<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securitic.lat/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securitic.lat/el-40-de-los-mexicanos-usa-la-nube-para-almacenar-archivos-de-trabajo-pero-no-todos-saben-protegerla-kaspersky/</loc>
		<lastmod>2026-03-06T20:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_nube.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_nube.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/malware-unico-crece-1500-watchguard/</loc>
		<lastmod>2026-03-06T21:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/malware_unico.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/malware_unico.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/kaspersky-alerta-de-posible-malware-que-puede-venir-preinstalado-de-fabrica-en-dispositivos-android/</loc>
		<lastmod>2026-03-07T16:05:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/incorporar-explicabilidad-en-la-resiliencia-de-datos-crucial-para-el-cumplimiento/</loc>
		<lastmod>2026-03-08T16:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/veeam_vanover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/veeam_vanover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/seguridad-hotelera-inteligente-como-la-tecnologia-mejora-la-experiencia-del-huesped-sin-ser-invasiva/</loc>
		<lastmod>2026-03-09T12:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_hoteleria.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_hoteleria.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/ia-ataca-al-gobierno-mexicano-eset/</loc>
		<lastmod>2026-03-06T21:23:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_ia_gobierno.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_ia_gobierno.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/de-la-duda-al-liderazgo-mujeres-que-forjaron-su-camino-en-el-mundo-de-la-ciberseguridad/</loc>
		<lastmod>2026-03-06T21:27:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_8m.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_8m.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/ataque-silencioso-a-software-de-uso-diario-permitio-infiltrar-gobiernos-kaspersky/</loc>
		<lastmod>2026-03-10T11:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_ataque_silencioso.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_ataque_silencioso.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/del-fraude-a-la-prevencion-como-evitar-la-clonacion-de-identidades/</loc>
		<lastmod>2026-03-10T14:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_cortez.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_cortez.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/sophos-identifica-el-reto-pendiente-de-ciberseguridad-que-esta-costando-millones-a-las-empresas/</loc>
		<lastmod>2026-03-11T12:33:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/sophos_adversarios_activos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/sophos_adversarios_activos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/genetec-establece-un-nuevo-estandar-en-la-seguridad-fisica-empresarial-con-cloudlink-2210/</loc>
		<lastmod>2026-03-11T13:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/genetec_cloudlink2210.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/genetec_cloudlink2210.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/netscout-revela-cambios-cualitativos-en-la-sofisticacion-de-los-ataques-ddos/</loc>
		<lastmod>2026-03-12T11:43:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/ddos_mas.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/ddos_mas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/gestion-de-llaves-y-activos-la-clave-para-optimizar-operaciones-en-las-empresas-de-logistica-distribucion-y-construccion/</loc>
		<lastmod>2026-03-12T14:51:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/traka.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/traka.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/ia-es-la-nueva-amenaza-interna-que-enfrentan-las-organizaciones-thales/</loc>
		<lastmod>2026-03-13T11:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/thales_dtr2026_rep.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/thales_dtr2026_rep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/eset-analiza-porque-tu-bandeja-de-entrada-esta-llena-de-spam-o-estafas/</loc>
		<lastmod>2026-03-14T12:57:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_email.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_email.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/videovigilancia-se-consolida-como-activo-estrategico-del-negocio-axis-communications/</loc>
		<lastmod>2026-03-09T14:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_activo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_activo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/veeam-presenta-agent-commander-para-enfrentar-los-riesgos-de-los-agentes-de-ia-a-escala-empresarial/</loc>
		<lastmod>2026-03-13T15:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/veeam_ag_comm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/veeam_ag_comm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/sonicwall-renueva-su-programa-de-canales-securefirst/</loc>
		<lastmod>2026-03-17T22:52:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/sonicwall_securefirst_pp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/sonicwall_securefirst_pp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/mrktec-celebra-15-anos-impulsando-el-negocio-de-seguridad-electronica-en-mexico/</loc>
		<lastmod>2026-03-20T01:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/mrktec_15aniversario.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/mrktec_15aniversario.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/movilidad-urbana-y-seguridad-el-reto-de-integrar-tecnologia-en-el-transporte-concesionado/</loc>
		<lastmod>2026-03-24T00:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/mx_taxi_foto.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/mx_taxi_foto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/ciberataques-a-cadenas-de-suministro-se-intensifican-en-mexico-kaspersky/</loc>
		<lastmod>2026-03-27T01:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/cad_suministro.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/cad_suministro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/eset-muestra-cuales-son-las-amenazas-mas-activas-en-la-region/</loc>
		<lastmod>2026-03-27T01:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_mal_lat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_mal_lat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/con-kaspersky-cup-2026-los-partners-podran-viajar-al-mundial/</loc>
		<lastmod>2026-03-27T02:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_lobato.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/kaspersky_lobato.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/biometria-en-mexico-seis-claves-para-la-autenticacion-segura-en-2026/</loc>
		<lastmod>2026-03-27T02:07:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_magana.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_magana-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/mundial-2026-dispara-alertas-por-estafas-digitales-en-mexico-eset/</loc>
		<lastmod>2026-03-27T02:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_alerta_mundial.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_alerta_mundial.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/palo-alto-networks-anuncia-innovaciones-clave-para-fortalecer-la-ciberseguridad-en-la-era-de-la-ia-avanzada/</loc>
		<lastmod>2026-03-27T02:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/paloalto_prismaairs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/paloalto_prismaairs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/netskope-lanza-netskope-one-ai-security/</loc>
		<lastmod>2026-03-27T02:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/netskope_sanjay.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/netskope_sanjay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/cisco-reinventa-la-seguridad-para-el-personal-que-utiliza-agentes/</loc>
		<lastmod>2026-03-27T02:20:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/cyber_cisco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/cyber_cisco.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/la-vigencia-de-las-credenciales-fisicas-en-las-organizaciones/</loc>
		<lastmod>2026-03-27T02:23:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_fargo_cred.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hid_fargo_cred.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/genetec-suma-nuevas-funciones-de-control-de-acceso-en-security-center-saas/</loc>
		<lastmod>2026-03-27T02:27:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/genetec_primage_acaas.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/genetec_primage_acaas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/axis-partner-summit-2026-reune-a-90-empresas-de-america-latina/</loc>
		<lastmod>2026-03-27T02:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_psumm_26.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/axis_psumm_26.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/lumu-defender-amplia-la-visibilidad-mas-alla-de-la-red/</loc>
		<lastmod>2026-03-27T12:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/lumu_villadiego.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/lumu_villadiego.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/smartsuite-incorpora-el-video-inteligente-de-iqsight-a-milestone-xprotect/</loc>
		<lastmod>2026-03-27T14:32:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/milestone_iqsight.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/milestone_iqsight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/amesis-se-suma-al-convenio-conectar-con-fiscalia-de-queretaro/</loc>
		<lastmod>2026-03-30T12:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/amesis_conectar.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/amesis_conectar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/ia-analitica-de-video-y-datos-en-tiempo-real-redefinen-la-seguridad-en-empresas-y-ciudades-hikvision/</loc>
		<lastmod>2026-03-31T02:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hikvision_syscomexpo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/hikvision_syscomexpo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/eset-comparte-el-panorama-de-la-actividad-actual-de-infostealers/</loc>
		<lastmod>2026-03-28T14:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_infostealer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/eset_infostealer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/manageengine-endpoint-central-avanza-hacia-la-seguridad-autonoma-de-endpoints-con-edr-y-acceso-privado-seguro/</loc>
		<lastmod>2026-03-29T14:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/manage_engine_endp_cent.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/manage_engine_endp_cent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/la-ia-ya-puede-imitar-la-voz-de-un-jefe-en-estafas-check-point-software/</loc>
		<lastmod>2026-03-31T12:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/voz_fake.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/voz_fake.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/milestone-systems-redefine-la-plataforma-abierta-para-una-era-nativa-de-ia/</loc>
		<lastmod>2026-03-31T12:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/milestone_anuncios.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/milestone_anuncios.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/en-ciberseguridad-entramos-a-la-guerra-de-las-maquinas/</loc>
		<lastmod>2026-04-01T11:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/ia_war.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/ia_war.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/el-74-de-empresas-en-mexico-cree-tener-ciberseguridad-proactiva-pero-solo-reacciona-a-ataques-kaspersky/</loc>
		<lastmod>2026-04-02T15:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/seguridad_mano.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/03/seguridad_mano.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/unit-42-revela-riesgo-critico-en-google-cloud-vertex-ai/</loc>
		<lastmod>2026-04-10T01:45:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/cloud_goog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/cloud_goog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/milestone-systems-impulsa-la-modernizacion-del-acceso-residencial-en-republica-dominicana/</loc>
		<lastmod>2026-04-10T01:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/milestone_awm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/milestone_awm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/solo-el-5-de-las-organizaciones-confia-en-sus-proveedores-de-ciberseguridad-sophos/</loc>
		<lastmod>2026-04-10T01:54:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/seguridad_blur.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/seguridad_blur.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/la-copa-mundial-2026-pondra-a-prueba-la-experiencia-de-siete-millones-de-aficionados-genetec/</loc>
		<lastmod>2026-04-10T02:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/caosvial_soccer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/caosvial_soccer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/sonicwall-ha-sido-nombrado-lider-y-fast-mover-en-el-radar-gigaom-2026-para-firewalls-empresariales/</loc>
		<lastmod>2026-04-10T02:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/sonicwall_nsa.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/sonicwall_nsa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/estadios-seguros-en-america-latina-proteccion-dentro-y-fuera-de-la-cancha/</loc>
		<lastmod>2026-04-10T02:10:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/estadios_cams.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/estadios_cams.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/adversarios-ciberneticos-transforman-modelo-de-negocio-para-escalar-y-acelerar-ataques-hpe/</loc>
		<lastmod>2026-04-10T14:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/hpe_threatlabs.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/hpe_threatlabs.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/la-participacion-femenina-en-seguridad-tecnologica-gana-terreno-en-mexico-hikvision/</loc>
		<lastmod>2026-04-11T14:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/hik_mujeres26.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/hik_mujeres26.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/empresas-avanzan-con-ia-pero-ignoran-como-recuperar-estos-entornos-en-caso-de-falla-check-point-software/</loc>
		<lastmod>2026-04-12T14:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/backup_dedo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/backup_dedo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/watchguard-lanza-nuevo-portafolio-endpoint-que-transforma-el-modelo-de-licencias/</loc>
		<lastmod>2026-04-13T12:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/wguard_endpoint.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/wguard_endpoint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/nueva-generacion-de-ransomware-apunta-a-latinoamerica-con-ataques-a-medida-eset/</loc>
		<lastmod>2026-04-14T13:23:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/eset_ransom.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/eset_ransom.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/eset-advierte-de-troyano-de-acceso-remoto-que-esta-avanzando-en-la-region/</loc>
		<lastmod>2026-04-13T12:25:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/eset_troyan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/eset_troyan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securitic.lat/sonicwall-presenta-el-informe-cyber-protect-2026/</loc>
		<lastmod>2026-04-17T23:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/sonicwall_cyberprotect2026.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securitic.lat/wp-content/uploads/2026/04/sonicwall_cyberprotect2026.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->