<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-04-21</lastmod>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/why-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-04-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1619015381448-DF11TTW5P5GOE3UHY4IX/ransomwarespread.jpeg</image:loc>
      <image:title>Blog - Why Ransomware?</image:title>
      <image:caption>iStockphoto.com</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1619015407651-4A60S22XURAQPGUCWLC6/Ransom.png</image:loc>
      <image:title>Blog - Why Ransomware?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1619015245236-0XO6KM4INQ8PVC2HQEFI/ransomware-threatlist.jpeg</image:loc>
      <image:title>Blog - Why Ransomware?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1619015102857-VICFX3GXTV0OLGYJKL9R/ransomware-at-home.jpeg</image:loc>
      <image:title>Blog - Why Ransomware?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/idps-in-the-public-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1597164028190-ND1DQRXA933JV7MJXOFN/Rejoicing.png</image:loc>
      <image:title>Blog - IDPS in the Public Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1597164325508-IGDTAVI3K5I3WPB9L41R/Detective.png</image:loc>
      <image:title>Blog - IDPS in the Public Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1597164197217-D60V8RM6YO2O1PV2NNJD/Guardduty.png</image:loc>
      <image:title>Blog - IDPS in the Public Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1597163479894-J0PX5FHNCJVBSKFI31E4/IDPS.png</image:loc>
      <image:title>Blog - IDPS in the Public Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1597163940289-B0FI7SC7NPR6NQB2Z5Y5/Boo.png</image:loc>
      <image:title>Blog - IDPS in the Public Cloud</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/category/Public+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/category/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/backup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/Network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/Public+Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/IDPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/Level-20</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/blog/tag/ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/default</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1606102043844-8V7Z3PL22B5GH2S9UKZK/Cyber.jpg</image:loc>
      <image:title>Default - ADAPTIVE CYBERSECURITY</image:title>
      <image:caption>DOES YOUR COMPANY HAVE A PLAN TO RECOVER FROM: Accidental or Malicious Data Loss? Ransomware? Data Theft? Credit Card Fraud / Theft? Malware Infections? Emails Compromise? Hijacking of your Computer, Servers, or Digital Services?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594785166322-T37HG1LDQ8F72QVM32OG/risk.PNG</image:loc>
      <image:title>Default</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594785252160-3GYBH49UPZ37FWZ4PX0U/clipboard.png</image:loc>
      <image:title>Default</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594785368072-BRENEO1IQKMFF0GO5KWF/image.png</image:loc>
      <image:title>Default</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594859982150-JP1MWNJV2WF1H2M3EXZQ/DDS----White-large.png</image:loc>
      <image:title>Default</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594869907315-O3P2I8OH2G56YR3AO5G9/DDS.png</image:loc>
      <image:title>Contact</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/our-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-01-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594951089171-UY9H26P9YR1EIIMB13F9/image-asset.jpeg</image:loc>
      <image:title>Our Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/0c9389ef-85dc-4fd1-b3fb-8579aff245cf/soc-2-compliance-1.png</image:loc>
      <image:title>Our Services - SOC 2 Preparation</image:title>
      <image:caption>DDS provides consulting services for SOC 2 Type I/II preparation for small-to-medium businesses. Our team is highly skilled and efficient in our ability to provide precisely targeted guidance on all areas of organizational security to obtain and retain a SOC 2 certification.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594849750677-YELQO0IG3TEVZAEO98EC/image-asset.jpeg</image:loc>
      <image:title>Our Services - Secure Software Development</image:title>
      <image:caption>Prevention is always better when trying to protect your company's assets. Secure software development focuses on a unified security architecture that also ensures that your developers take performance, quality, scalability, and maintainability into account when they design and develop software. Integrating security into all your company’s development processes will build confidence in your applications, strengthen your brand, and enhance customer loyalty.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594954264145-SXISLMGJPKSR1XDHZ6UX/image-asset.jpeg</image:loc>
      <image:title>Our Services - Virtual CISO</image:title>
      <image:caption>Digital Defense Security offers virtual CISO (Chief Information Security Office) services for all security issues a company may experience. From defining baseline security policies, standards, and procedures, we also assist in implementing and operationalizing the necessary security technologies and processes necessary to reduce the risks of the company. We offer security expertise to meet specific regulatory or industry security requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594849155641-LYG80XHLN1OG83PAYM9M/image-asset.jpeg</image:loc>
      <image:title>Our Services - Risk Assessments</image:title>
      <image:caption>Risk assessments identify cyber risks and gaps in a company's security program. Armed with infromation, personnel and management can make decisions on how where to manage the security risk profile the business carries. Just like every company is different, risk assessments are uniquely crafted for each industry and operation. It will provide a prioritized roadmap and give insight into behaviors, processes, or practices that put the organization at increased risk. Silver risk assessments provides step-by-step recommendations for preventing cybersecurity defects and vulnerabilities. A risk assessment is an integral part of any company's risk management procedures.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594849647627-X8I7TTKKPAFWSVFUXXCH/image-asset.jpeg</image:loc>
      <image:title>Our Services - Penetration Testing</image:title>
      <image:caption>Penetration testing is an important tool, used to identify vulnerabilities within applications, from the perspective of an outside attacker. These tests can be performed against various computer code, systems, applications, platforms, and servers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594849939279-M3YS7FH0FO6ND1ST7ZR1/image-asset.jpeg</image:loc>
      <image:title>Our Services - Public Cloud Security</image:title>
      <image:caption>Whether your company has a private cloud or is leveraging one of the many public clouds, securing your data, workloads, and applications is a priority in virtualized environments. There are new challenges, risks, and vulnerabilities organizations need to address when they leverage these platforms. Digital Defense Security offers expertise and the ability to help build security-as-code, which can enforce security policies through automation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594850642253-5S97CAFEUBJ9QHW5JJRD/image-asset.jpeg</image:loc>
      <image:title>Our Services - Incident Response</image:title>
      <image:caption>The primary goal of cybersecurity incident response is to remove the active threat, contain damages, and restore business operations as quickly as possible. After resuming operations it is important to understand how the incident happened while working through the proper procedures regarding remediation and potential notification to impacted customers. DDS’s assistance responding to an incident will effectively minimize impact, restore services, and mitigate exploited vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594850533467-IN7NDFQBSURAZQRFS5GR/image-asset.jpeg</image:loc>
      <image:title>Our Services - Managed SOC</image:title>
      <image:caption>Visibility is the foundation for every security program. A Security Operations Center (SOC) provides a centralized program for the coordination of people, processes, and technologies through constant monitoring and analysis. The primary function of a SOC is full visibility to analyze a company’s networks, servers, databases, and ensure the timely detection of security incidents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1598577834428-9U3UCDS3CDCMUO2AFEG9/image-asset.jpeg</image:loc>
      <image:title>Our Services - Managed Email Defense</image:title>
      <image:caption>With Email still the #1 method for malicious actors to breach company networks, everyone needs a strong security posture to protect this essential service. Through design, operations, training, and simulated phishing, Digital Defense Security specializes in bolstering secure and safe email environments.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1598577881987-ENPDPCT1X439G2PI2ZYA/image-asset.jpeg</image:loc>
      <image:title>Our Services - Security Awareness, Training, and Engagement</image:title>
      <image:caption>In the People - Process - Technology triad of Information Technology, People are consistently the most difficult to train and protect. Digital Defense Security has in-house and partner expertise to offer virtual and on-site cybersecurity training for IT and non-IT alike, ensuring all employees in your company are part of the solution for identifying, preventing, and reporting cybersecurity issues.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-11-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594872377822-7WNAAF1UF8FI52ZNMMZY/image-asset.jpeg</image:loc>
      <image:title>About - Uniqueness.</image:title>
      <image:caption>Each company is unique and requires custom-tailored solutions. Digital Defense Security is not interested in selling security projects that are not needed. No more purchasing a security appliance and hoping that it does the job; we’d rather focus on what makes your company unique and build solutions that protect what defines you. No more guesses, no more assumptions, and no more surprises.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594871914193-9X5PQNSW4OLR6YUYQDMW/image-asset.jpeg</image:loc>
      <image:title>About - Listen first, then protect.</image:title>
      <image:caption>The only way to properly design a cybersecurity program is to understand the client's needs. Each program is different as each company is different. The world of cybersecurity is wide and deep, with more products and solutions than any company could ever hope to apply. Digital Defense Security cuts through the hype and confusion to provide security scoped right for the client.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594873609698-WNNAHY6WM6CWD4R8XC8Q/image-asset.jpeg</image:loc>
      <image:title>About - Expertise.</image:title>
      <image:caption>DDS has extensive experience in a multitude of industries, including banking, government, military, insurance, operations, nutraceutical, and healthcare. Our experience working with companies ranges from the smallest start-ups to some of the largest U.S. Fortune 100/Global 500 operations. We’ve taught college cybersecurity courses, presented at national security conferences, conducted research, and published articles. All DDS employees maintain the CISSP certification as well as other industry-recognized security certifications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1633360789278-YEWYULQXQ6SHH2TG47ZA/Craig.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594870714345-L5LXOVBRP7VGRAHXBF6O/Vince.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1594870520663-ALA34RFSENEFWN75RXEU/Paul.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/level20</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1595795491844-G5JBT7MSH6RD7R4Y77IH/L20+-+3.1.png</image:loc>
      <image:title>Level20</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1595795118435-LUYOQHHW7KW4308TOYCB/L20+-+1.png</image:loc>
      <image:title>Level20</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1595795148370-ANUL6NAMV13FT93NI4ZJ/L20+-+2.png</image:loc>
      <image:title>Level20</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.digitaldefensesecurity.com/faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1596818435011-E3YQF91FFUBJ0JXP7O86/deloitte-nascio-fig29.png</image:loc>
      <image:title>FAQ</image:title>
      <image:caption>Reproduced from the 2014 Deloitte-NASCIO Cybersecurity Study “State governments at risk: Time to move forward”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e0e70d922b79156232b6867/1596818601340-6DZ3Q5107XTM8106ULPW/figure_6_top_five_barriers.jpg</image:loc>
      <image:title>FAQ</image:title>
    </image:image>
  </url>
</urlset>

