image:title>
      <image:caption>RunSafe Security is the pioneer of a unique cyberhardening technology for vulnerable embedded systems and devices. Its technology renders threats inert by eliminating attack vectors, significantly reducing vulnerabilities and denying malware the uniformity required to propagate.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589896974691-AVSOZB1ZWH24XJ2SQ9VO/HQ_logo+%281%29.jpg</image:loc>
      <image:title>F17</image:title>
      <image:caption>HyperQube enables enterprises to quickly and easily build an exact copy of any infrastructure or network to determine how the connected environment responds to changes caused by software updates, new technologies, and unplanned events such as outages or cyberattacks. Our virtualized test environments can be built in minutes and just as easily modified, re-used and shared. HyperQube gives organizations a crystal ball look at the future to see and better understand what will happen.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625763503-BO1BS3K41P9MZHA6OF3A/statusidentitylogo.png</image:loc>
      <image:title>F17</image:title>
      <image:caption>Status Identity was founded with the belief that security can only be effective if it is easy to use. Our mission is to provide the best user experience for authentication by seamlessly integrating smart authentication into enterprise access controls. We protect organizations against data breaches by ensuring only legitimate users and updated devices have access to sensitive applications. The Status Identity service helps authenticate users to websites, apps, clients and other networked systems that have the Status API integrated into their systems without storing any personally identifying information.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625782170-UNG864F3D2A5J3PQ7AEJ/hideezlogo.png</image:loc>
      <image:title>F17</image:title>
      <image:caption>Hideez Group Inc. strives to provide the world with hard-ware and software solutions that ensure personal digital identity. The company was established in 2015, by a team of seasoned hardware specialists with more than 10 years of experience in creating successful solutions. Our flagship product, the Hideez Key - is a solution for wireless authentication, password management, credentials for RFID doors and additional capabilities for cryptocurrencies wallets and digital signature.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625803680-PTZ67FKZBVVVOCWOG65J/threatlocker.png</image:loc>
      <image:title>F17</image:title>
      <image:caption>ThreatLocker gives businesses back control to stop viruses, malware and cybersecurity breaches. Unlike traditional anti-malware software, ThreatLocker only allows applications that are approved by an I.T. administrator to run on their computers. Administrators can easily set policies dictating what type of applications can be run, and even permit access in real time or on a temporary basis. Current cyber-security solutions work on the basis of blocking known threats. Whereas ThreatLocker Control only permits approved applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555625821458-JG3PCLMPVGY10QX8ALOM/cynjatechlogo.png</image:loc>
      <image:title>F17</image:title>
      <image:caption>CynjaTech is a data security firm utilizing next-generation microcloud infrastructure to power the new CynjaTrust platform. With this revolutionary technology, any digital entity gains a competitive advantage by meeting a growing consumer and regulatory demand for data control and ownership, privacy, and security in a cost-effective, simple package.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s16</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762082866-PO4YJICWINWW2WH4628S/image-asset.jpeg</image:loc>
      <image:title>S16</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762156882-RYAQ42E6UOARGDUUL1JT/normshield.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>NormShield provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring. We harvest cyber threat data from multiple sources and provide actionable intelligence to our customers so they can take preventive measures. NormShield is 80/20 blend of automation and human intelligence that continuously monitors your assets, detects threats and helps you resolve issues before they are exploited</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762224709-YYUCXK522PF5742ROHVG/htsi.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>Hill Top Security provides a security incident response platform that automates and orchestrates incident response, delivering faster and smarter incident resolution. We optimize the efforts of security teams by eliminating false-positives, dynamically assigning severity ratings and providing secure collaboration with subject matter experts at critical stages of the incident response process. Hill Top’s service-oriented platform provides a flexible structure for integrating with existing applications and data to unify communications and minimize the operational impact of security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762430728-9TM6NYGFTQ9GJ6LNAIDT/gyomo.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>Phishing is the most effective enterprise attack vector -- though security professionals believe "you can't patch the human." We reject this reality and substitute Gyomo. Gyomo will create a hostile environment for social engineering using crowd sourcing and machine learning.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762459951-1OJPH5CU1SWPM0YD3TL1/unblinkr.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>Unblinkr is securing cars of the future by developing anti-hack software for V2X communications. Connected vehicle technology offers many benefits but makes cars vulnerable to hacking, making cybersecurity a top concern in the transportation industry.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762565952-J0W0XPWUT55C5T3JQ24R/pcpursuit.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>PCPursuit adds the dimension of physical presence to improve multi-factor authentication. Best of all, we accomplish this by leveraging security assets that enterprises already own: no mobile phones or Bluetooth beacons are required. Our technology adds even more value because it also works with SEIMs, adding a physical dimension to network security analysis.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762602387-SX771ABVR3ZRYUIZRGKI/provenance.png</image:loc>
      <image:title>S16</image:title>
      <image:caption>Current cyber threat intelligence is insufficient because it lacks the attributional information needed to empower legal and reputational responses to threat networks. Provenance improves threat intelligence by identifying the root cause behind cyber threats – the human actors responsible for harm. Provenance software collects, enhances and deploys intelligence to identify those behind threats and cut them off from the infrastructure they need to operate. Provenance is a strategic solution that uses more than technology.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f16</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628487640-B3BOO8B6KP9O5ZR3XBBE/image-asset.jpeg</image:loc>
      <image:title>F16</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1580859840545-76RIA4AG70PCUBKLKG4M/NS8-Logo-Web-Orange-Dark-Gray.png</image:loc>
      <image:title>F16</image:title>
      <image:caption>NS8 is a comprehensive fraud prevention platform that combines behavioral analytics, real-time scoring, and global monitoring to help businesses minimize risk. Its patented scoring technology provides actionable data about the type, quality, and trustworthiness of transactions, which businesses can leverage to automate fraud management workflows to suit their individual needs. NS8 also offers supplemental data through third-party extensions as well as seamless integrations with industry-leading ecommerce platforms that enable businesses to begin fighting fraud within minutes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628700987-889OLUJG79A81KQXP3L3/adlumin.png</image:loc>
      <image:title>F16</image:title>
      <image:caption>Adlumin, Inc provides an industry leading solution to detect attacks, in real-time, that would otherwise go undetected. After attackers have defeated your initial defenses, Adlumin implements intelligent user behavior analytics and active defense mechanisms to detect and deter the most sophisticated adversaries. We unmask the intruder so they can't move laterally and undetected in your network. We let you kick them out before they destroy what you have spent years building. Sentry is a Software as a Service (SaaS) cloud delivered proprietary platform that can be deployed in minutes. Visit our website at http://www.adlumin.com or send us an email at info@adlumin.com for a live demo.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628763494-R1W14FJPO4GHDMLVDULA/threatswitch.png</image:loc>
      <image:title>F16</image:title>
      <image:caption>ThreatSwitch is a software platform that helps companies with security clearances get and stay compliant with security regulations defend against insider threats. ThreatSwitch is like TurboTax for industrial security -- building amazing ease of use, leading security, and access to experts into an application that every security manager and executive can use.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628816697-Y715RO3N8SK16ZGRQSG2/Steelmntnlogo.png</image:loc>
      <image:title>F16</image:title>
      <image:caption>Having more devices in the home means more risk for your personal data and for most people, preventing viruses and other threats from compromising their data is complicated- especially as they add more devices into the home. We started Steel Mountain to make it easy for anyone to prevent viruses and other threats before they even enter your home. We do this by putting threat detection and prevention right at the gateway of your network with a device which simply plugs into your existing home router.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555760799602-9ZC0A78PKRZ8HASKP0YT/final.INFRA_copy.png</image:loc>
      <image:title>F16</image:title>
      <image:caption>*INFRA* Vulnerability Scanner identifies all vulnerabilities in the systems in your network that can be exploited to steal information or damage your company. INFRA verifies the potential vulnerabilities providing evidences. A comprehensive report with remediation and solutions to the issues and problems discovered is released to guides the security team to mitigate the risks. Infra can eventually quarantine the vulnerable machines lowering the risk to the company from unauthorized access and hacking.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s15</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763651136-80QSXSXH8P9ZMO745JLY/image-asset.jpeg</image:loc>
      <image:title>S15</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763804794-JXXBWJ4FB8ETUSZ7HKH6/shevirah.png</image:loc>
      <image:title>S15</image:title>
      <image:caption>Mobile shattered not only the way we conduct business, but also the assumptions underpinning current cyber security. The cyber industry fails to recognize this shift. Hackers have not. Already the vector used in over 40% of attacks, hackers shifted phishing to mobile following the shift of users off desktops. The recent iOS “Trident” vulnerabilities show that not even advanced persistent threats are absent from mobile. Shevirah simulates attacks so organizations discover mobile weaknesses before hackers do. Shevirah’s software expands models of penetration testing, continuous monitoring, and user awareness testing to corporate anywhere, anytime, mobility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763919430-16HK6OPG0L2RAO6FNTJ5/atomicorp.png</image:loc>
      <image:title>S15</image:title>
      <image:caption>Atomicorp’s software defined security technology protects servers and IoT devices from a wide range of security threats through system immunization, intelligent self-learning, application firewalling, attack surface reduction and self-healing, all in a solution that requires minimal configuration and is easy to install.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555764071617-GVSCTCQ16DFBTTAHNY9T/unomic.png</image:loc>
      <image:title>S15</image:title>
      <image:caption>Your devices are increasingly on the same networks as other people you don't know - and have no business connection to. UnomicEdge’s next generation network access control provides visibility, control and monitoring for multi-tenant and cross-domain edge networks. UnomicEdge was acquired by Caveonix in October 2017.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763859886-527QGSTR3Z9B6D42VJZ2/jekudo.png</image:loc>
      <image:title>S15</image:title>
      <image:caption>JeKuDo Privacy Company is building the best easy-to-use privacy tools, starting with group messaging. Our app is encrypted, ephemeral and designed for security - ideal for private chats with your closest friends and colleagues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763965166-BEVQ618G1HUGOWIGRFX2/anatrope.png</image:loc>
      <image:title>S15</image:title>
      <image:caption>Anatrope has developed remote sensors for vehicle location-based services for business intelligence and advertising, fee collection, location statistics for autonomous vehicles, and facility perimeter security.Our sensors remotely detect always-on features in vehicles to provide easily integrated automotive solutions using a signal that is unique for each vehicle.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s17</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555627333510-6KW7SI5TLRR9HZUF4FA3/image-asset.jpeg</image:loc>
      <image:title>S17</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555627658643-NG6O42HXDK7GF0K3FWF8/broadbridge+networks.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>BroadBridge Networks allows enterprises to secure all data-in-transit, without compromise, by providing an affordable network security solution with access control, policy enforcement, and high encryption, eliminating the traditional performance vs. cost limitations that make organizations choose between which data-in-transit to secure.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555627764087-7FZW4S67T6LY69JS3C6Y/trovolone+logo.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>Trovolone’s provides seamless IT Cybersecurity to any small team or branch office. Combining over 30 cyber security solutions along with customizable corporate controls in one easy to manage platform Trovolone provides phone, storage, network, cybersecurity, UX, and an appstore with a friendly “one stop” one way to plug, any way to use solution.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628053410-4EPMERZOQ8OMRLUEXG7Z/neo+eyed+logo.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>neoEYED protects critical applications accessed on mobile devices through implicit authentication. Users behavioral patterns are profiled and used to verify access on an application by application basis, during the login process completely transparent to the user reducing fraud, unauthorized access to sensitive information while increasing productivity and improving remote mobile security.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628301952-2LA4QL4CJ36TQCFRWUG6/securehomelogo.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>SecureHome connects to the local home router and inventories all “internet of things” devices running on the home network. SecureHome customers receive threat awareness and protection through anomalous behavior monitoring, alerting, and remediation. SecureHome customers get peace of mind that all their devices are not behaving in a way that intrudes their privacy, causes financial damage, or impacts their safety.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628111557-FVLHVQEZUCDKQID6LP74/automated+dl+logo.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>AutomatedDL is the next generation in artificial intelligence. ADL takes unstructured data and applies cognitive learning algorithms delivering over 400M training scenarios in less than a second from a laptop PC. The results allow companies to fine tune security defenses and reduce false positive never before imagined. Coming from the intelligence world ADL’s chip solution makes short work of vast server farms of data. “Deeper Insights, Reducing Uncertainty and Risk”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555628395956-PX5GH6LO1SBZGEI3VU4S/ekran+logo.png</image:loc>
      <image:title>S17</image:title>
      <image:caption>Ekran System helps companies of any size to build their strategies of mitigating user-based security risks through a universal user activity monitoring tool for corporate servers and desktops. Ekran’s unique approach is built around per-session video records delivering advanced search, analysis, and alerting capabilities. With unique flexible and scalable licensing and in-built access management and incident response tools, Ekran System meets security needs of both enterprises and SMBs.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f14</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555764691274-7A0LPE0981XP2POHDQML/image-asset.jpeg</image:loc>
      <image:title>F14</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555764869616-DRPSMXHGUQPJ0DRY9WGF/virgil.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>Developers can now quickly and easily add password-free authentication and strong encryption to their products in just a few hours instead of weeks or months… without being security experts themselves. Virgil Security, Inc., provides easy-to-deploy and easy-to-use cryptographic software libraries and a cloud-based public key management service for developers and end-users. Virgil Security enables a new generation of enhanced privacy and security for desktop, mobile, and web applications, cloud services, and the Internet of Things.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765316190-RSGQX93VK6KB34T9NGJ3/threatcare.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>In 2016, worldwide spending on cybersecurity tools reached $73.7 Billion and is expected to reach $101.6 Billion by 2020. Despite this spending, the number of data breaches is increasing. Threatcare is a cloud-based SaaS platform that gives organizations the ability to perform intrusion simulations to verify the effectiveness of their security tools.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765410684-7SA9VUX4Y0CH2B1ZDB8B/syncurity.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>Syncurity is a software company that saves security teams time. Syncurity’s IR-FLOW brings structure, visibility and workflow to your security team’s incident response activities. We streamline event triage, manage and measure investigations and incidents, and make collaboration easy. We are about to launch an integration and automation framework to speed up the enrichment of incoming events - so analysts can discard the false positives and escalate the concerning events even faster - focusing analysts on containment and remediation sooner - reducing risk.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765364835-W4GPL69MZ6E3LLUEL291/cyph.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>Cyph is a secure communication tool designed to be extremely friendly for users of any technical skill level, providing such features as video calling and file transfers to both individuals and businesses. The patent-pending end-to-end encryption technology underpinning Cyph — built by former SpaceX engineers — has been rigorously vetted with great success against a threat model that focuses on nation-state-level attacks. Start cyphing now at cyph.com.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765463553-321Q6RXIV0NVY87IKNOZ/bijoti.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>BiJoTi offers Security Performance Monitoring. BiJoTi provides next generation security event correlation, vulnerability detection and case management. This makes compliance and cybersecurity an informed, continuous process. BiJoTi's Security Performance Monitoring automates making healthy and effective cybersecurity decisions. Making intelligent cybersecurity and risk mitigation business as usual.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765519076-0H9BIV6D2ITKTMBSO7PV/securedb.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>User data is what attackers want. Yet 96% of breaches involve data that is not encrypted. Encrypting data properly is expensive, time consuming, and complicated. Startups and Small and Medium Businesses(SMBs) don’t have the time or resources to do so.… with SecureDB they do. SecureDB lets developers and SMBs secure their user’s data with a simple API, so they can get back to building the applications their users want. Our User Management REST APIs let developers implement Registration Screens, Login Screens, Password Management Screens, and Two Factor Authentication in minutes. Most importantly, SecureDB APIs encrypt the resulting User Profile data in transit and at rest.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765668770-H5AKXUZQVMH5ZH36T50Y/iaspire.png</image:loc>
      <image:title>F14</image:title>
      <image:caption>iAspire’s security management platform allows organizations to align information security to the specific needs of the business by utilize traditional encryption technologies to secure its valuable company information and retain real-time availability to this protected data in support of critical business applications such as eDiscovery, forensics and analytics. The iAspire platform allows large enterprises, with significant investment in traditional encryption technologies, to move to a flexible security architecture that allows them to implement end-to-end encryption for email, secure dropbox and other mission-critical applications without having to worry about adding a layer of complexity to compliance, analytics and data access processes.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s14</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765977290-OTQVXBMNHDIHFDH42ENP/image-asset.jpeg</image:loc>
      <image:title>S14</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766083758-IL1FWSI802H5OC26Q7SF/disrupt6.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>Disrupt6 has developed a new class of network intelligence that uncovers evolving threats that have existed invisibly since 2001. Our proprietary technology reveals attack strategies unique to the IPv6 Internet, identifies Internet hosts used for exfiltration of data, and provides precise geolocation of network attackers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766122710-VEHZ3C60EUV4D3GV64CH/cardkill.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>CardKill™ software preemptively terminates stolen credit and debit cards before they are used in fraud. It finds what other tools miss. We dramatically lower fraud loss for our bank customers so they can pass along trust, savings, and peace of mind to their customers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766171126-MU3YOXZG2AYVP439AWFZ/axonai.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>At AxonAI, we overcome the limitations of current approaches to analysis, decision-making, and operations by deploying swarms of simple software processes on massively parallel computing architectures that continuously assess new information, collectively contribute to the required analytic products, and learn from human input and real-world observations.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766231595-P5TN9BBTHTKOGOK2A2A9/fastorientation.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>Fast Orientation allows organizations to easily reason about and respond to enterprise events in real time, empowering them to make responsive and timely decisions without hiring a team of experts or outside consultants. By enabling companies to ask questions simply and find answers quickly, our products help promote operational health, continuous awareness, and enterprise security in a powerful and innovative way for companies of all sizes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766295642-M5RALC0UNU9UBST4S6XT/identia.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>IDentia Inc. is a technology company that specializes in identity and access management (IAM) for the enterprise cloud. Our flagship product, IDentia, enables organizations to streamline and automate IAM lifecycle processes in the cloud with scalability, efficiency, cost-effectiveness, and enhanced privacy protection. Integrating the latest industry open standards, IDentia is designed to maximize the security strength in enterprise systems in a cross-organizational environment.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766355174-YNW2F9DE85EDCRAUX8HJ/mdb.png</image:loc>
      <image:title>S14</image:title>
      <image:caption>MSB Cybersecurity's Security i-Cue product is an innovative risk-based security management solution that automatically measures, analyzes, and quantifies risk mitigation efforts and provides your organization with a comprehensive on-demand view of your security posture. Security i-Cue is easily added to an existing infrastructure to leverage an organization's tool and function data-set to yield a repeatable, rigorous, and continuous mapping of security controls. The Knowledge-base that is created by Security i-Cue's analysis enables trade off / what if analyses to calculate return on investment and map the value of the security program to business goals and success.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f15</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555762790020-ZAI20X5L43YTNJ3ZC6MP/image-asset.jpeg</image:loc>
      <image:title>F15</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763172495-E17LHKU8UZ5WPZ66MBX3/huntress.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Huntress Labs’ security software finds malware missed by traditional antivirus services. Just like routine health screenings, our product—Huntress—continuously checks for anomalies. When found, it delivers prioritized recommendations to correct the situation before it becomes terminal. Our security as a service model lets you focus more on business and less on cyber threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763234217-CDVFOT4XMXVZ8RCQRX51/locurity.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Locurity is a cloud based "Authentication as a Service" that protects online user accounts, transactions, cloud services and web based enterprise assets by thwarting unauthorized access attempts. Locurity’s proprietary approach has no impact on user experience and is completely invisible to the end user achieving balance between security and usability. Locurity can be deployed in minutes and is founded by a team with many years of experience protecting confidential and proprietary enterprise data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763265252-OUAY96WOUH1GEV6GDWR1/tensorwrench.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Founded by the minds behind the DoD’s open-source Ozone Platform, TensorWrench’s business intelligence platform allows applications to integrate at the user interface layer to produce context aware mashups across multiple, decentralized data repositories. This reduces development cost and risk while improving the user experience, data security, and agility over traditional “widgets &amp; dashboards” models.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763336216-KYYJ7ID4HU1KZK9K7P3L/418.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>418 Intelligence is changing the game, literally, in cybersecurity threat intelligence, by making a game of collecting, sharing, modeling and forecasting threat risks and countermeasures as they occur, in-the-wild, in real-time, for recognition and monetary reward. The volume and complexity of these factors overwhelm cyber defenders today and the supplies of skilled analysts. Our product solves these problems by incentivizing and crowdsourcing intelligence inputs and forecasts from communities of professional cyber threat analysts and hackers directly to the desktops of analysts and decision makers – in their context, continuously and on-demand, via the game platform and its outputs. Defenders will never again have to feel outmanned, feel surprised, or feel unprepared. The company’s technology was developed and proven under the US Intelligence Community’s advanced R&amp;D program, and we are the exclusive commercial licensee and developer of this platform for cybersecurity and healthcare fields of use.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763369837-D7VDD7WSY19WS817U3XM/cyber2020.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Cyber 20/20, Inc. has developed a highly-accurate malware detection system using machine learning and a novel characterization of applications. Our solution monitors network traffic for suspicious applications and automatically submits them to a machine learning platform, where they are analyzed and predicted to be malicious or not. Our proprietary machine learning engine automatically constructs profiles of software and continually becomes more accurate over time.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763418416-POFV7CNBUP9MV2SPFY1E/atriceps.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Atriceps, Inc., is a software as a service company providing enterprise threat and data classification APIs for e-mail, blogs, comments, texts, servers, archives and data loss prevention.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555763487814-UOQ17UZDWI5SM69Z9YF0/cyberalgorithms.png</image:loc>
      <image:title>F15</image:title>
      <image:caption>Cyber Algorithms delivers data-driven breach detection to identify intrusions that slip past other defenses. Breach detection algorithms that are regularly refined using data science expertise and deep domain knowledge locate traces of hacker behaviors within enterprise networks. The accompanying analytics provide deep network visibility for more reliable alert verification and a quicker response. Cloud-based delivery and a subscription business model make the solution simple to set up and use.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f13-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555765977290-OTQVXBMNHDIHFDH42ENP/image-asset.jpeg</image:loc>
      <image:title>F13</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766734325-LAHXXZ11IX62MNC7YHFX/SIKERNES.gif</image:loc>
      <image:title>F13</image:title>
      <image:caption>In order to effectively defend enterprise networks, security personnel must continually analyze and respond to new hacker techniques and software vulnerabilities as they are discovered. Currently, only the most sophisticated enterprises (F-50, large government) can employ the legions of analysts required to assess and take action on the massive volumes of threat and vulnerability data that may be relevant to them. Sikernes’ cloud-based solution is automating this analytical process, eliminating prohibitive labor costs and making advanced threat and vulnerability intelligence analysis affordable for everyone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766812078-BU5OEJBIKP3P3VI9M4GQ/conatix.png</image:loc>
      <image:title>F13</image:title>
      <image:caption>Conatix is building an end-to-end system for business, client or investment research, incorporating proprietary technical innovations in machine learning and data mining, streamlining all the steps of research and knowledge production in an easy-to-use team-based workflow and interface shielded by enterprise-grade privacy and security.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766861526-SKRPRQIDHSJ9LDY3UFJD/piercematrix.png</image:loc>
      <image:title>F13</image:title>
      <image:caption>Midsized companies do not have the manpower to deal with ever-increasing alerts and warnings. PierceMatrix provides users with prioritized task lists on how to get rid of threats on their network. Pierce generates these task lists by combining a global database of malicious actors with local event log monitoring to automatically identify who is on your networks, what they are doing, and how to get rid of them. Pierce currently offers a SAAS product hosted in the Amazon (AWS) Marketplace.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1555766895880-ADV5T9XQAK9MJYQ6ALZC/keycybersecurity.png</image:loc>
      <image:title>F13</image:title>
      <image:caption>Key Cybersecurity, Inc. is the developer of CyberMerlin, an enterprise and consumer solution that proactively identifies known and unknown problematic files and associated “bad actor” activity on networks and via associated devices (smart phones, tablets, external hard drives). CyberMerlin identifies illicit file activity (IFA) and associated bad actor activity (images and video) via proprietary perceptive and industry standard algorithms and a proprietary database consisting of millions of unique identifiers (hash values). CyberMerlin’s technology is a game changer in that it not only can identify modified files but it can also identify patterns and heuristics of malicious activity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f19</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1589896761494-FI74HLMXLIKNW7NPIZJ8/20191212jar_2474.jpg</image:loc>
      <image:title>Fall 2019</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1571924081157-04HQNLBPXKT3X70KEBDT/SylLab_logo.jpg</image:loc>
      <image:title>Fall 2019</image:title>
      <image:caption>SylLab Systems is a B2B cybersecurity start-up company. We are providing Cryptography-as-a-Service (CaaS) for organizations to secure their end-users personal information. Privacy compliance and security is expensive and difficult to implement. Changes in the architecture, lawyers, consultants are a significant expenditure when facing privacy regulations (GDPR, PDPA, CCPA). We provide CaaS that is offloading the burden of security and compliance to the experts for a fraction of the cost. Making consumer privacy and security a feature of your product, not a burden.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1571935877262-5CRLM9RCNDDTZFY3WABE/01_breachbits_logo_no_byline_black.png</image:loc>
      <image:title>Fall 2019</image:title>
      <image:caption>BreachBits is a cybersecurity company that provides automated and continuous red-team solutions to help enterprises find weaknesses in their cyber defenses before real attackers do. By leveraging automation and artificial intelligence, BreachBits’ Continuous Intelligent Red Team (CIRT) services provide customers with an advanced, persistent (24x7x365) simulated adversary seeking weaknesses to exploit in their cybersecurity solutions and team, all at a fraction of what a one time human-power red team assessment costs today.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1573146238027-IFO54UQQWXQPE7VUN24P/AupexLabs_Logo_primary_banner.png</image:loc>
      <image:title>Fall 2019</image:title>
      <image:caption>With data breaches a constant threat against governments and organizations of all sizes, the Auspex Cyber Console collects broad scope telemetry from common agents and long processors to monitor information quickly and efficiently, giving IT departments time to minimize damage and get back to business. Auspex Labs provides various services such as data exfiltration detection, in-flight PII compliance, and unmanaged host detection to keep them on track and running smoothly.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1571936203536-6A1XFW2TEIDSOR1FDCAP/SUVOLA+Icon+%281%29.png</image:loc>
      <image:title>Fall 2019</image:title>
      <image:caption>Suvola is advancing the science of cybersecurity by creating products and services that make cyberspace safer for all of us. The company is addressing the three major shortcomings of current information technology systems that are responsible for the vast majority of cybercrime – impersonation, tampering, and rogue actors.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f20</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>F20</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1606138677607-ZEP8ATJGX2WU0WA4MX9H/Aerobyte_Security_logo_v2.jpg</image:loc>
      <image:title>F20</image:title>
      <image:caption>Aerobyte has successfully revolutionized the way organizations protect themselves from some of the world’s most sophisticated cyber threats. Our team has bundled 15 plus years of research and development into our solution. Our Cyber Defense Framework realigns previous security architectures and organizational thinking by addressing security from a new vantage point. Our solution is software based and is designed to significantly reduce the costs of managing a Cybersecurity Infrastructure while minimizing the number of security vendors and maintaining investment protection. Aerobyte’s solution closes the vulnerability gap significantly and is designed to scale exponentially no matter the size of an organization. Our Cyber Defense Framework is Quantum Safe.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605912256464-L49T0NZU2HCIZSN7E626/Obtego+Logo.png</image:loc>
      <image:title>F20</image:title>
      <image:caption>It’s an accepted fact of life that the cyber security attack surface is a sitting duck which is always vulnerable to zero-day attacks and, often, previously known attacks. We reject this status quo and instead hide the attack surface itself - including hiding mobile devices’ attack surfaces for the first time. Our technology is patented, won at ICCWS and CISSE, and has been cited by Sandia and Argonne National Labs for applications to national security. Additional protective applications include IoT, ICS/SCADA, aerospace, autonomous technologies, hardware, medical device, and VPN. Coming out of stealth soon.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605912662157-LKMOMFDZNAY93MUTQ726/Cibernetica-logos.jpeg</image:loc>
      <image:title>F20</image:title>
      <image:caption>We build a specialized global platform www.cibernetica.io to connect companies of all sizes with freelancers and service providers for all their cybersecurity needs. Unlike other platforms in the market, we vet our service providers and manage the billing and the performance of the projects developed on the platform. We also offer basic fixed price services for small and medium companies. I have recently graduated from the Founder Institute Program and have received the SEIS Assurance from the UK Government.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605912462305-JGKYT8R6MMFJ41ZQPCIG/Cydea-Tech.png</image:loc>
      <image:title>F20</image:title>
      <image:caption>Through extensive cutting-edge R&amp;D, Cydea Tech rapidly brings to market, state of the art cyber security solutions to solve complex global enterprise challenges with ease!  Our current portfolio of solutions solve cyber threat detection challenges faced by organizations through the application of distribution deception technology and cyber threat intelligence.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605912609422-7UF1L77YMW85YFA0XY4D/android-chrome-192x192.png</image:loc>
      <image:title>F20</image:title>
      <image:caption>Cyberstanc is a technology driven company that provides corporations with the corroboration needed to validate , manage and improve their cybersecurity posture with leading edge engineering.  We strive to thoroughly reveal security loopholes in an organization's infrastructure through the safe simulation of cyber-attack scenarios by using our specialized TTPs (threats tactics procedures) library and providing remedition for the same. This provides the organization lots of opportunities to periodically self-assess its own cyber-readiness against some of the most common breach scenarios, advanced persistent threat (APT) attacks and unknown malwares. Some of our recent public tech collaborations include our partnership with Polyswarm which is a blockchain based threat detection platform.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605912525257-H9AG2CE302V6B649LYVM/2E1B%2BLAB%2BLOGO-color-enhance+%281%29.jpg</image:loc>
      <image:title>F20</image:title>
      <image:caption>2E1B Lab is an Environmental technology company. 2E1B Lab will conquer the recent increase in indoor air pollution sensitivity. With our patented technology, we hope to be the next company to trailblaze the building automation industry. One day 2E1B Lab plans to take on the challenge of Outdoor air pollution as well.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/wellbeing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1605463034017-EK2RNRGW44MMU51S874M/image-asset.jpeg</image:loc>
      <image:title>Wellbeing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s20</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>S20</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1594267183701-CN0N7GBV5YEKZ75MG5DT/cervais_no+tag_black+%281%29.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>Cervais e-Risk™ Mobile Data Protector is a portable Cyber security device that provides complete data protection and employs some of the most advanced data forensics detection and monitoring techniques available to combat and detect threats to a user’s endpoint device as well as the Internet of Things (IoT). As adversaries and their tactics and procedures continue to become more targeted, dynamic, and sophisticated, e-Risk Mobile is positioned to be the solution of choice when it comes to data protection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428769613-59XH9M4TCCNR5AZCDS0A/Quantum_Logo_Short.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>Quantum Trilogy prevents security incidents and reduces the impact of data breaches, stolen intellectual property, and negative media attention - avoiding reputational, financial, and legal damages. Quantum Trilogy’s ecosystem is built on Open-Source Software protected by Proprietary Quantum devices. With the use of quantum physics to power encryption and key distribution via a proprietary Quantum Random Number Generator (QRNG) - empowering the encryption process with quantum entropy. Our patented quantum-resistant encryption technology makes our customers' communications virtually unbreakable and protects their crucial infrastructure.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587429145083-9OKZNQHD4VVLW5MD9LTO/AccuChain-lighter-logo.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>Accuchain is a Human Resource Technology company with a resume validation and recruitment platform. Individuals create their resume and validate their achievements on our blockchain technology platform. Using AI and Machine Learning, resumes are checked for fraud. Hiring managers are then provided with the best applicants for the job. AccuChain is working to solve the high rate of false information in resumes—preventing bad hires and improving the hiring process.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428846991-UECL206ICOQCQA2U5ZX7/logo+base.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>AcoTech has developed a non-invasive technology, with patented AI tech, that analyzes the behaviour of a person - accumulating this data allows for the prevention of health issues that may be triggered. AcoTech prevents, intervenes and follows up on incidents - all link to Acobox that allows the measuring of blood pressure, ACG detection, etc.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1594267000057-7XIPOQ8BSF9DXLDPDWYN/Screen+Shot+2020-07-08+at+10.02.30+AM.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>SmartQBRD is developing a standalone touchscreen keyboard packed with functionality to accelerate the learning of new programming languages, coding and working with specialized software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1594266931718-CQL400EG0QDVBZR3TOO5/cysecurelogo.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>CySecure is developing solutions to eliminate passwords entirely – for users and at company servers, thus making it impossible for hackers to steal users’ personal data. The solution is extremely secure, using Public Key Infrastructure (PKI) and digital identity verified cryptographically. It is changing the paradigm to zero trust – always verify. The CySecure solution is friction-less and easy to use. Users’ personal information is securely stored in their digital wallet. The user maintains control and possession of their personal information, like keeping their driver’s license in their wallet. CySecure provides value to its business customers – reducing their operating cost, with higher security and simple user experience. Artificial Intelligence and Machine Learning will be employed for anomaly detection to increase level of security.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1594266967384-3OC8TY5MZ3CLHP8BQN2B/hranalitica.png</image:loc>
      <image:title>S20</image:title>
      <image:caption>Strategic workforce planning is not all about the number of employees needed to support business strategy and their impact on the business results. It is also about the present and future changes within the workforce and its alignment with the business results. AIinHR analyzes established, fact-based understanding of current and past workforce situations, generates models of the future workforce situation in varying customizable scenarios and predicts talent strategy hypotheses to calculate financial implications. Thus helping organizations align their business strategy with HR strategy rather than simply translating their business strategy into HR strategy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/cyber-accelerator</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1597269901707-YT4BLIH9C3EDDQAKXD9J/image-asset.jpeg</image:loc>
      <image:title>Cyber Accelerator</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/growth-stage-accelerator</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1597270087183-H29GO1J9CGSZ8UXOUN3R/image-asset.jpeg</image:loc>
      <image:title>Growth Stage Accelerator</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/pre-accelerator</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1597269095064-LDKIUNMC81QY42N69GA8/image-asset.jpeg</image:loc>
      <image:title>MACH37 Pre-Accelerator</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f21</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>F21</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/f9f74517-c2c4-48ba-8b56-f003b2b420bd/foretracelogo.png</image:loc>
      <image:title>F21</image:title>
      <image:caption>Foretrace is an External Attack Surface Management (EASM) platform, integrating genuine attacker techniques for reconnaissance, perimeter monitoring, and footprinting to allow its users to see organizations’ environments through the eyes of an adversary. For MSPs monitoring customers, security departments monitoring themselves and their vendors, insurance providers underwriting cyber policies, and beyond – Foretrace provides an authentic external view using actual intelligence collection methodologies found in MITRE PRE-ATT&amp;CK, and/or are employed by cyber adversaries and red teams. Foretrace believes that identification of external gaps and information exposure should be simplified and that its continuous monitoring should be woven into the fabric of security operations through automation of current attacker techniques - all with cost-efficient software and strategies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/da2135df-e76e-41ab-b38a-b18214f33697/infoseclogo.png</image:loc>
      <image:title>F21</image:title>
      <image:caption>Infosec Mates is a MSSP that is currently working on building Infosec Metrics. Infosec Metrics is a cyber intelligence tool that provides businesses with a standardized risk score, that can be used to measure their security risk posture and compare to their industry peers. Infosec Metrics also provides organizations with a compliance score based on their industry specific regulatory requirements.  Infosec Metrics integrates and synthesizes data from an organization’s disparate sources, external and internal, and combines them with threat intelligence feeds to provide meaningful metrics for the organization’s leadership team to make informed strategic and operational decisions.   Infosec Metrics breaks down the cyber risk rating of organizations based on the NIST framework categories and helps leadership understand the areas of improvement and prioritize security programs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/4f618b73-b6fa-4cd9-93f4-39885c452dfc/solefixlogo.jpg</image:loc>
      <image:title>F21</image:title>
      <image:caption>SOLEFIX CTC is a Digital Learning Solution Center for Pupils and Students in Nursery Schools, Primary Schools, Secondary Schools, and Post Secondary Schools. Empowerment of pupils and Students in Orphanage in information and Communication Technology. Empowerment of unemployed, drop out Students and inmates in the correctional centers to become useful to the society.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/6bfb1ac2-c9ef-4bc7-9528-d37361d5d0b2/trinitylogo.png</image:loc>
      <image:title>F21</image:title>
      <image:caption>Founded in 2019, TrinityEco Pte Ltd is an aspiring sustainability tech company in Singapore, that provides a sustainability tech platform for investors and organizations alike to automate and digitalize sustainability reporting, financing, and commercialization. As sustainability is a complex ecosystem challenge, TrinityEco recognized the importance of delivering sustainable, data-centric solutions to some of the most complex business and social challenges to governments and multinational organizations to help them quickly adapt to the changing needs of their customers and suppliers, business ecosystems and their people, while navigating the financial and operational challenges in this dynamic business ecosystem. Trinity’s goal is to mobilize and enable businesses, governments, communities towards sustainability action with real-time data intelligence and business acumen for empowered decision making. They participate actively from the beginning of our interaction, right from designing and innovating on challenges, providing a holistic ecosystem solution backed with analytical data models, and assisting in the implementation. Using highly intricate, credible, and efficient mapping algorithms, TrinityEco help investment firms to source for ESG investments and improve the ESG ratings of their assets</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/tech-scouting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/ed67f18a-e733-471e-9c7b-c07e3291bc95/Tech+Scouting+-+Tech+Landscape+Searching+binoculars.jpg</image:loc>
      <image:title>Tech Scouting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/d35ef758-6675-4577-a32d-1e84cc3e578b/MACH37+Tech+Scouting+Hypersonics+Report+Title+Page.png</image:loc>
      <image:title>Tech Scouting - Make it stand out</image:title>
      <image:caption>Previous tech scouting report</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/join-a-newsletter</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/prediction-market</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-24</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/press</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/ecosystem-events/washington-dc-cyber-events</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1684162621910-M0BIXFMHH92V1C4LZLUY/WashingtonDC-social-image-1024x536.jpg</image:loc>
      <image:title>Washington DC cyber events</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/add-my-city</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-03</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/terms-conditions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-16</lastmod>
  </url>
  <url>
    <loc>https://www.mach37.com/perks/auth0</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1686863158182-E4WF6FPY67TU2YI11O2W/MACH37+-+Auth0-by-Okta+logo.png</image:loc>
      <image:title>auth0</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f23</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>F23</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/930d2961-7c1f-4904-9dfa-0bf891b6d136/Logo___Eps___File.png</image:loc>
      <image:title>F23</image:title>
      <image:caption>SMPL-C is a AI Assistant SaaS platform designed by experts to provide users with a clear interpretation and understanding of Cybersecurity Maturity Model Certification (CMMC) and National Institute of Standards and Technology (NIST ) 800 171 framework. We aim to demystify the CMMC processes and allow companies to take control of their cyber security and compliance initiatives to comply with the U.S. Department of Defense (DOD) mandate. The platform provides a scored compliance gap assessment report and complementary products plus services to facilitate an efficient and cost-effective remediation path.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/166f5e4f-0901-4873-8d81-48b3a154be48/The-Security-Bulldog-Logo-Square.png</image:loc>
      <image:title>F23</image:title>
      <image:caption>The Security Bulldog lowers the cost and time needed to remediate vulnerabilities for enterprise cybersecurity teams using a proprietary AI-powered intelligence platform.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/fc159e5c-b70d-46bf-a6a2-8bb5f1d43e17/Screenshot+2023-08-07+at+8.25.40+PM.png</image:loc>
      <image:title>F23</image:title>
      <image:caption>Kquika was co-founded by Victor Oribamise and Ayomide Oribamise. Victor initiated his journey back in 2012 while in college when he developed a Quora-like social media platform in Nigeria. Within just three weeks, he managed to attract several hundred users before discontinuing it due to marketing challenges. Following years in academia, Victor identified an opportunity to create novel solutions, ultimately leading to the establishment of Kquika. He currently serves as the company's CEO. Ayomide, the company's COO, complements the leadership team, bringing valuable expertise to drive Kquika's vision and mission forward. Together, they are committed to driving innovation and transformation in the technology landscape.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/488cb298-4375-47cd-a82b-7d444e4e9eb3/Cloak+Harbor+Logo.png</image:loc>
      <image:title>F23</image:title>
      <image:caption>Cloak Harbor provides intelligence-grade cloaking to everyday citizens. We issue cover identities (or legal aliases), greatly reduce digital footprints, and shield personal information, financial transactions, communications, and assets from domestic threats or foreign leverage.  Identity fraud is the fastest growing financial crime in the United States. Our team of dedicated problem solvers is richly experienced and deeply passionate about privacy matters. Cloak Harbor is led by CEO and founder Tom Dawson. A thought leader in privacy defense and a veteran of the U.S. Air Force, Dawson has provided intelligence, technology, and systems management to the Federal government, private sector, and academia for more than 30 years. This includes the ops framework for the National Counterterrorism Center post 9/11.  In addition to the knowledge and efforts of our people, Cloak Harbor is bolstered by more than a dozen world-class partners. Our platform leverages proven solutions in data technology, investigation, financial services, and more.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/eeff9b6a-d70a-4150-9af3-b9d145b596be/Cloud9+Logo_October+2023.png</image:loc>
      <image:title>F23</image:title>
      <image:caption>In the digital age, threats loom large and diverse, demanding swift responses. Cloud9's AI-powered SaaS platform addresses the challenge of extended response times and high costs in incident and vulnerability management.  By integrating seamlessly with internal and contractor IT teams, we automate and expedite the process, reducing time and expenses by up to 75%. With response times cut by 70%, Cloud9 empowers enterprises with the resilience, adaptability, and capabilities they need in the evolving landscape of digital security.  Welcome to the future of digital defense. Welcome to Cloud9.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/s24</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>Spring 2024 Cohort</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/813e5535-e670-4967-bc1c-521cca811236/leo+cybsec+logo.png</image:loc>
      <image:title>Spring 2024 Cohort</image:title>
      <image:caption>Leo CybSec is revolutionizing the cybersecurity market by bringing an innovative one-stop-shop platform tailored to SMEs' needs. Integrating AI into defense strategies with just a few clicks, Leo CybSec ensures that every business stays ahead of evolving threats. Their platform is meticulously designed to address the key pillars of every business, including people, compliance, and technologies with affordable subscription packages.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/a89f4578-a557-4ff9-ab7d-0e3ff34219df/lampify.ai+%284%29.png</image:loc>
      <image:title>Spring 2024 Cohort</image:title>
      <image:caption>Lampify.ai is a B2B platform for mid/large enterprises who are looking to simplify their internal communications. At Lampify.ai, we make sure individual contributors can find answers quickly from others and increase visibility for teams by keeping stakeholders informed about areas of their interest.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/8d7bfb7e-a79f-42bb-91f9-f7da59de6e85/BW_MAIK_OFFICIAL_TRANSPERANT.png</image:loc>
      <image:title>Spring 2024 Cohort</image:title>
      <image:caption>MAIK is the first DIY studio to create custom-made AI/ML models.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/cd417f4d-d198-441d-b0be-ff518ba459ec/inheritance+ai+logo.jpg</image:loc>
      <image:title>Spring 2024 Cohort</image:title>
      <image:caption>inheritance Ai is an innovation laboratory focused on modernizing national security via automation and artificial intelligence.  With a focus on developing contextually aware large language models and chains for both civil and defense agencies, inheritance aims to be the trusted Generative Pre-training Transformer (GPT) developer for the US Government.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/accelerator-as-a-platform</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1597270087183-H29GO1J9CGSZ8UXOUN3R/image-asset.jpeg</image:loc>
      <image:title>Accelerator-as-a-Platform</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f24</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>F24</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/3928e9b3-9eb9-4f0b-a4e9-1e3c881faa6e/Valdin+Cloud_Master.png</image:loc>
      <image:title>F24</image:title>
      <image:caption>Valdin Cloud empowers family story tellers with an integrated platform, seamlessly merging digital archives, time-saving search capabilities, collaborative research and knowledge sharing, and digital immortality for ancestral legacies. Our holistic approach provides a suite of tools and resources, facilitating research efficiency, preserving family heritage, and fostering connections across each family.  Valdin Cloud's value stems from its preservation of human essence, the facilitation of emotional bonds, and the creation of enduring connections across generations. By offering innovative solutions in the digital avatar and immortality space, Valdin Cloud provides individuals and their families with profound and meaningful ways to connect and share the complexities of life in the digital age.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/c64e0237-53d8-409f-9fd6-d4cf305d00e3/RG+Technology+Logo.png</image:loc>
      <image:title>F24</image:title>
      <image:caption>Remote Guardian is a cybersecurity services company dedicated to safeguarding small and midsized businesses from increasingly sophisticated digital threats. We specialize in cutting-edge endpoint security solutions that leverage AI-driven behavior analytics and advanced persistent threat (APT) detection to proactively identify, mitigate, and respond to cyber threats. Their flagship product, currently in development, is built with scalability and modularity in mind, allowing businesses of all sizes to customize their cybersecurity needs. The platform includes centralized AI that monitors endpoint activity, establishes secure connections, and enables real-time decision-making. With a focus on compliance and advanced threat detection, Remote Guardian offers a robust solution that adapts to the ever-evolving threat landscape. Backed by over 70 years of combined experience in defense, cybersecurity, and technology innovation, the Remote Guardian team has expertise in developing agile, secure solutions for the SMB market, which is often underserved and highly vulnerable. With a subscription-based model designed to grow with our customers, Remote Guardian provides comprehensive protection and compliance without overwhelming in-house IT teams. Remote Guardian’s long-term vision is to revolutionize how businesses approach cybersecurity, offering a scalable and intelligent defense solution that can meet the needs of both SMBs and larger enterprises through edge computing AI options.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/82b42235-b284-480b-a74f-f29ebab962d9/CatalystPCs-Logo-2024.png</image:loc>
      <image:title>F24</image:title>
      <image:caption>As the 1st Virtual Computer Original Equipment Manufacturer, Catalyst PCs provides pre-built, pre-configured, updated, legally licensed, and fully supported virtual computers for use with programs like Parallels Desktop and VMware Fusion. Catalyst PCs will expedite and simplify consumer adoption of virtual desktop solutions, enabling the future consumer transitions to cloud hosted virtual personal computing solutions.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/e477525c-f87d-4888-8119-573abe87ddf3/Asset+2+%281%29.png</image:loc>
      <image:title>F24</image:title>
      <image:caption>We want our economy and national infrastructure to be as secure as possible, which is why Triarii is creating an AI copilot to augment the severely limited cybersecurity talent pool, making them more effective at conducting penetration tests. Triarii AI provides an AI-powered copilot that enhances the speed and efficacy of offensive cybersecurity operations by automating manual tasks and delivering real-time insights, with a focus on securing IoT devices. Triarii AI delivers cybersecurity capabilities and insights that no other AI platform can.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/b23d6f4c-c532-4c2a-bd5b-35a5ac1b32d0/designcrowd_s007xn6tdgkzcwc7xbkcba6306_image.jpg</image:loc>
      <image:title>F24</image:title>
      <image:caption>SpyGraph Systems is a counter-intelligence start-up focused on protecting organizations’ intellectual property from insider threats. Founded by an 18-year veteran in open-source research, we combine the most advanced data processing technologies with the most experienced native-speaker experts to distill insights from data that protect organizations before a security incident happens.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/f25</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/1587428351215-2HT91ZKQ4MDFWJBIMRID/image-asset.jpeg</image:loc>
      <image:title>F25</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/9e5d14ed-66a0-44a9-bc09-d8a1a382602e/MDI_Logo_image.png</image:loc>
      <image:title>F25</image:title>
      <image:caption>Malware Defense Innovations (MDI) is a forward-thinking cybersecurity company founded on the belief that today’s defenses leave critical weak spots unaddressed. Across enterprises and governments alike, attackers exploit persistence, evasion, and adaptability gaps that conventional tools overlook. At MDI, we study these blind spots in depth and build technologies that close them. Our flagship product, MalCure, represents just the beginning. Designed as the immune system of the digital world, MalCure focuses on persistence blocking, secure peer-to-peer intelligence sharing, and polymorphic regeneration to outpace modern malware. But MDI’s vision extends well beyond one product. We are developing a pipeline of innovative solutions, each targeted at the most neglected areas of cybersecurity—from ransomware interception and data exfiltration prevention to AI-driven adaptive defenses. What sets MDI apart is our strategic mindset: we don’t react to yesterday’s attacks—we anticipate tomorrow’s. By fusing deep technical expertise with a medical-inspired design philosophy, we are creating an ecosystem of “Cure” technologies that transform cyber defense into a proactive, resilient shield. MalCure is the first step, but it won’t be the last.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/9abfce9e-6b6c-4c30-baaa-0fd551fc045e/Flagged+logo+Resized%281%29.png</image:loc>
      <image:title>F25</image:title>
      <image:caption>Flagged Inc. is an artificial intelligence-driven cybersecurity company that leverages advanced AI and machine learning to design, develop, and deploy cutting-edge software solutions that protect both public and private sector organizations, as well as individuals, from today’s most sophisticated digital threats. These include phishing, business email compromise, social engineering scams, zero-day vulnerabilities, and emerging web-based attacks.  The company’s flagship product is a scalable, lightweight, browser-native platform specifically built to secure cloud-based email and browsing environments. It proactively detects and neutralizes threats in real time, offering robust protection against adversaries who are increasingly using generative AI to craft hyper-personalized, evasive attacks. Flagged’s mission is to secure the human layer of communication by providing agile, intelligent defenses that evolve as fast as the threats they’re built to stop.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/2555f2da-99e8-4ca0-8331-63fe2a028df6/Secria+Logo+%28FINAL%29.png</image:loc>
      <image:title>F25</image:title>
      <image:caption>Secria is a post-quantum secure and private email. With automatic tracker blocking, rotating aliases, post-quantum encryption, and code-based user verification, Secria gives you control, security, and peace of mind without the complexity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/3614c2cf-018c-432b-b2b0-8f591f4d6f55/TPB_white.png</image:loc>
      <image:title>F25</image:title>
      <image:caption>ThreatBreaker is an AI-native, Agent-as-a-Service cybersecurity platform operating at the intersection of MDR and intelligent automation. Built for MSSPs, it empowers them to deliver enterprise-grade protection to SMBs—especially in sensitive sectors like manufacturing, retail, and healthcare—without adding operational overhead. By automating endpoint detection, investigation, and response, ThreatBreaker closes the security gap with a cost-effective and scalable solution.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/mentors-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/8155f069-b236-4914-82fa-59ec6e9ffa29/David+Ihrie.jpeg</image:loc>
      <image:title>David Ihrie Mentor Award - MACH37 David Ihrie Mentorship Award</image:title>
      <image:caption>At MACH37, we believe that meaningful mentorship is pivotal for the journey of our founders and goes beyond advice. It's about showing up, building trust, and providing consistent support and encouragement throughout the program.    These beliefs and values were embodied by David Ihrie, one of the founders of MACH37. He was an advocate for innovation and founders and always offered his time freely, offered thoughtful advice, and went above and beyond to support this community.  In honor of David's legacy, we are proud to introduce the MACH37 David Ihrie Memorial Mentorship Award, created to recognize mentors who exemplify the same spirit, generosity, and impact that David brought to MACH37.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mach37.com/mentor-directory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5c4671df4611a0ea4231200e/5878d2cb-283d-4525-8842-f3afdb5b4065/Dan+Light.jpg</image:loc>
      <image:title>Mentor Award Recipients - 2025 - Dan Light</image:title>
      <image:caption>Dan Light has been an exceptional mentor within our program for the past few year, consistently demonstrating dedication, reliability, and genuine commitment to founder success. Our founders have repeatedly expressed overwhelmingly positive experiences working with Dan, noting his thoughtfulness and willingness to meet them where they are. He has built strong, sustained relationships with founders in our program and beyond. These long-term relationships speak to the trust and value Dan brings to every conversation. His continued investment in founders, combined with his initiative to support the ecosystem as a whole, makes Dan Light a deserving recipient of the inaugural MACH37 David Ihrie Mentorship Award.</image:caption>
    </image:image>
  </url>
</urlset>

