<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://securitydataworks.com/</loc></url><url><loc>https://securitydataworks.com/about/</loc></url><url><loc>https://securitydataworks.com/brand/</loc></url><url><loc>https://securitydataworks.com/case-studies/</loc></url><url><loc>https://securitydataworks.com/case-studies/healthcare-foundation-validation/</loc></url><url><loc>https://securitydataworks.com/case-studies/mssp-multi-tenant-modernization/</loc></url><url><loc>https://securitydataworks.com/case-studies/regional-bank-federated-lake/</loc></url><url><loc>https://securitydataworks.com/case-studies/saas-detection-modernization/</loc></url><url><loc>https://securitydataworks.com/engagements/</loc></url><url><loc>https://securitydataworks.com/engagements/advisory-retainer/</loc></url><url><loc>https://securitydataworks.com/engagements/architecture-assessment/</loc></url><url><loc>https://securitydataworks.com/engagements/migration-assessment/</loc></url><url><loc>https://securitydataworks.com/engagements/pov/</loc></url><url><loc>https://securitydataworks.com/lab/</loc></url><url><loc>https://securitydataworks.com/matrix/</loc></url><url><loc>https://securitydataworks.com/matrix/private/</loc></url><url><loc>https://securitydataworks.com/matrix/private/components/</loc></url><url><loc>https://securitydataworks.com/matrix/private/decision-framework/</loc></url><url><loc>https://securitydataworks.com/matrix/private/decisions/</loc></url><url><loc>https://securitydataworks.com/matrix/private/vendors/</loc></url><url><loc>https://securitydataworks.com/research/</loc></url><url><loc>https://securitydataworks.com/research/ai-native-vs-augmented/</loc></url><url><loc>https://securitydataworks.com/research/aws-security-lake-ocsf/</loc></url><url><loc>https://securitydataworks.com/research/databricks-delta-iceberg/</loc></url><url><loc>https://securitydataworks.com/research/dspm-infrastructure/</loc></url><url><loc>https://securitydataworks.com/research/methodology/</loc></url><url><loc>https://securitydataworks.com/thesis/</loc></url><url><loc>https://securitydataworks.com/thesis/detectflow/</loc></url><url><loc>https://securitydataworks.com/thesis/foundation/</loc></url><url><loc>https://securitydataworks.com/thesis/mlops-hunting/</loc></url><url><loc>https://securitydataworks.com/thesis/moar/</loc></url><url><loc>https://securitydataworks.com/writing/</loc></url><url><loc>https://securitydataworks.com/writing/digital-sovereignty/</loc></url><url><loc>https://securitydataworks.com/writing/independent-measurement/</loc></url><url><loc>https://securitydataworks.com/writing/mcp-for-data-engineering/</loc></url></urlset>