<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://sublime.security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/contact/</loc>
    </url>
    <url>
        <loc>https://sublime.security/integrations/</loc>
    </url>
    <url>
        <loc>https://sublime.security/about/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/</loc>
    </url>
    <url>
        <loc>https://sublime.security/resources/</loc>
    </url>
    <url>
        <loc>https://sublime.security/love/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/</loc>
    </url>
    <url>
        <loc>https://sublime.security/news/</loc>
    </url>
    <url>
        <loc>https://sublime.security/platform/</loc>
    </url>
    <url>
        <loc>https://sublime.security/security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/demo/</loc>
    </url>
    <url>
        <loc>https://sublime.security/start/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/terms/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/privacy/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/disclosure/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/privacy-choices/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/support/</loc>
    </url>
    <url>
        <loc>https://sublime.security/dpa/</loc>
    </url>
    <url>
        <loc>https://sublime.security/partners/deal-registration/</loc>
    </url>
    <url>
        <loc>https://sublime.security/legal/terms-enterprise-25-01-17/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customer-stories/</loc>
    </url>
    <url>
        <loc>https://sublime.security/plans/</loc>
    </url>
    <url>
        <loc>https://sublime.security/press-kit/</loc>
    </url>
    <url>
        <loc>https://sublime.security/event-video-waiver/</loc>
    </url>
    <url>
        <loc>https://sublime.security/features/</loc>
    </url>
    <url>
        <loc>https://sublime.security/untitled/</loc>
    </url>
    <url>
        <loc>https://sublime.security/industries/financial-services/</loc>
    </url>
    <url>
        <loc>https://sublime.security/thank-you-demo-video/</loc>
    </url>
    <url>
        <loc>https://sublime.security/partners/</loc>
    </url>
    <url>
        <loc>https://sublime.security/demo-hq/</loc>
    </url>
    <url>
        <loc>https://sublime.security/demo-video-request/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/5-email-security-trends-from-2025/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/500k-financial-fraud-built-on-bec-a-domain-lookalike-and-a-fake-thread/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/ade-is-now-generally-available-new-coverage-for-novel-threats-autonomously/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/advanced-fake-zoom-installer-used-for-delivering-malware/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/adversarial-ml-extortion-with-llm-manipulation-tactics/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/aitm-phishing-with-russian-infrastructure-and-detection-evasion-from-a-lapsed-domain/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/announcing-20m-series-a-to-redefine-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/announcing-sublime-email-dlp-data-loss-prevention-at-the-outbox/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/april-fools-2026-a-good-worker-never-blames-their-ai-tools/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/asa-expanded-eliminate-review-queue-bottlenecks-with-ai-agent-coverage-of-flagged-messages/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/automatic-malicious-calendar-event-remediation/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/b2b-freight-forwarding-scams-on-the-rise-to-evade-financial-fraud-crackdowns/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/base64-encoding-an-svg-attack-within-an-iframe-and-hiding-it-all-in-an-eml-attachment/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/business-email-compromise-fake-invoice-16800/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/callback-phishing-emails-call-me-maybe/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/callback-phishing-via-invoice-abuse-and-distribution-list-relays/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/callback-phishing-with-online-appointment-abuse-and-distribution-lists/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/combating-genai-email-attacks-with-bert-llm/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/community-spotlight-email-detection-rules-built-by-the-sublime-community/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/correlate-sublime-logs-in-panther-for-centralized-threat-detection/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/credential-phishing-charles-schwab-account-holders-with-2fa-bypass/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/detecting-an-email-based-clickfix-attack-that-delivers-dcrat-malware-payload/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/detecting-credential-phishing-with-deep-learning-mql/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/detecting-malicious-anonymousfox-email-messages-sent-from-compromised-sites/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/detecting-pikabot-delivery-techniques/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/detecting-qakbot-wsf-attachments-onenote-files-and-generic-attack-surface-reduction/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/direct-send-abuse-on-microsoft-365-just-another-failed-authentication/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/elastic-sublime-adding-email-to-your-security-and-observability-stack/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/email-attacks-featuring-google-cloud-application-integration-abuse-and-captcha-html/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/email-bomb-detection-and-prevention-with-sublime/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/email-topic-modeling-simplifying-detection-with-ml-powered-granularity/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/enhanced-message-groups-improving-efficiency-in-email-incident-response/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/enhanced-reporting-and-analytics-provide-complete-visibility-into-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/everything-old-is-new-again-3-trends-from-black-hat-usa-bsides-lv-and-def-con-33/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/evolving-our-brand-as-sublime-grows/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/facebook-credential-phishing-with-job-scams-impersonating-well-known-companies/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/fake-meta-ads-manager-in-app-store-and-testflight-used-to-phish-meta-ad-accounts/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/figma-abuse-from-compromised-vendor-used-in-credential-theft-attack/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/google-careers-impersonation-credential-phishing-scam-with-endless-variation/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/hidden-credential-phishing-within-eml-attachments/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/hostpapa-abuse-treasure-trove-discovered-in-godaddy-email-threat-hunt/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-ai-is-scaling-executive-impersonation-in-financial-services/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-asa-thinks-the-technical-architecture-of-sublimes-autonomous-security-analyst/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-snyk-uses-sublimes-ai-agents-to-stay-ahead-of-email-threats/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-sublimes-ai-agents-are-secure-by-design/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-to-build-fast-similarity-search-for-email-from-the-ground-up/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-we-built-a-load-testing-framework-for-email-security-at-scale/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/how-we-built-high-speed-threat-hunting-for-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/ics-phishing-stopping-a-surge-of-malicious-calendar-invites/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/introducing-sublime/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/keitaro-tds-abused-to-delivery-autoit-based-loader-targeting-german-speakers/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/key-findings-from-the-q1-2025-sublime-email-threat-research-report/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/link-based-malware-delivery-agent-tesla-fake-purchase-order/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/living-off-the-land-callback-phishing-via-docusign-comment/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/living-off-the-land-credential-phishing-via-docusign-abuse/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/living-off-trusted-sites-zoom-service-abuse-credential-phishing-attack/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/microsoft-oauth-url-used-as-redirect-to-aitm-credential-phishing-site/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/more-than-plausible-nonsense-a-rigorous-eval-for-ade-our-security-coding-agent/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/multi-rmm-attack-splashtop-streamer-and-atera-payloads-delivered-via-discord-cdn-link/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/payroll-fraud-llm-generated-emails/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/phishing-for-xfinity-credentials-with-malicious-zoom-docs/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/prompt-injection-attacks-dont-look-like-what-youre-seeing-in-social-media-and-headlines/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/qr-code-phishing-decoding-hidden-threats/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/quarantine-digests-generally-available/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/scammers-actively-targeting-real-estate-agents-with-remote-access-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/screenconnect-as-malware-via-canva-abuse-and-docusign-impersonation/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/scripting-vector-grifts-svg-phishing-with-smuggled-js-and-adversary-in-the-middle-tactics/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/seeing-both-sides-of-a-service-abuse-financial-fraud-using-yopmail-disposable-messages/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublime-at-rsac-2026-top-questions-at-the-booth/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublime-attack-score-explainable-ai-backed-threat-analysis/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublime-is-moving-to-100-channel-sales/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublime-raises-150m-series-c-to-arm-defenders-for-the-post-llm-world/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublime-raises-series-b-to-establish-new-standard-in-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/sublimes-ai-agents-are-just-the-tip-of-the-platform/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/tax-season-email-attacks-adwind-rats-and-tycoon-2fa-phishing-kits/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/technical-deep-dive-of-nlu-3-0-modular-multi-headed-with-advanced-synthetic-training/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/trox-stealer-a-deep-dive-into-a-new-malware-as-a-service-maas-attack-campaign/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/tycoon-2fa-credential-phishing-with-cloned-internal-employee-login/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/uk-home-office-visa-immigration-scam-targets-sponsor-management-system-accounts/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/unmasking-business-email-compromise-bec-attacks-using-natural-language-understanding-and-mql/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/using-the-x-twitter-link-shortener-t-co-to-hide-an-aitm-credential-phishing-payload/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/welcoming-andrew-becherer-as-sublime-ciso/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/who-are-you-trying-to-april-fool-with-that-email-scam/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog/xloader-deep-dive-link-based-malware-delivery-via-sharepoint-impersonation/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/ahry-jeon/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/aiden-mitchell/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/aj-williams/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/andrew-becherer/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/anna-bertiger/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/art-chavez/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/aryan-luthra/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/blaise-perennial/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/bobby-filar/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/brandon-murphy/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/brandon-webster/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/brian-baskin/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/brian-wilcox/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/bryan-campbell/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/clifton-kaznocha/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/dan-flaherty/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/derek-rocco/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/evan-bailey/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/gregory-climer/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/hugh-oh/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/ian-thiel/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/jonathan-bunce/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/josey-coles/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/josh-kamdjou/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/josh-soup-campbell/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/kevin-gough/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/kirk-johnson/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/kyle-eaton/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/linna-la/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/luke-wescott/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/machine-learning-team/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/madison-caldwell/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/montel-oliver/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/omar-jalalzada/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/peter-djordjevic/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/robbie-adams/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/ross-wolf/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/sam-scholten/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/seth-williams/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/stefano-meschiari/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/sublime-team/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/threat-detection-team/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/threat-research-team/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/vivek-sharath/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/will-mason/</loc>
    </url>
    <url>
        <loc>https://sublime.security/blog-authors/william-mireles/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/ai-signals-in-email-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/black-hat-europe-2025/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/bsides-london/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/calendar-crashers-how-sublime-keeps-phish-off-your-schedule/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/cyphercon-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/districtcon-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/driving-strategic-security-operations-with-tines/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/email-threats-in-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/executive-impersonation-in-finance/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/fifa-world-cup/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/gartner-security-risk-management-summit/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/gartner-security-risk-management-summit-uk-2025/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/himss-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/how-snyk-uses-ai-agents-to-stop-email-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/mssp-alert-live-2025/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/rh-isac-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/rsa-conference-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/sublime-customer-dinner-rsac/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/tailor-made-executive-event-boston/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/tech-show-london-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/trends-to-watch-in-2026-calendar-phishing-and-opportunistic-service-abuse/</loc>
    </url>
    <url>
        <loc>https://sublime.security/events/webinar-accelerate-email-defense-without-the-black-box/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/aaron-tekippe/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/alfie-champion/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/andrew-morris/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/anthony-coggins/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/at-bay/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/ben-a/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/ben-chung/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/ben-gallitz/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/black-hills-information-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/bret-kramer/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/chad-norman/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/chris-cashman/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/chris-castaldo/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/chris-castaldo-2/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/chris-meisch/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/christopher-c/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/cybertilly/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/david-eckstein/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/dmitri-alperovitch/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/elastic/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/eric-capuano/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/eric-turpin/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-a/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-b/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-c/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-d/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-e/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/gartner-peer-review-f/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/greg-coutouvidis/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/huel/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/james-coote/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jason-banks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jason-kikta/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jerry-perullo/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jj-agha/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/joe-roosen/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/john-h/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/john-harper/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/john-tuckner/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jon-burkey/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jon-massari/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jon-sakoda/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jon-ticknor/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jon-ticknor-2/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jonas-eichinger/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/jordyn-coyne/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/josh-liburdi/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/justin-elze/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/kevin-patrick-mahaffey/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/kyle-parrish/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/leonardo-pisani/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/liam-sennitt/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/matthew-arnao/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/mydfir/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/personio/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/pete-koomen/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/rajendra-umadas/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/ryan-cummings/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/sadiq-khan/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/sadiq-khan-2/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/scott-jones/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/shaun-cooley/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/simon-goldsmith/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/snowflake/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/snyk/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/spencer-alessi/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/thomas-kinsella/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/thomas-lukins/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/tom-lukins/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/us-signal/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/verified-user/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/verified-user-2/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/verified-user-3/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/verified-user-4/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/verified-user-5/</loc>
    </url>
    <url>
        <loc>https://sublime.security/customers/wes-lambert/</loc>
    </url>
    <url>
        <loc>https://sublime.security/topic/attack-spotlight/</loc>
    </url>
    <url>
        <loc>https://sublime.security/topic/engineering/</loc>
    </url>
    <url>
        <loc>https://sublime.security/topic/machine-learning/</loc>
    </url>
    <url>
        <loc>https://sublime.security/topic/sublime-news/</loc>
    </url>
    <url>
        <loc>https://sublime.security/topic/threat-detection/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/business-email-compromise-bec/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/callback-phishing/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/credential-phishing/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/email-bomb-protection/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/ics-phishing/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/malware-ransomware/</loc>
    </url>
    <url>
        <loc>https://sublime.security/attack-types/qr-code-phishing/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/abuse-mailbox-automation/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/attack-surface-reduction-asr/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/attack-trends-insights/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/behavioral-threat-hunting/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/data-loss-prevention-dlp/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/detection-engineering-custom-policies/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/inbound-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/incident-response/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/m-soar/</loc>
    </url>
    <url>
        <loc>https://sublime.security/use-cases/threat-intelligence-operationalization/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/ai-phishing-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/bec-tools/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/best-abnormal-security-alternatives/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/best-proofpoint-alternatives/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/email-impersonation-protection/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/email-security-best-practices/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/email-spoofing-protection/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/email-triage/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/malspam/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/mimecast-alternatives/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/phishing-incident-response/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/phishing-protection-software/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/qr-code-phishing-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/top-email-security-companies/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/types-of-phishing-attacks/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/what-is-email-security/</loc>
    </url>
    <url>
        <loc>https://sublime.security/articles/what-is-phishing/</loc>
    </url>
    <url>
        <loc>https://sublime.security/podcast/risky-business-soap-box-august-2025/</loc>
    </url>
    <url>
        <loc>https://sublime.security/resources/email-threat-research-report-2026/</loc>
    </url>
    <url>
        <loc>https://sublime.security/resources/ics-phishing-playbook/</loc>
    </url>
    <url>
        <loc>https://sublime.security/resources/trust-then-autonomy-a-new-framework-for-evaluating-security-ai/</loc>
    </url>
    <url>
        <loc>https://sublime.security/resources/whitepaper-layered-email-security-stack/</loc>
    </url>
</urlset>