<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cosive.com</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/about</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/careers</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/deploying-misp-on-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/fraud-detection-in-banking-guide</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/fraud-detection-prevention-resource-hub</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/fraud-detection-with-splunk</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/fraud-detection-with-the-elk-stack</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/malware-analysis</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-guide</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-how-to-use</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-on-aws</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-anomali</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-crits</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-opencti</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-recorded-future</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-stix</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-threatquotient-threatq</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-vs-yeti</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/security-assurance</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/security-consulting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/security-engineering</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/threat-intelligence-providers</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/threat-intelligence-the-cisos-guide</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/what-is-a-malware-repository</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/our-misp-offerings</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-guides/misp-taxii-push</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-feeds</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-docker</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-yara-rules</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/opencti-alternative</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/best-misp-integrations</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/best-virustotal-alternative</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/contact-thank-you</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/misp-sso</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/modern-soc</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/sitemap</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/cti-cmm-assessment-tool</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/2019-7-30-cosive-finishes-2nd-at-splunks-2019-au-amp-nz-boss-of-the-soc-day-for-the-second-year</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/7-misp-best-practices-lessons-from-effective-threat-intel-teams</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/a-tale-of-two-systems-how-we-integrated-misp-with-assemblyline</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/announcing-leadership-changes-at-cosive-farewell-to-kayne-naughton-and-welcome-scott-ceely</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/anti-phishing-strategies-to-defend-your-organisation</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/assemblyline-4-services-a-guided-tour</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/australias-new-gateway-security-guidance-what-leaders-soc-should-know</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/automating-anti-phishing-canary-credentials-at-scale</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/canarycredentialsintro</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cosive-claims-first-bounty-on-the-bluehat-threat-detection-platform</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cosive-hires-ex-deloitte-prescott-pym-as-principal-consultant</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cosive-partners-with-feedly-for-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cosives-2023-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cosives-tips-for-making-a-happy-and-productive-remote-team</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/creating-cti-like-a-journalist</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cti-cmm</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cti-cmm-improving-cyber-threat-intel-maturity-with-colin-connor-terry-macdonald-prescott-pym</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/cyber-threat-intelligence-cti-crash-course</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/docintel-misp-threat-intelligence-without-boiling-the-ocean</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/dont-shoot-the-messenger-security-txt-and-collaborating-effectively-with-security-researchers</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-001-what-goes-wrong-in-threat-intel-programs-with-kayne-naughton-md-co-founder-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-002-building-production-worthy-software-in-secops-teams-with-chris-horsley-cto-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-003-securing-rest-api-endpoints-or-how-to-avoid-another-optus-with-james-cooper</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-004-how-chatgpt-could-transform-the-cti-analyst-role-with-chris-horsley</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-005-security-focused-code-review-for-software-developers-with-sid-odgers</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-006-securing-medical-devices-with-emily-etchell</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-007-how-the-nzitf-improves-new-zealands-security-posture-with-terry-macdonald</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-008-getting-started-with-cyber-threat-intelligence-cti-with-chris-horsley</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/episode-009---threat-sharing-communities-with-prescott-pym</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/establishing-a-threat-intel-program-principles-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/executive-protection-program</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/getting-more-out-of-misp-and-microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/how-chatgpt-could-transform-the-cti-analyst-role</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/how-to-communicate-remotely</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/just-how-big-does-misp-data-get-anyway</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/meet-chris-horsley-cto-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/meet-david-zielezna-principal-consultant-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/meet-emily-etchell-security-consultant-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/meet-joe-cozzupoli-field-ciso-and-principal-security-advisor-at-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/meet-prescott-pym</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/misp-2025-retrospective</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/misp-beta-ui-ux-mode-v2-5-32-a-walkthrough-from-contributor-chris-horsley</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/mitre-attacking-with-openais-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/my-washing-machine-refreshed-my-thinking-on-software-effort-estimation</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/running-your-soc-playbooks-as-code</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/running-your-soc-playbooks-as-code-use-cases</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/securing-rest-api-endpoints-or-15-steps-to-avoid-another-optus</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/seven-great-new-misp-features-you-may-have-missed</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/shanna-daly-cosive</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/soc-maturity-assessment-australia</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/the-opportunity-cost-of-self-hosting-misp</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/the-rise-in-unique-malware-how-to-defend-against-it</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/using-misp-bookmarks-with-workflows-for-team-coordination</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/watching-them-watching-you-opsec-for-security-investigators</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/what-cosives-me-day-means-to-me</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/what-goes-wrong-in-threat-intel-programs</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/what-i-learned-about-logging-and-detection-strategies-from-moving-house</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/what-is-misp-the-ultimate-introduction</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/why-cisos-should-care-about-cyber-threat-intelligence-with-joe-cozzupoli</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/blog/why-rust-is-worth-the-struggle</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/anti-phishing</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/company-culture</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/company-news</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/engineering</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/malware-analysis</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/podcast</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/security-operations</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/soar</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/categories/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/chris-horsley</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/james-garratt</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/lilith-la-rose</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/michelle-vui</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/neethu-pushkaran</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/prescott-pym</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/prue-owen</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/tash-postolovski</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/team/terry-macdonald</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/aisa-cybercon-canberra-2023-extracting-threat-intel-nutrients-from-unstructured-reports-using-robots-a-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/aisa-cybercon-canberra-2023-threat-intelligence-panel</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/aisa-cybercon-canberra-2023-threat-intelligence-without-boiling-the-ocean</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/aisa-cybercon-canberra-2023-whats-next-for-women-in-cyber-panel</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/auscert-2109-open-source-security-orchestration-automating-the-boring-stuff</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/awsn-event-workshop-mapping-incidents-to-att-ck</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/awsn-panel-sydneys-an-analysis-of-the-current-cyber-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/introduction-to-digital-forensics-workshop</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/invite-only-workshop-mapping-incidents-to-att-ck</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/keynote-running-your-soc-playbooks-as-code</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/panel-threat-intel-engineering-building-scalable-threat-intel-programs</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/events/sectalks-hobart-web-shell-hunting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/active-defence-with-canary-credentials</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/auscert-2019-running-your-security-operations-centre-soc-playbooks-as-code</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/auscert-podcast-cti-the-importance-of-info-and-why-context-matters-with-chris-horsley</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/auscert2016-maturing-your-security-team-haste-makes-waste</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/auscert2016-the-sorcerers-apprentice</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/auscert2017-day-1-kayne-naughton-focusing-security-monitoring-with-ttps</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/creating-cyber-threat-intelligence-like-a-journalist</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/extracting-threat-intel-nutrients-from-unstructured-cti-reports</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/from-stix-to-misp-and-back-again-how-hard-could-it-be</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/growing-pains-with-cti-using-a-capability-maturity-model-to-measure-and-evolve-threat-intel-programs</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/linux-conf-au-2016-using-linux-features-to-make-a-hackers-life-hard</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/nzitf-conference-2015-passwords-under-a-cloud-common-mistakes-in-password-management</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/rethinking-data-visualisation-for-cti</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/risky-business-700-yevgeny-prigozhins-empire-gets-owned-with-cosives-shanna-daly</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/running-circles-around-threat-actor-tooling-using-javascript-data-visualisation</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/secops-integrations-evolving-from-the-bowie-knife-to-the-conveyor-belt</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/snake-oilers-pangea-cosive-and-sysdig</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/stix-2-0-lego-for-your-threat-intel</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/the-glorious-theory-and-sometimes-bitter-reality-of-sharing-cti-packages</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/presentations/threat-intelligence-without-boiling-the-ocean</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/antifraud</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/bespoke-security-tooling-development</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/cloud-misp</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/code-security-review</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/csirt-soc-fundamentals-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/cti-consulting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/cti-maturity-assessment</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/ctis-consulting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/cybersecurity-tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/eclecticiq-fusion-center</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/eclecticiq-intelligence-centre</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/intel-471-adversary-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/intel-471-malware-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/introduction-to-stix-taxii-and-cybox-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/malware-zoo</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/misp-basics-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/misp-kickstart-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/network-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/open-source-intelligence-for-soc-analysts-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/open-source-security-orchestration-automating-the-boring-stuff-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/security-operations-consulting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/security-operations-engineering</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/security-operations-maturity-assessment</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/threat-hunting-for-windows-persistence-artifacts-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/threat-intel-platforms-tips-consulting</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/threat-intelligence-engineering</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capabilities/using-att-ck-to-map-threat-intelligence-to-detections-2-hours-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/commercial-feeds</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/cti-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/endpoint-protection</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/incident-response-tools</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/malware-sandboxes</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/security-assurance</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/security-engineering-integration</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/security-operations</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/security-operations-training</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/siem-tools</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/threat-intelligence-platforms-tips</loc>
    </url>
    <url>
        <loc>https://www.cosive.com/capability-area/threat-intelligence-tools</loc>
    </url>
</urlset>