<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.nozominetworks.com</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/academy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/accenture</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/airport-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/analyst-reports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/analysts-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/arc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/asset-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/building-automation-system-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/careers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/central-management-console</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/contact-us</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/data-center-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/data-sheets</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/demo</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/distributors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/electric-utilities-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/email-signature</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/events</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/fast-track-service-packages</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/federal-government</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/global-strategic-alliances</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/guardian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/guides</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/healthcare-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/infographics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/iot-ot-asset-inventory-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/iot-ot-network-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/iot-ot-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/keysight</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/leadership</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/manufacturing-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/maritime-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/mining-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/mssp-elite-focus-partners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/nerc-cip</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/newsroom</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/nis2-directive-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/oil-gas-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/company/open-positions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/pharmaceutical-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/podcasts</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/project-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/rail-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/regulations-overview</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/research-reports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/retail-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/search</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/sec-cybersecurity-rules</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/sis-vars</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/smart-cities-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/smart-polling</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/solution-deployment</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/solution-design</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/solution-optimization</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/support</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/technical-specifications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/technology-alliances-partners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/tsa-security-directives</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/vantage-iq</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/videos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/vulnerability-advisories</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/water-wastewater-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/webinars</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/white-papers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/find-a-partner</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/guardian-air</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/content-packs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/isa-iec-62443-standards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/partners/oems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/ot-cybersecurity-faqs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/customer-resources</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/product-tour</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/ot-iot-cybersecurity-trends-insights-july-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/federal/federal-civilian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/federal/defense-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/vulnerabilities-product-tour</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/stadiums-arenas</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/product-tours/asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/product-tours/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/arc-embedded</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/ti-expansion-pack-powered-by-mandiant</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/industries/state-local-government</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/technology-alliance-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/solutions/ot-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/upcoming-events</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/trust-center</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/designated-engineer</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/health-check-service</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/professional-services/optimization-service</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/value-estimator</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/gartner-voice-of-the-customer-cps</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/ot-iot-cybersecurity-trends-insights-july-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/forrester-wave-iot-security-solutions-leader</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/spark-2025-agenda</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/featured-event/ics-cybersecurity-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/platform/how-our-cybersecurity-platform-uses-ai</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/featured-event/nozomi-networks-at-s4x26</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/nerc-cip-015</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/spark-2026-nozomi-networks-customer-conference</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/featured-event/rsac-2026-conference</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/ot-iot-cybersecurity-trends-insights-february-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/gartner-magic-quadrant-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/gartner-critical-capabilities-cps-protection-platforms-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/compliance/dow-zt-for-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/14-vulnerabilities-discovered-in-phoenix-contact-hmis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/15-million-investment-fuels-nozomi-networks-future-growth</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/19-new-vulnerabilities-found-in-sel-real-time-automation-controllers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/2017-sans-survey-three-ways-ics-security-is-improving</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/2018-predictions-ics-cybersecurity-goes-mainstream</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/2019-predictions-ics-cyber-security-challenges-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/2019-the-year-of-ics-cyber-security-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/3-lessons-learned-from-liberty-eclipse-gridex-vii</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/3-reasons-ggv-capital-invested-in-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/3-ways-norsk-hydro-kept-its-reputation-during-lockergoga-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/3-ways-to-diagnose-ot-network-issues-with-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/30-million-funding-fuels-nozomi-networks-ics-security-leadership</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/37-vulnerabilities-in-openflow-libfluid-msg-parsing-library</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/4-essential-benefits-of-ot-asset-inventory-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/4-questions-cisos-need-to-answer-before-sec-deadline</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/5-things-to-consider-for-your-ics-security-proof-of-concept</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/9-new-vulnerabilities-impact-schweitzer-engineering-labs-software</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/a-deep-dive-into-glupteba-internals</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/a-guide-to-healthcare-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/a-guide-to-tackling-industrial-automation-cyber-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/a-note-to-our-customers-and-partners-in-the-middle-east</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/act-now-on-critical-microsoft-smb-vulnerability-cve-2020-0796</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/addressing-cybersecurity-readiness-for-the-global-shipping-industry</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/addressing-increasing-cyber-regulations-nozomi-networks-co-founds-ot-cyber-coalition</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/addressing-tsa-aviation-security-directive-for-airlines-and-airports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/advance-it-ics-cybersecurity-with-nozomi-networks-and-fortinet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/advances-in-cyber-security-for-electric-utilities-wg15-black-hat</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/advancing-ics-cybersecurity-for-low-impact-electricity-carriers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/advancing-iec-standards-for-power-grid-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/agrius-in-focus-dissecting-a-web-shell</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/an-ics-cyber-security-storm-is-brewing-how-to-prevent-staff-burnout</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/an-introduction-to-nozomi-networks-content-packs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/analyzing-the-greyenergy-malware-from-maldoc-to-backdoor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/answering-the-call-for-heightened-vigilance-in-the-face-of-unknown-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/arc-forum-4-key-criteria-for-ics-cybersecurity-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/are-european-companies-ready-for-nis2-implementation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/are-you-ready-for-the-perfect-operational-security-storm</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/army-of-the-undone-securing-iot-across-critical-sectors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/artificial-intelligence-in-modern-cybersecurity-from-payloads-to-apt-ops</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/australian-security-of-critical-infrastructure-soci-act</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/automatic-restoration-of-corrupted-upx-packed-samples</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/backdooring-codesys-applications-via-vulnerability-chaining</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/bad-rabbit-highlights-employees-role-in-cybersecurity-attacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/be-on-the-lookout-for-these-new-cybersecurity-threats-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/black-hat-the-future-of-securing-power-grid-intelligent-devices</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/black-hat-understanding-triton-the-first-sis-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/bosch-rexroth-ctrlx-hmi-wr21-browser-based-hmi-affected-by-multiple-security-flaws</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/breaking-research-lockergoga-ransomware-impacts-norsk-hydro</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/can-you-identify-your-critical-business-functions-and-their-technology-dependencies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisa-alert-sophisticated-ongoing-cyberattacks-go-beyond-solarwinds</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisa-gets-serious-about-visibility-on-federal-networks-how-u-s-agencies-can-meet-bod-23-01</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisa-sponsored-cve-program-grants-nozomi-networks-cna-status</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisa-warns-of-pro-russia-hacktivist-ot-attacks-on-water-wastewater-sector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisas-resilient-investment-planning-and-development-sets-cybersecurity-priorities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cisos-are-shifting-ot-cybersecurity-toward-a-business-outcomes-mentality</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cmmc-compliance-made-easy-with-the-nozomi-networks-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/colonial-pipeline-ransomware-attack-revealing-how-darkside-works</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/complex-operations-benefit-from-process-variable-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/comprehensive-detection-is-needed-for-ot-and-iot-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/comprehensive-ot-cybersecurity-from-nozomi-networks-fortinet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/compromising-automationdirect-productivity-suite-to-breach-the-ot-perimeter</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/could-threat-actors-be-downgrading-their-malware-to-evade-detection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/covid-19-chinoxy-backdoor-a-network-perspective</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/covid-19-coronavirus-malware-new-ot-and-iot-security-tools</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/critical-infrastructure-cybersecurity-survey-finds-perfect-storm</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/critical-log4shell-apache-log4j-zero-day-attack-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/crowdstrike-outage-what-nozomi-customers-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cyber-threats-are-in-the-air-nozomi-networks-extends-detection-to-the-wireless-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/cybersecurity-for-building-automation-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/dark-nexus-iot-botnet-analyzing-and-detecting-its-network-activity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/decrypt-r-goose-messages-in-power-substations-at-scale-per-iec-62351-9-with-gdoi-key-exchange</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/deep-ibm-collaboration-delivers-unified-it-and-ot-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/defending-against-industroyer-with-ics-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/defending-against-iot-security-camera-hacks-like-verkada</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/demonstrating-the-link-between-functional-safety-and-ics-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/detecting-new-ot-threats-how-to-do-it-proactively</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/detecting-ot-cybersecurity-threats-using-the-known-unknown-matrix</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/digital-transformations-impact-on-operational-technology-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/dont-trust-but-verify-getting-to-zero-trust-for-ot-and-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/drafting-your-ot-security-dream-team</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/driving-ndaa-section-1505-compliance-with-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/electric-grid-cyber-security-ten-actions-utilities-can-do-now</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/elevate-your-ot-iot-security-with-nozomi-dynamic-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/embrace-cloud-based-ot-iot-cybersecurity-now-with-vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/enhanced-product-security-incident-response-reduces-customer-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/enhancing-threat-intelligence-with-the-mitre-attck-framework</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ensuring-cybersecurity-of-medical-devices-fdc-act</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/epa-memorandum-directs-public-water-systems-to-survey-ot-ics-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/esp-now-the-double-edged-sword-of-iot-ease-of-use</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ethos-emerging-threat-open-sharing-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/exploiting-healthcare-supply-chain-security-merge-dicom-toolkit</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/exploring-modifications-in-new-mirai-botnet-clones</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/extract-firmware-from-ot-devices-for-vulnerability-research</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/finding-the-ot-in-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/firmware-security-research-dahua-facial-recognition-station</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/five-new-vulnerabilities-disclosed-in-patient-monitoring-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/five-vulnerabilities-on-sel-451-allow-authentication-bypass-and-dos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-bently-nevada-3500-allow-attackers-to-bypass-authentication</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-espressif-esp-now-allow-attackers-to-replay-communications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-gx-works3-threaten-mitsubishi-electric-safety-plc-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-hitachi-relion-650-670-series-ieds-update-mechanism</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-phoenix-contact-mguard-industrial-router-allow-up-to-root-rce</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/flaws-in-zettler-130-8005-industrial-gateway-expose-systems-to-remote-exploitation-and-dos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/focus-of-ot-and-iot-cybersecurity-in-australias-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/for-cyber-mature-financial-institutions-the-risk-is-in-the-building</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/for-retailers-digital-innovation-increases-efficiency-and-the-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/four-vulnerabilities-in-beckhoff-twincat-bsd-could-allow-plc-logic-tampering-dos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/frost-radar-declares-nozomi-networks-cybersecurity-leader</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/frost-sullivan-honors-nozomi-networks-with-2019-ics-security-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ge-healthcare-vivid-ultrasound-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ge-selects-nozomi-networks-for-advanced-ics-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/get-more-insight-into-endpoint-activity-and-threats-with-nozomi-arc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/get-ready-for-circia-and-nis2-cyber-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/getting-to-know-the-nist-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/government-helps-its-supply-chain-build-ot-and-iot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/grading-my-2018-ics-security-predictions-did-they-come-true</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/greyenergy-malware-research-paper-maldoc-to-backdoor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/greyenergy-malware-targets-industrial-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/guardian-air-protects-against-wireless-cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/guide-to-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/guide-to-national-cybersecurity-strategy-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/hard-lessons-from-the-oldsmar-water-facility-cyberattack-hack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/hardware-supply-chain-compromise-in-human-interface-devices-nozomi-networks-hydro-quebec-joint-research</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/has-the-cve-program-lost-federal-funding-nozomi-networks-ensures-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-ai-ml-are-transforming-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-ics-data-analytics-cyber-security-deliver-true-business-value</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis-part-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-the-national-vulnerability-database-could-be-abused-to-spread-malware</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-analyze-malware-for-technical-writing</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-build-an-iot-honeypot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-classify-your-nerc-cip-015-1-insm-system-correctly</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-dissect-unusual-protocols-for-troubleshooting-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-ensure-you-have-complete-ot-ics-asset-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-navigate-cyber-operational-risk-conversations-with-your-board</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-to-tap-doe-cybersecurity-funds-for-rural-municipal-small-investor-owned-utilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-viable-is-zero-trust-for-ot-iot-networks-is-it-a-journey-or-a-destination</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/how-will-chatgpt-affect-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/hunting-the-mongoose-discovering-10-vulnerabilities-in-the-mongoose-web-server-library</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ibm-security-expands-its-mssp-for-ot-and-iiot-with-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ics-cybersecurity-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ics-security-lags-digitization-in-u-s-oil-and-gas-industry</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/iec-61850-meets-iec-62351</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/iec-62351-standards-for-securing-power-system-communications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/importance-of-iot-ot-endpoint-detection-in-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/improving-airport-cybersecurity-starts-with-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/improving-ics-cyber-resiliency-with-new-version-of-scadaguardian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/improving-ics-cybersecurity-for-pipeline-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/improving-maritime-cybersecurity-and-operational-resiliency</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/improving-pipeline-operational-visibility-avoids-costly-downtime</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/in-2026-ai-powered-cybersecurity-for-ot-iot-is-table-stakes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/incontroller-acting-to-protect-customers-from-unknown-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/industrial-cybersecurity-needs-broad-deep-ot-iot-threat-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/industrial-operators-on-alert-in-wake-of-us-cyberattack-warning</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/industroyer2-nozomi-networks-labs-analyzes-the-iec-104-payload</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/industroyer2-targets-ukraines-electric-grid-heres-how-companies-can-stay-protected-and-resilient</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/insider-threats-in-ot-ics-call-for-endpoint-sensors-and-behavioral-analytics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/integration-with-cisco-technologies-delivers-it-ics-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/introducing-a-next-generation-ics-security-expert-andrea-carcano</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/introducing-vantage-our-new-saas-product-for-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/iot-devices-the-newest-source-of-ot-network-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ip-cameras-in-modern-warfare-pre-strike-recon-and-post-strike-assessment</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/iranian-apt-activity-during-geopolitical-escalation-recommendations-for-nozomi-customers-and-critical-infrastructure-owners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/is-ot-cybersecurity-still-a-team-sport</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/isa-iec-62443-explained-best-practices-for-iacs-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/latest-on-lookback-more-than-a-dozen-utilities-targeted</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/leonardo-partnership-boosts-critical-infrastructure-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/log4j-exploit-attempts-continue-1-year-later</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/log4shell-nozomi-networks-continues-to-improve-security-for-new-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/major-power-outage-hits-spain-and-portugal-spotlight-on-critical-energy-infrastructure-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/making-the-case-for-an-it-ot-security-operations-center-soc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/managing-ot-risk-while-protecting-your-organizations-reputation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/manufacturing-security-and-resilience-start-with-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/mapping-the-ransomware-landscape-summer-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/massive-iot-disruption-coming-to-an-ot-network-near-you</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/meet-guardian-community-edition-a-free-tool-for-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/merging-security-and-operational-asset-data-with-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/methods-for-extracting-firmware-from-ot-devices-for-vulnerability-research</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/metrics-mandates-and-management-trends-predictions-for-ot-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/mitigating-the-potential-impact-of-covid-19-related-ot-security-risks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/momentum-continues-for-new-tech-integrations-barracuda-ibm-security-and-servicenow</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/monitoring-hard-to-reach-devices-unique-protocols-in-utility-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/monitoring-secure-remote-access</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/moveit-vulnerabilities-hacked-what-critical-infrastructure-organizations-can-do-to-stay-safe</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nerc-cip-015-2-will-expand-insm-beyond-electronic-security-perimeter</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nerc-cip-015-in-practice-2-the-current-state-of-insm-in-utilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nerc-cip-015-in-practice-early-challenges-and-common-pitfalls-for-utilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nerc-internal-network-security-monitoring-insm-standard</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-annke-vulnerability-shows-risks-of-iot-security-camera-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-anomaly-detection-accelerates-ot-and-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-axis-os-security-research-aided-by-transparent-design</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-botenago-variant-discovered-by-nozomi-networks-labs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-iot-security-risk-throughtek-p2p-supply-chain-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-nozomi-networks-labs-report-august-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-ot-iot-security-report-trends-and-countermeasures-for-critical-infrastructure-attacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-partnerships-boost-ot-iot-security-across-digital-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-product-line-delivers-choice-in-deep-ics-network-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-release-industroyer2-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-release-introduces-hybrid-ics-threat-detection-and-more</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-release-isa-iec-62443-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-release-isa-iec-62443-content-pack-version-2-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-reolink-p2p-vulnerabilities-show-iot-security-camera-risks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-report-ransomware-vulnerabilities-and-iot-security-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-report-top-ot-iot-security-threats-and-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-research-uncovers-5-vulnerabilities-in-mitsubishi-safety-plcs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-switch-vulnerability-discovered-by-nozomi-networks-labs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-threat-intelligence-feed-for-third-party-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-threat-intelligence-reveals-misuse-of-dns-protocol</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-triton-analysis-tool-wireshark-dissector-for-tristation-protocol</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-triton-ics-malware-is-bold-and-important</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/new-wave-of-ransomware-threatens-ot-security-and-reliability</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nis2-directive-what-changed</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nis2-is-here-now-what</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/not-all-ot-security-acquisitions-are-the-same</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-and-nokia-unify-ot-iot-security-for-industries-powered-by-private-5g</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-arc-adds-flexible-automated-threat-prevention-for-ot-endpoints</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-expands-ics-embedded-security-offerings-with-arc-embedded-for-schneider-electric-rtus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-2024-look-back-and-2025-predictions-for-ot-ics-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-accenture-secure-global-industrial-infrastructures</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-and-ibm-team-up-to-answer-demand-for-integrated-it-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-and-mandiant-power-increased-awareness-and-response-to-ot-and-iot-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-and-skybox-security-cooperate-to-de-risk-it-ot-converged-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-brings-ics-expertise-to-new-cisa-ics-jcdc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-cyber-security-solution-embedded-in-ruggedcom</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-discovers-nine-vulnerabilities-affecting-sewio-rtls-studio</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-discovers-three-vulnerabilities-affecting-bluemark-dronescout-ds230-remote-id-receiver</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-discovers-vulnerability-in-siemens-building-automation-software</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-embeds-scadaguardian-advanced-on-ruggedcom-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-finishes-strong-s4-ics-detection-challenge</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-helps-build-isa-global-cybersecurity-alliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-integrates-with-palo-alto-networks-next-generation-firewall</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-announces-vulnerabilities-affecting-the-ailux-rtu62351b-and-the-codename-i11usion-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-cognex-insight-is2000m-120-smart-camera-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-discovering-and-reporting-vulnerabilities-to-increase-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-discovers-15-new-vulnerabilities-affecting-bosch-rexroth-ctrlx-core</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-enhances-radamsa-for-safer-ics-software</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-finds-new-rockwell-plc-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-presents-zero-day-vulnerabilities-affecting-mitsubishi-electric-safety-plcs-at-black-hat-mea-23</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-sharing-valuable-ics-cyber-security-research</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-takes-on-the-armasuisse-ics-and-automotive-hackathons</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-takes-on-the-domotics-hackathon-at-the-armasuisse-cyber-defence-campus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-labs-unveils-codename-i11usion-research-at-no-hat-23</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-named-a-leader-in-2025-gartner-magic-quadrant-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-named-a-leader-in-2026-gartner-magic-quadrant-for-cps-protection-platforms-receives-highest-scores-across-all-critical-capabilities-use-cases</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-named-leader-in-frost-radar-for-ot-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-publishes-vulnerabilities-in-siemens-desigo-devices</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-quality-stands-ics-detection-challenge-s4</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-report-building-cyber-resilience-in-the-water-sector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-researchers-reveal-zero-day-rtls-vulnerabilities-at-black-hat-22</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-researchers-take-a-deep-look-into-the-ics-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-scales-globally-to-deliver-advanced-ics-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-schneider-electric-work-together-to-secure-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-stands-with-ukraine</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-networks-zscaler-deliver-zero-trust-remote-access-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nozomi-onepass-flexible-industry-first-subscription-pricing-for-hardware-and-more</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nsa-cisa-call-for-action-to-lower-ot-iot-cybersecurity-exposure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/nsa-doe-mitre-and-industry-experts-share-advice-on-building-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/oil-gas-cybersecurity-and-process-safety-converge-thanks-to-triton</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/open-drone-id-nozomi-networks-adds-support-to-detect-drones-with-guardian-air</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/open-source-approach-for-cybersecurity-information-sharing</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/open-source-software-exposes-ics-device-vulnerabilities-to-hackers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/operational-visibility-boosts-cyber-security-for-midstream-operators</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-and-iot-security-adopt-a-post-breach-mindset-today</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-cyber-risk-reality-check-what-cisos-need-to-know-to-protect-industrial-and-critical-infrastructure-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-cybersecurity-in-2023-time-to-show-the-receipts</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-cybersecurity-risk-management-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-iot-security-start-from-a-never-trust-always-verify-mindset</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-iot-security-superheroes-tackling-the-remote-employee-challenge</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-network-segmentation-for-cyber-resiliency</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ot-security-is-moving-to-the-endpoint-where-humans-interact</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/over-the-air-vulnerabilities-discovered-in-advantech-eki-access-points</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/overcoming-it-ot-cybersecurity-convergence-roadblocks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/p2pinfect-worm-evolves-to-target-a-new-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/perspectives-early-lead-in-filling-global-ot-security-demand</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/pharma-cyber-security-how-to-tackle-malware-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/powerful-forces-are-reshaping-continuous-ot-monitoring-requirements</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/preparing-for-nerc-cip-015-1-internal-network-security-monitoring-for-electric-utilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/presidential-executive-order-impacts-us-power-system-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/printnightmare-how-to-check-if-your-systems-are-still-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/printnightmare-remote-code-execution-in-windows-spooler-service</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/protecting-against-frostygoop-bustleberm-malware</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/protecting-the-phoenix-unveiling-critical-vulnerabilities-in-phoenix-contact-hmi-part-3</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/real-time-visibility-and-threat-detection-for-manufacturing-using-nozomi-networks-vantage-on-aws</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/recent-ransomware-threatens-ot-security-reputation-and-gdpr-fines</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/reduce-ot-risk-with-ics-network-visualization-and-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/responding-to-the-colonial-pipeline-breach-cisa-ransomware-alert</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/resurrecting-a-silent-console-from-u-boot-to-linux-shell</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/reverse-engineering-obfuscated-firmware-for-vulnerability-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ripple20-new-zero-day-vulnerabilities-send-shockwaves-across-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/role-of-ot-iot-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/russian-cyber-attacks-on-critical-infrastructure-the-new-normal</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/russian-cyberattacks-on-critical-infrastructure-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/sans-2019-ot-ics-cyber-security-research-3-key-findings</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/sans-ics-survey-how-scadaguardian-tackles-the-top-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/scada-cyber-security-for-an-industry-4-0-oil-and-gas-application</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/scadaguardian-update-enhances-ot-visibility-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/sec-cybersecurity-rules-using-the-sox-model-to-get-it-right</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/secure-remote-access-gain-control-over-home-office-network-activity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-australias-critical-infrastructure-how-iec-62443-strengthens-soci-act-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-building-management-systems-from-cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-critical-ics-assets-with-nozomi-arc-embedded</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-critical-rail-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-substations-and-power-grids-with-ics-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-the-digital-port-uscg-cybersecurity-compliance-for-u-s-maritime-port-operators</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/securing-the-grid-understanding-the-cybersecurity-risks-of-the-ge-n60-network-relay</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/security-flaws-discovered-in-goahead-might-affect-web-servers-over-embedded-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/security-for-iot-networks-needs-to-reflect-an-ot-mindset</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/sharpening-shields-up-cisa-delivers-critical-infrastructure-cyber-performance-goals-to-prioritize-decisions-spending-and-action</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/shelly-pro-4pm-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/simplifying-the-ics-cyber-security-vendor-selection-process</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/six-vulnerabilities-found-in-axis-camera-systems-license-plate-verifier-application</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/smart-cities-continue-to-prioritize-cybersecurity-to-ensure-privacy-and-resiliency</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/smile-youre-being-hacked-nozomi-networks-labs-finds-five-new-flaws-in-hanwha-wisenet-cameras</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/snake-ransomware-is-raising-concerns-for-industrial-controls-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/social-engineering-a-threat-to-operational-technology</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/solarwinds-cyberattack-layered-ot-security-creates-best-defense</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/speeding-it-visibility-into-ot-new-integrations-with-fortinet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/surge-in-cyberattacks-puts-manufacturing-ot-systems-at-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/surprising-findings-in-the-sans-2021-ot-ics-cybersecurity-survey</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/suzanne-spaulding-how-to-build-resiliency-against-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/taking-action-against-racism</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/tapping-visibility-into-ot-iot-devices-for-preventative-maintenance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/technical-analysis-of-the-winbox-payload-in-windigo</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-big-picture-secure-critical-infrastructure-with-cooperation-automation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-challenges-of-ics-vulnerability-assessment-process</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-clever-use-of-postdissectors-to-analyze-layer-2-protocols</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-cost-of-ot-cyber-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-cyber-risks-of-transportations-connected-ot-iot-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-evolving-panchan-botnet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-federal-government-needs-to-address-ot-iot-security-now</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-importance-of-reverse-engineering-in-network-analysis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-long-range-disruption-of-industrial-iot-lorawan-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-nozomi-networks-platform-ranks-among-three-highest-scoring-vendors-in-2025-gartner-critical-capabilities-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-remote-access-genie-is-out-of-the-bottle-protect-your-ot-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-sprint-to-secure-u-s-utilities-nozomi-networks-and-the-doe-plan</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-three-most-common-mining-industry-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-u-s-government-is-creating-security-standards-for-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-uk-cyber-security-and-resilience-bill-what-ot-asset-owners-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/the-year-of-the-defender-2022-predictions-for-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/these-iranian-affiliated-attackers-didnt-need-a-zero-day-they-just-used-the-manual</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/threat-actor-activity-related-to-the-iran-conflict</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/threat-intelligence-analysis-of-the-sbidiot-iot-malware</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/thwarting-a-power-grid-control-center-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/thyssenkrupp-cyberattack-protecting-ics-from-advanced-persistent-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/to-close-the-ot-cybersecurity-skills-gap-let-ai-do-what-ai-does-best</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/tracking-malicious-glupteba-activity-through-the-blockchain</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/trust-matters-uncovering-vulnerabilities-in-the-matter-protocol</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/tsa-requirements-a-snapshot-of-growing-attention-to-pipeline-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/two-reasons-for-the-ics-cybersecurity-deficiency</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/two-steps-to-adopting-cyber-security-best-practices-for-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/u-s-executive-order-on-cybersecurity-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/ukraine-vermont-utility-cyberattacks-highlight-need-for-robust-ics-security-in-2017</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/uks-new-national-asset-securing-data-centers-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/understanding-the-current-threat-landscape-to-strengthen-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/unpatched-vulnerabilities-in-production-line-cameras-may-allow-remote-surveillance-hinder-stoppage-recording</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/urgent-11-new-ics-threat-signatures-by-nozomi-networks-labs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/us-sanctions-russia-for-cyberattacks-critical-infrastructure-at-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/us-v-cyber-criminals-critical-infrastructure-edition</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/using-ai-to-enhance-asset-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/using-mitre-attack-for-ics-framework</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/using-secure-by-design-power-systems-to-prevent-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/uwb-rtls-vulnerability-confirmed-in-ubisense-dimension4-3d-tracking-system</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vantage-delivers-actionable-ot-iot-security-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vantage-iq-assistant-extends-ai-engine-into-query-creation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vantage-iq-is-your-new-intelligent-cybersecurity-assistant</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vantage-new-feature-breakdown-selective-data-synchronization</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-1</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-in-johnson-controls-exacqvision-web-service-expose-security-systems-to-video-stream-hijacking</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-in-wago-plcs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-on-bosch-rexroth-nutrunners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerabilities-on-sensor-net-connect-and-thermoscan-ip-could-allow-admin-privileges-over-medical-data-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/vulnerability-in-dahua-s-onvif-implementation-threatens-ip-camera-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/wannacry-a-wake-up-call-to-revisit-ics-cybersecurity-measures</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/web-interface-flaw-threatens-reliability-of-cyber-physical-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/were-proud-to-be-a-partner-first-company</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/what-is-operational-risk-assessing-sec-rule-readiness-for-ot-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/what-is-zero-trust-security-and-what-are-its-benefits</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/what-it-needs-to-know-about-ot-io-security-threats-in-2020</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/what-nsm-22-means-for-critical-infrastructure-owners-and-operators</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/what-you-need-to-know-about-lookback-malware-and-how-to-detect-it</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/whats-new-in-nozomi-networks-v19-0-ics-security-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/whats-new-in-nozomi-networks-version-23-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/whats-new-in-nozomi-networks-version-24</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/whats-new-in-nozomi-q2-2026-vantage-iq-ai-powered-integrations-and-guardian-air-updates</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/when-a-100-million-round-isnt-the-most-exciting-news</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-business-leaders-need-to-focus-on-industrial-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-fight-uphill-level-the-playing-field-with-saas-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-gaining-complete-asset-visibility-across-ot-iot-environments-is-so-crucial-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-lux-capital-invested-in-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-you-should-incorporate-ot-in-your-security-operations-center</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/why-your-ot-iot-network-needs-always-on-security-and-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/your-guide-to-the-mitre-attack-framework-for-ics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/zero-trust-in-ot-why-its-been-hard-and-why-new-cisa-guidance-changes-everything</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/blog/zionsiphon-why-ot-threat-claims-need-technical-and-operational-scrutiny</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/20-nozomi-networks-queries-unlock-more-analytics-on-assets-traffic-and-alerts</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/2023-ot-security-insights-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/2026-gartner-magic-quadrant-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/4-ot-attack-scenarios-how-arc-embedded-detects-threats-in-your-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/a-day-in-the-life-of-an-ot-responder</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/a-deep-look-into-the-ics-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/absicherung-eines-weltweiten-energienetzwerks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/accenture-airport</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/accenture-auto</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/accenture-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/accenture-pharma</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/advanced-monitoring-cyber-incident-response-for-ics-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/aeroportos-em-paz-com-os-desafios-da-seguranca-cibernetica-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/aeroports-comment-repondre-aux-defis-de-la-cybersecurite</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ai-ml-trends-in-ot-iot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/airports-keeping-pace-with-cybersecurity-challenges</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/alan-berusch-the-role-of-culture-in-company-success</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/alessandro-di-pinto-a-day-in-the-life-of-athreat-analyst</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/an-intro-to-ai-powered-ot-iot-cybersecurity-with-vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/an-intro-to-using-threat-intelligence-in-vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/andrea-carcano-getting-to-know-an-ot-security-entrepreneur</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/applying-isa-iec-62443-standards-with-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/arc-advisory-group-nozomi-networks-new-sensor-embedded-in-plcs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/arc-embedded-for-schneider-electric-rtu</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/asegurando-una-red-global-de-generacion-de-energia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/assessing-the-threat-landscape-for-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/asset-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/bas-infographic</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/best-practices-to-deploy-zero-trust-with-ai-driven-threat-detection-for-it-ot-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/binding-operational-directive-23-01-improving-asset-visibility-and-vulnerability-detection-on-federal-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/biruguan-li-sisutemuxiang-ke-saibasekiyuriteisoriyusiyon</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-a-cyber-fortress</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-a-resilient-corporate-control-environment-lessons-from-nozomis-grc-strategy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-and-managing-a-complete-asset-inventory-in-healthcare-facilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-cyber-resilience-in-the-water-sector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-cyber-resilient-ot-systems-iec-62443-in-practice</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-cyber-resilient-ot-systems-nis2-in-practice</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/building-cybersecurity-resilience-in-industrial-environments-the-isa-62443-approach</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/buyers-guide-to-data-center-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/buyers-guide-to-ot-asset-management-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/can-industrial-iot-devices-cause-downtime</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/can-zero-trust-shine-a-light</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/central-management-console</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/central-management-console-specifications-sheet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/check-point</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ciberseguridad-en-entornos-ot-caso-de-estudio-en-el-sector-oil-gas</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ciberseguridad-industrial-generando-una-estrategia-integral-para-enfrentar-los-riesgos-de-ciberseguridad-en-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ciberseguridad-para-ciudades-inteligentes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ciberseguridad-resuelta-para-los-sistemas-de-gestion-de-edificios</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/closing-iot-security-gaps-in-your-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/closing-the-visibility-gap-in-ot-networks-with-nozomi-networks-garland-technology</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/codename-i11usion-eleven-practical-ways-to-pwn-browser-based-hmis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/coesangwi-5gaeyi-geulrobeol-gonghang-yi-gasiseong-mic-boan-hyangsang</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/como-cerrar-las-brechas-de-seguridad-de-iot-en-sus-operaciones</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/como-integrar-la-to-en-los-centros-de-operaciones-de-seguridad-de-ti-y-to</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/compania-de-gas-y-petroleo-implementa-un-programa-global-de-seguridad-ics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/compliance-assessment-of-vantage-iqs-clustering-functionality-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/comprehensive-threat-intelligence-powered-by-mandiant-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/conheca-o-guardian-air-o-primeiro-sensor-de-seguranca-para-redes-wireless-ot-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/converged-network-tcp-ip-serial-and-analog-security-monitoring-for-industrial-control-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cout-des-incidents-de-cybersecurite-ot-et-comment-reduire-les-risques</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cual-es-el-coste-de-los-incidentes-de-ciberseguridad-de-to-y-como-reducir-los-riesgos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cyber-crime-migration-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurite-maritime</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurite-pour-les-villes-intelligentes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-common-practices-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-for-data-centers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-for-rail-transportation-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-for-smart-cities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-in-ot-environments-oil-gas-sector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-is-increasingly-important-to-retail-strategy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/cybersecurity-strategies-for-smart-buildings-and-commercial-real-estate</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/dagli-insight-allimpatto-anticipare-e-contrastare-le-minacce-ot-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/data-centers-are-migrating-to-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/de-la-vision-a-limpact-proteger-lot-iot-contre-les-menaces-en-france</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/de-risk-it-ot-convergence-with-vulnerability-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/decode-saudi-nca-otcc-with-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/deep-dive-with-the-ics-advisory-project</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/defending-smart-cities-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/demystifying-the-colonial-pipeline-attack-how-ransomware-works</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/der-druck-fur-konformitat-im-bereich-cybersicherheit-in-deutschland</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/dersec-nozomi-networks-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/designated-engineer-service</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/detecting-insider-threats-in-ot-ics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/detecting-insider-threats-the-undiscussed-under-reported-ot-ics-cybersecurity-challenge</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/dewa-relies-on-nozomi-networks-to-ensure-world-class-delivery-of-electricity-and-water-utility-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/dissecting-and-exploiting-mongooses-built-in-tls-library</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/drilling-into-the-importance-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/driving-ndaa-section-1505-compliance-for-dod-with-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/edgard-capdevielle-from-startup-to-industry-leader</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/edgard-capdevielle-on-cyber-defense-tv</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/effective-ot-defense-in-depth-and-monitoring-strategies-for-manufacturing-facilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/elite-cyber-defenders</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/enabling-fceb-agencies-to-enact-bod-23-01</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/endpoint-security-for-ot-iot-protect-what-it-agents-cant</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/enel-an-energy-producer-and-distributor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/enel-secures-global-power-generation-network</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/enhancing-cyber-and-operational-resilience-in-pharmaceutical-and-manufacturing-facilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/enhancing-hacker-detection-for-nerc-cip-compliance-while-achieving-ferc-insm-nopr-objectives</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/esp-now-protocol-analysis-and-vulnerability-research</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/european-heating-supply-company-monitors-over-200-sites-with-a-single-device</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fabrication-amelioration-de-la-resilience-operationnelle</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fast-track-service-packages</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fiche-produit-identifier-traiter-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/filling-in-the-ot-security-blanks-with-endpoint-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fireside-chat-accelerating-digital-transformation-drives-innovation-in-industrial-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/flight-to-resilience-addressing-cyber-threats-in-todays-connected-airports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/flughafen-schritthalten-mit-den-herausforderungen-der-cybersicherheit</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fortify-your-process-automation-defenses-with-nozomi-networks-abb</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fortinet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/from-insight-to-impact-staying-resilient-against-germanys-ot-iot-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/from-insight-to-impact-staying-resilient-against-uks-ot-iot-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/from-sawblade-to-shotgun-when-a-plc-goes-mad-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/full-spectrum-visibility-and-threat-detection-for-iot-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/fully-customizable-asset-risk-scoring-in-vantage-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/gartner-critical-capabilities-for-cps-protection-platforms-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/geonmul-gwanri-siseutemyi-saibeo-boan-haegyeol</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/gestion-des-risques-de-cybersecurite-pour-les-environnements-industriels-iot-complexes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/global-customer-support</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/global-pharma-expands-ot-visibility-and-strengthens-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/globaler-top-5-flughafen-verbessert-sichtbarkeit-und-sicherheit</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/globales-ics-security-programm-eines-ol-und-gasproduzenten</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/glupteba-a-guided-tour</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/gonghang-saibeo-boan-gwajee-bal-majcugi</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/greyenergy-dissecting-the-malware-from-maldoc-to-backdoor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guardian-air-product-overview</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guardian-air-technical-specifications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guardian-product-overview</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guia-pratico-regulamentacao-ons</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guide-dachat-de-solutions-de-cybersecurite-pour-technologies-industrielles</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guide-dachat-de-solutions-dinventaire-des-ressources-industrielles-et-des-objets-connectes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guide-de-conformite-a-la-directive-nis2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/guide-to-nist-800-82-for-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/gurobarufa-dian-netuto-wakunobao-hu</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-can-critical-infrastructure-organizations-close-the-cyber-security-gap-in-the-most-pragmatic-and-cost-efficient-way</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-security-teams-use-the-mitre-attack-framework-for-ics</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-the-nozomi-networks-platform-supports-cmmc-2-0-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-the-nozomi-networks-platform-supports-the-u-s-dow-zero-trust-for-ot-activities-and-outcomes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-the-nozomi-networks-solution-supports-nist-csf-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-to-build-an-effective-ot-iot-cybersecurity-risk-compliance-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/how-to-get-deeper-insights-into-your-ot-environment-with-vantage-iq-assistant</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ibm</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/iiot-world-manufacturing-day-cyber-and-operational-resilience-for-smart-factories</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/impact-of-nis2-directive-research-report</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-cybersecurity-for-rail-transportation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-cybersecurity-for-smart-hospitals-and-healthcare</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-cybersecurity-for-the-maritime-sector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-ics-cyber-security-for-substations-and-power-grids</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-iomt-cybersecurity-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-security-maturity-with-the-tsa-security-directives</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/improving-visibility-for-midstream-oil-and-gas-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/in-the-world-of-unsecure-iot-is-privacy-dead-webinar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/incorporating-ot-data-into-your-security-operations-center-soc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/industroyer-vs-industroyer2-evolution-of-the-iec-104-component</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/industroyer2-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/insights-on-the-top-ot-iot-security-threats-how-to-protect-your-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/insm-for-municipal-electric-utilities-what-it-is-and-why-you-need-it</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/integrating-ot-into-it-ot-socs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/integration-des-systemes-industriels-dans-les-soc-informatiques-industriels</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/interview-andrea-carcano-on-ticker-news</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/investigating-the-ransomware-and-iot-vulnerabilities-landscape</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/iot-botnet-threat-what-it-is-and-how-to-deal-with-it</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/iot-ot-cybersecurity-research-report-august-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/iot-ot-cybersecurity-research-report-february-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/iot-ot-cybersecurity-research-report-july-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/isa-iec-62443-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/its-all-about-the-analytics-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/jp-guardian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/keysight-turns-to-nozomi-networks-to-strengthen-its-production-line-defenses</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/kong-gang-saibasekiyuriteinoke-ti-ni-chi-rewotoranai</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/konkuk-university-hospital-strengthens-their-security-and-collaboration</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/kos-kejadian-keselamatan-siber-ot-dan-cara-mengurangkan-risiko</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/labs-webinars-nozomi-networks-labs-1st-half-2022-ot-iot-security-review</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/leading-medical-technology-provider-gains-deep-visibility-into-its-manufacturing-processes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/lun-des-cinq-principaux-aeroports-au-monde-ameliore-la-visibilite-et-la-securite</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/managing-asset-risk-with-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/managing-digital-supply-chain-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/mandiant-ot-incident-response-services-complement-the-nozomi-networks-security-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/manufacturing-improving-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/maritime-cybersecurity-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/marty-the-ot-guy-3-ot-ics-cybersecurity-predictions-for-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/marty-the-ot-guy-3-ways-you-didnt-know-nozomi-networks-could-diagnose-network-problems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/marty-the-ot-guy-all-you-need-to-know-about-content-packs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/marty-the-ot-guy-unlocking-the-latest-enhancements-in-the-nozomi-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/meet-guardian-air-the-first-wireless-sensor-for-ot-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/meet-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/meet-nozomi-networks-arc-embedded</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/meeting-m-24-04-iot-ot-inventory-and-reporting-requirements</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/mehr-transparenz-und-erhohte-sicherheit-fur-die-operativen-technologien-ot-eines-globalen-pharmakonzerns</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/merapatkan-jurang-keselamatan-iot-dalam-operasi-anda</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/merging-ot-asset-data-to-unite-security-and-operations-teams-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/messa-in-sicurezza-di-una-rete-globale-per-la-produzione-di-energia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/mineria-proteccion-de-la-resiliencia-operativa-a-traves-de-la-visibilidad-y-seguridad-de-to-e-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/mining-securing-operational-resiliency-through-ics-visibility-and-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/mitsubishi-electric-and-nozomi-networks-committed-to-protecting-customer-interests</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/modernizing-asset-inventory-a-smarter-approach-to-securing-industrial-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/monitoring-an-air-gapped-substation-with-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/monitoring-protecting-assets-in-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/moreno-carullo-using-artificial-intelligence-and-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/national-gas-distributor-achieves-pipeline-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/navigating-the-isa-iec-62443-standards-the-road-to-ot-network-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nerc-cip-015-1-in-practice-series</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nerc-cip-compliance-with-nozomi-networks-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nerc-cip-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nis-2-directive-compliance-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nis2-and-its-impact-on-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/no-hat-2023-andrea-palanca-codename-i11usion-eleven-practical-ways-to-pwn-browser-based-hmls-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-demo-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-detecting-malicious-activities-with-sigma-rules</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-embedded-for-mitsubishi-electric-plc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-endpoint-security-for-ot-and-iot-cybersecurity-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-endpoint-sensor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-arc-for-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-april-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-december-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-december-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-january-2024-community-power</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-june-2024-the-rise-of-ot-hacktivism</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-june-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-march-2024-prioritisation-is-key</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-march-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-september-2024-cloud-era</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-september-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-hour-the-latest-ot-iot-security-insights</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-keysight-visibility-to-secure-ics-and-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-academy-course-catalog</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-and-garland-technology-unlock-visibility-and-security-across-ot-iot-and-it-teams</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-and-mandiant-comprehensive-threat-intelligence-for-ot-iot-and-it-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-asset-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-cmmc-2-0-compliance-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-data-privacy-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-deepens-ot-portfolio-in-push-to-secure-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-dispel-joint-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-global-pharmaceutical-customer-and-vc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-google-security-operations-joint-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-guardian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-managed-services-from-intelligent-buildings</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-mandiant-at-black-hat-usa-2023-proactive-approach-to-ir-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-named-a-leader-by-gartner-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-now-covers-purdue-level-0-to-level-3-in-industrial-control-systems-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-platform-demo</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-platform-overview</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-sel-solution-brief-electric-power-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-txone-networks-automated-visibility-detection-and-response-for-ot-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-viakoo-at-black-hat-usa-2023-extending-the-purdue-model-to-iot-ot-remediation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-networks-xona-optimize-zero-trust-user-access-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nozomi-ti-expansion-pack-powered-by-mandiant-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/nyse-tv-interview-with-edgard-capdevielle-at-rsac-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/o-custo-dos-incidentes-de-ciberseguranca-de-ot-e-como-reduzir-o-risco</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/oil-gas-producer-deploys-global-ics-security-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/onepass</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/operation-cyber-crisis-nozomi-networks-war-game</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/operational-technology-and-cyberwar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/operationalizing-threat-intelligence-acrossit-and-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/optimierung-der-cybersecurity-fur-gebaude-management-systeme</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/optimising-ot-security-for-australian-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-automated-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-cyber-security-becomes-regulated-risk-understanding-the-uk-csrb</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-cybersecurity-in-the-era-of-automated-shipping-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-cybersecurity-for-tribal-governments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-cybersecurity-risk-management-ebook</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-cybersecurity-threat-landscape-2h-2024-review</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-cybersecurity-trends-and-insights-2024-1h</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-cybersecurity-trends-insights-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-2020</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-es-2021-2h</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-executive-summary-august-2022</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-executive-summary-august-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-executive-summary-february-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-executive-summary-january-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-february-2021</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-february-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-january-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-july-2021</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-security-report-july-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-iot-threat-intelligence-webinar-middle-east-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-network-security-challenges-in-enterprise-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ot-security-solutions-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/otcc-content-pack</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/otsaibasekiyuritei-insidentonokosutoto-risukudi-jian-nofang-fa</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/otwoit-ot-socni-tong-he-suru</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/our-journey-to-becoming-a-leader-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/p2p-botnets-following-the-network-trail</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/penyepaduan-ot-ke-dalam-soc-it-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/pharmaceutical-safeguarding-manufacturing-through-operational-visibility-and-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/pharmaceutique-protection-de-la-fabrication-grace-a-la-cybersecurite-et-la-visibilite-operationnelle</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/physical-sensors-accessories</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/potenciando-el-acceso-y-seguridad-ot-iot-a-traves-de-una-solucion-integrada</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/prairies-edge-casino-resort-strengthens-cyber-resilience-without-disrupting-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/prevention-des-failles-de-securite-de-liot-dans-votre-exploitation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/product-security-and-information-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/product-update-nozomi-arc-embedded</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/professional-services-health-check</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/professional-services-optimization</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecao-de-uma-rede-global-de-geracao-de-energia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-customer-data-vantage-saas-multi-tenancy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-data-center-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-operational-technology</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-ot-assets-with-nozomi-networks-cisco-ise-integration</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-smart-city-infrastructure-from-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-the-2024-paris-olympics-critical-infrastructure-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-the-2024-paris-olympics-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-the-digital-physical-divide-nozomis-innovative-approach</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protecting-transportation-infrastructure-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protection-from-the-perfect-storm</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/protocol-support-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/rail-networks-cybersecurity-protecting-the-reliability-of-critical-transportation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ransomware-and-beyond-cybersecurity-is-a-team-sport</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/regional-power-operator-improves-ics-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/relatorio-de-seguranca-de-ot-iot-analise-aprofundada-do-cenario-de-ameacas-em-ics-revisao-2h-2022-janeiro-de-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/relatorio-de-seguranca-ot-iot-percepcoes-sobre-guerra-cibernetica-ameacas-e-tendencias-recomendacoes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/remote-collector-specifications-sheet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/research-paper-ot-iot-security-report-2021-2h</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/research-paper-ot-iot-security-report-2022-1h</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/resolvendo-a-questao-da-seguranca-cibernetica-para-sistemas-de-gerenciamento-de-edificios</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/rethinking-cyber-resilience-for-critical-infrastructure-with-nozomi-networks-and-fortinet</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/rockwell-plc-logic-analysis-using-model-checking</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/safeguarding-the-future-of-ot-integrated-detection-and-protection-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/sans-survey-the-state-of-ics-ot-cybersecurity-in-2022-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/sans-survey-the-state-of-ot-ics-cybersecurity-in-2022-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/saudi-arabia-nca-otcc-1-2022-mandate</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/sec-cyber-disclosure-rules-a-roadmap-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/sec-cybersecurity-regulations-implementation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-converged-it-ot-networks-with-profitap-and-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-infrastructure-in-federal-government</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-iot-in-an-ot-world-forrester</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-remote-mining-and-industrial-sites</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-the-infrastructure-that-powers-ai-how-to-build-data-center-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securing-the-unseen-ai-driven-ot-iot-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/securiser-un-reseau-de-production-delectricite-global</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/security-implications-of-the-australian-critical-infrastructure-act</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/see-ot-iot-wireless-activity-with-guardian-air-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/serious-workplace-accidents-and-their-connection-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/seumateu-sitireul-wihan-saibeo-boan</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/shi-jie-totupu-5-nokong-gang-deke-shi-xing-tosekiyuriteiwoxiang-shang</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/smart-cities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/smart-cybersecurity-for-airports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/smart-cybersecurity-for-smart-factories</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/smart-grids-securing-encrypted-communications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/smart-polling</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/solution-pour-la-cybersecurite-des-systemes-de-gestion-des-batiments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/solving-cybersecurity-for-building-management-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/solving-ot-iot-remote-access-and-security-through-integrated-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/specifications-sheet-guardian-sensors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/spoofing-drone-locations-by-manipulating-remote-id-protocols-and-communications</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/sumatositeixiang-keno-saibasekiyuritei</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/technology-alliance-spotlight-nozomi-networks-and-viakoo</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-cost-of-ot-cyber-security-incidents-and-how-to-reduce-risk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-forrester-wave-iot-security-solutions-q3-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-it-pros-guide-to-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-new-national-asset-securing-data-centers-in-the-iot-era</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-next-generation-of-ai-for-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-ot-cybersecurity-experience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-power-of-tech-integration-for-advanced-ot-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-push-for-cybersecurity-compliance-in-germany</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-real-world-threats-to-ot-effective-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-s3curec4m-project-vulnerability-research-in-modern-ip-video-surveillance-technologies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-at-the-ics-cybersecurity-conference</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-converged-industrial-environments-need-combined-ot-iot-and-it-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-ensuring-operational-availability-safety-with-unified-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-evolving-endpoint-security-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-hello-2025-how-ai-zero-trust-proactive-defense-are-shaping-cybersecuritys-future</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-modernizing-cyber-risk-management-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-security-sandbox-protecting-critical-assets-using-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-valencian-health-department</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/the-verkada-iot-security-camera-attack-how-did-hackers-get-in</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/thinking-like-an-adversary</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/threat-actors-never-sleep-and-theyre-creating-nightmares-for-the-security-community</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/threat-intelligence-feed</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/to-visibility-and-beyond-preparing-for-nis2-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/top-10-pitfalls-to-avoid</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/top-3-alert-queries-in-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/top-7-asset-queries-in-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/top-8-network-queries-in-the-nozomi-networks-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/top-five-global-airport-improves-visibility-and-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/transforma-tu-seguridad-ot-iot-con-las-ultimas-innovaciones-de-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/transports-amelioration-de-la-resilience-operationnelle-grace-a-la-securite-et-la-visibilite-ot-et-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/triton-the-first-ics-cyber-attack-on-safety-instrument-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/trust-matters-attacking-smart-device-authenticity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/trustpower-safeguards-new-zealands-power-and-telecoms-network</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/trustpowerha-yun-yong-ekosisutemuquan-ti-wokabasuru-wan-quan-nakontekisutoren-shi-woshi-xian-ke-neng-ni</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uk-ncsc-cyber-assessment-framework-4-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/um-dos-principais-aeroportos-do-mundo-melhora-a-visibilidade-e-a-seguranca</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/un-leader-des-technologies-medicales-beneficie-dune-visibilite-approfondie-sur-ses-processus-de-fabrication</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/un-producteur-de-petrole-et-de-gaz-deploie-un-programme-de-securite-ics-dans-le-monde-entier</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/una-empresa-farmaceutica-global-amplia-su-visibilidad-ot-y-refuerza-la-seguridad</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uncertainty-undone-a-2026-ot-iot-cybersecurity-strategy-for-converged-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uncertainty-undone-an-ot-iot-cybersecurity-strategy-for-converged-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/understanding-the-risks-to-operational-technology-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/une-entreprise-pharmaceutique-mondiale-ameliore-la-visibilite-et-renforce-la-securite-de-ses-environnements-industriels</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uno-de-los-cinco-principales-aeropuertos-a-nivel-global-mejora-la-visibilidad-y-la-seguridad</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uno-de-los-principales-proveedores-de-tecnologia-medica-obtiene-una-visibilidad-exhaustiva-de-los-procesos-de-fabricacion</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/unpacking-the-ot-iot-threat-landscape-with-nozomi-networks-telemetry</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/unparalleled-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/unpredictable-undone-how-to-sharpen-your-risk-management-strategy-for-ot-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/unseen-undone-how-to-finetune-asset-inventory-management-for-ot-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/use-and-development-of-ai-and-ml-technology-in-nozomi-products</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/using-nozomi-asset-intelligence-to-simplify-ot-asset-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/using-vantage-iq-to-manage-your-ot-iot-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/uwb-real-time-locating-systems-how-secure-radio-communications-may-fail-in-practice</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vantage-availability-and-assurance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vantage-iq</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vantage-iq-ai-powered-cybersecurity-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vantage-security-measures</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/vermont-electric</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/viruses-are-disrupting-our-supply-chains-where-do-the-biggest-vulnerabilities-lie</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/watch-securing-the-infrastructure-that-powers-ai-how-to-build-data-center-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/webinar-extending-the-purdue-model-to-iot-ot-vulnerability-remediation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/webinar-improving-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/webinar-solving-cybersecurity-for-building-management-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/what-is-the-nozomi-arc-sensor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/whats-new-in-2024-the-latest-nozomi-networks-platform-enhancements-updates</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/whats-new-in-n2os-v23-marty-the-ot-guy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/whats-so-great-about-dashboards-and-content-packs</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/whats-so-great-about-reports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/whats-so-great-about-the-graph</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/winning-the-ai-powered-cyberwar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/ye-wu-shang-noiotsekiyuritei-giyatupuwojie-xiao-suru</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/resources/zhi-zao-ye-yun-yong-nohui-fu-li-nogai-shan-dian</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/2018-a-defining-year-for-ics-cyber-security-leader-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/abb-joins-forces-with-nozomi-networks-to-strengthen-the-cybersecurity-of-industrial-infrastructure-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/abs-consulting-among-first-certified-as-nozomi-networks-mssp-elite-partner-to-provide-advanced-ot-and-ics-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/abs-consulting-and-nozomi-networks-partner-to-bolster-cybersecurity-for-marine-and-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/atos-and-nozomi-networks-team-to-deliver-cybersecurity-and-data-analytics-to-operational-technology-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/barmak-meftah-joins-nozomi-networks-board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/cade-stephens-of-nozomi-networks-recognized-on-the-prestigious-2025-crn-channel-chiefs-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/chet-namboodri-of-nozomi-networks-recognized-as-2024-crn-channel-chief</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/cisa-selects-nozomi-networks-as-a-founding-partner-in-its-new-ics-joint-cyber-defense-collaborative</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/cmc-signs-an-agreement-with-nozomi-networks-and-introduces-a-technology-in-spain-that-reduces-the-time-to-detect-cyberattacks-from-from-days-to-hours</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/crn-lists-nozomi-networks-in-its-2022-partner-program-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/crn-recognizes-susan-stefan-and-sara-verri-2024-women-of-the-channel</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/crns-2023-women-of-the-channel-honors-nozomi-networks-natacha-ordas-and-annie-zhang</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/customers-give-nozomi-networks-top-score-in-gartner-peer-reviews</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/cybersecurity-leaders-launch-operational-technology-cybersecurity-coalition</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/deepseas-becomes-first-mid-market-mdr-partner-certified-in-nozomi-networks-mssp-elite-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/dispel-and-nozomi-networks-deliver-integrated-zero-trust-security-solutions-for-ot-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/emerson-and-nozomi-networks-establish-agreement-to-secure-critical-industrial-processes-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/emerson-and-nozomi-networks-extend-relationship-to-help-secure-critical-power-and-water-processes-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ethos-open-source-information-sharing-community-opens-general-membership</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/f-35-cyber-center-of-excellence-proposed-for-switzerland</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/forward-investments-backs-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/frost-sullivan-recognizes-nozomi-networks-for-its-global-impact-on-industrial-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/gartner-report-nozomi-networks-recognized-as-the-company-to-beat-for-ai-in-cyber-physical-systems-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/gatewatcher-and-nozomi-networks-team-to-deliver-advanced-ot-and-iot-cybersecurity-solutions-for-global-industry</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ge-and-nozomi-networks-to-enhance-cyber-security-for-energy-and-industrial-operators-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/honeywell-and-nozomi-networks-announce-partnership-to-significantly-strengthen-operational-technology-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ibm-and-nozomi-networks-demonstrate-advances-in-it-ot-cyber-security-at-rsa-conference-2018-apj</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ibm-and-nozomi-networks-demonstrate-the-power-of-integrated-it-ot-and-iot-cybersecurity-at-ics-atlanta</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ibm-security-arms-its-managed-security-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/industrial-cybersecurity-leader-nozomi-networks-raises-15-million</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/industrial-cybersecurity-leader-nozomi-networks-raises-30-million</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/latest-sans-survey-finds-ics-security-risks-reach-time-high</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/leidos-partners-nozomi-networks-passive-monitoring-cyber-threats-industrial-control-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/leonardo-teams-with-nozomi-networks-to-secure-critical-infrastructures-for-its-international-customers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/marene-allison-former-johnson-johnson-vice-president-and-ciso-joins-nozomi-networks-board-of-advisors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/mitsubishi-electric-to-acquire-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nanolock-security-and-nozomi-networks-to-provide-end-to-end-cyber-protection-for-critical-and-industrial-infrastructures</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/new-report-from-nozomi-networks-labs-finds-iot-botnets-and-shifting-ransomware-are-raising-the-stakes-for-enterprises-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-labs-report-reveals-surge-in-ot-iot-security-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-achieves-fips-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-added-to-the-department-of-homeland-security-continuous-diagnostics-and-mitigation-approved-product-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-adds-9-new-partners-as-it-expands-its-mssp-program-to-include-regional-service-providers</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-advanced-cyber-security-now-embedded-in-ruggedcom</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-advens-team-to-deliver-advanced-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-apollo-communications-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-mexico</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-applied-risk-team-to-deliver-advanced-cyber-security-solutions-to-ot-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-bt-team-to-deliver-advanced-ot-and-iot-cybersecurity-to-enterprises-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-cervello-announce-partnership-to-deliver-advanced-cybersecurity-solutions-to-railways-ot-it-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-chinook-systems-team-to-deliver-ot-iot-security-solutions-for-industrial-and-critical-infrastructure-facilities</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-deloitte-partner-to-deliver-it-ot-and-iot-security-services-in-emea</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-dexcent-team-to-deliver-advanced-cyber-security-solutions-to-ot-industrial-iot-environments-across-north-america</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-elevenpaths-partner-to-deliver-advanced-it-and-ot-security-services-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-fortinet-bolster-it-ot-visibility-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-gemina-team-to-deliver-advanced-cybersecurity-services-to-industrial-and-critical-infrastructure-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-help-ag-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-middle-east</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-netpoleon-group-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-south-east-asia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-netwitness-team-to-deliver-advanced-cyber-security-solutions-to-ot-iot-environments-across-critical-infrastructure-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-nvc-partner-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-japan</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-riot-solutions-team-to-deliver-advanced-ics-cyber-security-solutions-to-industrial-environments-across-australia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-schneider-electric-deliver-arc-embedded-in-rtus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-schweitzer-engineering-laboratories-bring-cybersecurity-solutions-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-securelink-germany-partner-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-europe</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-siemens-bring-scalable-cybersecurity-to-industrial-automation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-stormshield-to-deliver-advanced-cyber-security-solutions-to-ot-iot-environments-across-critical-infrastructures</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-tdec-redes-de-computadores-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-brazil</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-tecnogam-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-mexico</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-the-missing-link-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-australia-and-new-zealand</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-ti-safe-team-to-deliver-advanced-ics-cyber-security-solutions-to-industrial-environments-across-brazil-and-portugal</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-tripwire-announce-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-txone-networks-team-to-deliver-advanced-cybersecurity-solutions-for-modern-industrial-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-waterfall-security-solutions-team-to-deliver-joint-solution-for-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-westcon-team-to-deliver-advanced-ics-cybersecurity-solutions-to-industrial-environments-across-latin-america</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-and-yokogawa-partner-to-deliver-it-ot-and-iot-security-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-announces-1-25-million-dollar-us-air-force-contract</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-announces-major-investment-in-singapore</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-announces-strong-growth-and-new-funding</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-answers-call-advanced-ics-threat-detection-ot-integration-latest-release</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-appoints-kevin-isaac-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-authorized-to-be-a-cve-numbering-authority</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-awarded-by-frost-sullivan-for-leading-the-operational-technology-and-iot-cybersecurity-industry-with-superior-and-highly-differentiated-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-brings-industrial-strength-monitoring-and-threat-detection-to-iot-networks-and-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-celebrates-10-years-of-innovation-in-ot-and-iot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-check-point-team-secure-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-collaborates-with-mandiant-to-deliver-a-comprehensive-solution-for-ot-it-and-iot-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-continues-aggressive-expansion-to-meet-demand-for-critical-infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-first-end-end-platform-improved-ics-cybersecurity-operational-reliability</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-first-saas-platform-for-ot-and-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-industrys-first-ai-powered-cybersecurity-analysis-and-response-engine-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-industrys-first-complete-hardware-and-software-as-a-service-solution-for-ot-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-industrys-first-multi-spectrum-wireless-security-sensor-for-global-ot-and-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-new-choices-in-deep-ics-network-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-ot-and-iot-cybersecurity-to-cisco-ise</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-ot-iot-cybersecurity-via-the-schneider-electric-exchange</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-the-industrys-most-advanced-and-proven-cybersecurity-and-operational-visibility-for-industrial-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-delivers-worlds-first-security-sensor-embedded-in-industrial-control-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-earns-leadership-ranking-in-frost-radar-with-2019-record-of-growth-and-innovation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-earns-publishers-choice-for-ot-and-iot-endpoint-security-in-2023-global-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-earns-spot-on-the-crn-2024-internet-of-things-50-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-embeds-cyber-security-into-leading-industrial-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-enters-next-phase-of-growth-as-mitsubishi-electric-completes-acquisition</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-expands-ics-cyber-security-research-with-labs-launch</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-expands-management-team-industry-veterans-accelerate-growth</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-expands-strategic-partnership-with-mandiant-to-deliver-advanced-ot-iot-threat-intelligence-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-extends-its-threat-intelligence-service-to-third-party-security-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-extends-partnership-with-yokogawa</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-featured-on-crns-2022-security-100</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-guardian-air-named-a-2024-fortress-cybersecurity-award-winner</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-guardian-nsg-m-receives-anssi-cspn-certification</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-helps-build-new-isa-global-cybersecurity-alliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-helps-facilitate-security-for-gerdaus-industrial-environment</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-honored-as-cutting-edge-in-the-ics-scada-industry-for-the-6th-annual-2018-cyber-defense-magazine-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-honored-cutting-edge-ics-scada-security-solution-winner-5th-annual-2017-cyber-defense-magazine-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-honored-for-ot-iot-cybersecurity-innovation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-honored-with-prestigious-crn-awards-for-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-hosts-italian-president-sergio-mattarella-at-us-headquarters</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-iec-tc57-wg15-members-meet-switzerland-set-2017-priorities-power-system-cybersecurity-standards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-innovates-to-deliver-the-industrys-first-ot-and-iot-endpoint-security-sensor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-integrates-nvidia-blue-field-dpus-to-advance-ai-powered-security-for-ot-iot-and-cyber-physical-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-integrates-with-servicenow-to-help-automate-optimize-and-secure-manufacturing-operations-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-julie-rosenberg-sara-verri-and-laura-perek-recognized-in-crn-women-of-the-channel-awards-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-julie-rosenberg-sara-verri-and-susan-stefan-recognized-in-crn-women-of-the-channel-awards-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-cyber-risk-to-critical-and-industrial-infrastructure-reaches-all-time-high</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-finds-70-of-ransomware-activity-concentrated-against-english-speaking-countries</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-finds-ruin-vs-ransom-dominates-2022-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-finds-wireless-networks-unprotected-as-threats-to-critical-infrastructure-escalate</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-ransomware-gangs-and-supply-chain-vulnerabilities-highlight-risks-as-law-enforcement-fights-back</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-vulnerability-disclosures-rising-at-an-alarming-rate-ransomware-attacks-costing-critical-and-industrial-infrastructure-millions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-launches-advantage-partner-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-launches-first-saas-platform-for-ot-iot-security-in-uae</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-launches-new-program-to-arm-industry-leading-mssps-to-deliver-advanced-security-services-for-ot-and-iot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-2017-gartner-cool-vendor</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-a-fastest-growing-company-in-north-america-on-the-2025-deloitte-technology-fast-500</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-a-leader-for-2nd-consecutive-year-in-the-2026-gartner-magic-quadrant-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-a-leader-in-forrester-wave-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-a-leader-in-the-2025-gartner-magic-quadrant-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-cybersecurity-excellence-awards-finalist</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-recognized-in-the-2026-gartner-r-critical-capabilities-report-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-to-fast-companys-worlds-most-innovative-companies-2025-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-named-winner-global-infosec-awards-rsac-conference-2026</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-names-jared-waterman-as-chief-financial-officer</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-names-michael-plante-chief-marketing-officer</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-newsweek-vantage-survey-finds-executives-believe-employees-are-the-greatest-threat-to-critical-infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-opens-nordic-office-in-denmark</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-ot-and-iot-security-solutions-now-available-in-the-microsoft-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-partners-with-exclusive-networks-usa</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-partners-with-the-worlds-top-cyber-incident-responders-to-provide-industry-leading-tools-and-services-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-pioneers-saas-security-and-visibility-solution-for-dynamic-iot-and-ot-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-raises-the-bar-on-delivering-prioritized-actionable-intelligence-for-ot-iot-networks-to-accelerate-responses-to-security-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-ranked-number-79th-fastest-growing-company-in-north-america-on-the-2021-deloitte-technology-fast-500</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-receives-2021-iot-excellence-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-receives-2023-iot-excellence-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-receives-2024-iot-excellence-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-receives-2025-iot-excellence-award-from-iot-evolution-world</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-recognized-as-a-2025-gartner-peer-insights-customers-choice-for-cps-protection-platforms</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-recognized-for-cloud-security-innovation-in-2022-cybersecurity-breakthrough-awards-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-recognized-on-crn-2018-emerging-vendors-list</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-releases-new-content-pack-for-isa-iec-62443-compliance-reporting-and-security-checks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-researchers-warn-we-havent-seen-the-last-of-triton-like-attacks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-sara-verri-finalist-for-crn-2024-women-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-scadagaurdian-wins-best-bench-tested-product-in-network-computing-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-secures-100-million-investment-from-global-ecosystem-of-customers-and-technology-partners</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-secures-100-million-investment-to-accelerate-critical-infrastructure-defense</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-secures-7-5-million-in-series-a-funding-to-protect-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-selected-fireeye-ics-protocol-depth-technical-excellence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-speeds-industrial-cyber-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-sponsored-sans-survey-finds-cyber-threats-to-ot-environments-continue-to-rise-severity-reaches-all-time-high</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-sponsored-sans-survey-finds-industrial-organizations-are-going-all-in-to-tackle-growing-threats-to-ot-ics-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-sponsored-sans-survey-finds-security-defenses-are-getting-stronger-as-cyber-threats-to-ot-environments-remain-high</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-strengthens-global-partner-ecosystem-with-executive-appointments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-tackles-triton-and-the-rise-of-critical-infrastructure-cyber-threats-at-black-hat-2018</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-takes-home-repeat-win-at-coveted-global-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-teams-up-with-cyber-partners-to-deliver-advanced-mssp-services-to-critical-industrial-networks-in-australia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-tops-100-revenue-growth</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-unleashes-vantage-iq-the-worlds-first-private-ot-iot-cybersecurity-assistant</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-unveils-community-edition-of-its-cyber-security-platform</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-welcomes-schneider-electric-to-its-mssp-elite-partner-program-to-deliver-advanced-managed-security-services-worldwide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-2017-red-herring-top-100-north-america-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-20th-annual-globee-award-for-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-bloomberg-new-energy-pioneer-award</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-coveted-global-infosec-awards-during-rsac-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-first-ever-global-infosec-award-for-next-gen-cloud-based-ot-and-iot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-global-infosec-awards-rsa-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-wins-two-cyber-defense-magazine-infosec-awards-at-rsa-conference-2019</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-works-with-aws-to-deliver-advanced-ot-and-iot-cybersecurity-and-analytics-on-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/nozomi-networks-works-with-ibm-to-secure-industrial-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/ot-cybersecurity-leaders-to-deliver-first-open-source-information-sharing-for-collective-early-warning-in-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/pervasive-ot-iot-network-anomalies-raise-red-flags-as-threats-to-critical-infrastructure-become-more-sophisticated</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/raj-atluru-joins-nozomi-networks-board</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/rich-armour-former-general-motors-ciso-joins-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/schneider-electric-partners-with-nozomi-networks-to-secure-and-protect-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/stc-and-nozomi-networks-team-to-deliver-advanced-cyber-security-solutions-to-ot-iot-environments-across-kingdom-of-saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/stratejm-launches-first-mssp-offering-in-canada-featuring-nozomi-networks-vantage-cloud-platform-for-unified-security-monitoring-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/suzanne-spaulding-former-dhs-under-secretary-joins-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/swimlane-and-nozomi-networks-automate-security-orchestration-threat-detection-and-response-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/tech-stations-company-partners-with-nozomi-networks-in-saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/telefonica-invests-in-nozomi-networks-a-leading-company-in-ot-and-iot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/telefonica-tech-launches-a-security-monitoring-service-for-companies-in-industrial-and-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/tempered-combines-strengths-with-nozomi-networks-to-deliver-industry-leading-iot-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/trustpower-gains-deep-network-visibility-with-nozomi-networks-as-emphasis-on-nz-cybersecurity-grows</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/tuv-rheinland-and-nozomi-networks-team-to-deliver-advanced-industrial-control-systems-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/uae-cybersecurity-council-and-nozomi-networks-forge-alliance-to-advance-national-cyber-capabilities-and-national-resilience</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/vantage-for-government-achieves-in-process-designation-for-fedramp-moderate-authorization</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/vantage-iq-named-plant-engineering-product-of-the-year-gold-award-winner</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/vermont-electric-cooperative-among-elite-group-of-utilities-recognized-for-cybersecurity-innovation-and-excellence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/press-release/xona-and-nozomi-networks-partner-merging-cybersecurity-and-secure-access-management-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/airports-keeping-pace-with-cybersecurity-challenges</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/buyers-guide-ot-asset-management-solutions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/buyers-guide-to-data-center-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/cmmc-compliance-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/customer-advisory-board-thank-you</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/customer-satisfaction-survey</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/demo-thank-you</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/driving-cyber-resilience-the-impact-of-the-nis2-directive</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/gestion-des-risques-de-cybersecurite-pour-les-environnements-industriels-iot-complexes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/guardian-air-webinar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/guide-dachat-de-solutions-de-cybersecurite-pour-technologies-industrielles</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/guide-dachat-de-solutions-dinventaire-des-ressources-industrielles-et-des-objets-connectes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/guide-de-conformite-a-la-directive-nis2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/improving-ot-and-iot-security-for-substations-and-power-grids</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/improving-ot-security-visibility-for-midstream-oil-gas-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/incorporating-ot-data-into-your-soc</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/iot-ot-cybersecurity-research-report-august-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/isa-iec-62443-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/it-pros-guide-to-ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/mwise-2023-exclusive-dive-into-new-sec-cyber-rules</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/nis2-directive-compliance-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/nist-csf-compliance-mapping-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/ot-iot-cybersecurity-risk-management-ebook</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/ot-iot-security-report-february-2024</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/ot-iot-security-report-january-2023</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/ot-security-solutions-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/rail-networks-cybersecurity-protecting-the-reliability-of-critical-transportation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/regional-customer-advisory-board-thank-you</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/sans-state-of-ot-ics-cybersecurity-survey-2022</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/solving-cybersecurity-for-building-management-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/thank-you-ebook-cybersecurity-rail-transportation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/thank-you/thank-you-nerc-cip-compliance-with-nozomi-networks-solution</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/anti-bribery-anti-corruption-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/certifications-iso27001-2022</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/certifications-soc2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/code-of-ethics-and-business-conduct</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/confidentiality-of-information-sharing-of-information-data-under-the-tlp-protocol</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/ctpat</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/customer-support-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/data-requests</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/dpa</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/end-of-life-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/equity-diversity-and-inclusion-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/eula</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/global-trade-compliance</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/hardware-as-a-service-haas-program-guidelines</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/job-applicant-privacy-notice</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/nozomi-networks-sub-processors</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/prof-services-training-agreement</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/rma-procedures-and-policies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/sustainability-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/type-2-soc-3</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/vantage-for-government-addendum-to-nozomi-networks-products-end-user-license-agreement</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/legal/vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26726</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26727</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26728</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26729</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26730</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26731</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26732</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-26733</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-4228</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-44467</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-44769</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-44776</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-45925</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2021-46279</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-2538</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-29156</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31190</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31191</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45592</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45593</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45594</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45595</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45596</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45597</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45598</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45599</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45600</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-51452</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-51453</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-51454</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-51455</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-51456</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5456</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-5457</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-6948</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-6949</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-6950</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-6951</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-10918</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12011</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12012</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12013</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23915</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23916</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3082</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3083</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31164</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31165</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31166</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31167</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31168</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31169</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31170</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31171</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31172</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31173</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31174</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31175</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31176</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31177</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31178</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31179</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31180</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31181</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31182</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31183</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31184</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31185</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31186</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31187</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31188</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31189</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31190</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31191</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31192</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31193</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31194</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31195</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31196</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31197</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31198</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31199</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31200</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31201</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31202</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31203</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3184</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3186</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3187</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-41975</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42383</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42384</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42385</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42386</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42387</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42388</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42389</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42390</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42391</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-42392</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50358</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50359</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50360</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50361</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50362</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50363</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50364</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50365</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50366</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50367</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50368</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50369</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50370</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50371</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50372</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50373</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50374</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50375</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50376</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50377</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0695</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0696</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1100</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1101</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1102</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11243</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11677</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11678</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11679</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11680</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-12056</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1399</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1400</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26339</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26340</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26341</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26342</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26343</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26344</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26345</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26346</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26347</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26348</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26349</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26350</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26351</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26352</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26353</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26354</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26355</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26356</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26357</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26358</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26359</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26360</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26361</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26362</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26363</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26364</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26365</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26366</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26367</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26368</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26369</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26370</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26371</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26372</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26373</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26374</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26375</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26376</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26377</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26378</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27253</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27254</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27255</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27256</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27257</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32396</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32397</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32398</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32399</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32400</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32401</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32402</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32403</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32404</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32405</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-2333</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26093</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26094</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26095</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26096</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26097</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26098</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26099</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26100</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26101</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26102</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-3588</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/calgary-alberta</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/copenhagen</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/dubai-uae</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/london-uk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/mendrisio-switzerland</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/milan-italy</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/munich-germany</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/san-francisco-ca</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/seoul-south-korea</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/singapore</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/locations/sydney-australia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/dallas-user-group-keysight</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/houston-user-group-keysight</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/know-the-platform-win-the-deal-a-deep-dive-for-nozomi-partners-enablement-series-episode-1</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/navigating-the-isa-iec-62443-standards-the-road-to-ot-network-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/nozomi-networks-mandiant-ti</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/on-demand-webinar-unpacking-the-ot-iot-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-25-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-25-3</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-25-4</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-25-5</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-25-6</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-note-highlights-n2os-24-6-25-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-notes-highlights-26-1</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-notes-highlights-26-2</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/release-notes-highlights26-0</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/securing-the-always-on-simplifying-ot-in-one-of-the-worlds-busiest-airports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/securing-the-unseen-ai-driven-ot-iot-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/the-journey-to-nozomi-vantage</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/threat-briefing-nozomi-networks-google-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/info/understanding-threat-detection-and-hunting-in-ot-compliance-trends-and-challenges-in-2025</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/how-are-ot-and-it-cybersecurity-different</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/how-do-you-assess-calculate-and-prioritize-cyber-risk-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/how-is-ai-used-in-ot-ics-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/it-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/ot-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/what-are-the-fundamentals-of-ot-ics-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/what-is-a-cyber-physical-system-cps</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/whats-the-difference-between-threat-detection-and-anomaly-detection-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/who-is-responsible-for-ot-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/why-do-industrial-environments-rely-on-passive-vs-active-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/cybersecurity-faqs/why-dont-it-endpoint-security-agents-work-in-ot</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/abm/abm-novonordisk-nozomi-networks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/abm/uki-abm-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/allied-telesis</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/apache</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/aws</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/axonius</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/balbix</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/barracuda</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/brinqa</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/checkpoint</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/cisco-ise</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/cisco-meraki</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/colortokens</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/cybeats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/cyberark-central-policy-manager</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/cyberark-privileged-session-manager</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/deepinspect</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/denexus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/der-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/dispel</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/dull</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/elastic-agent</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/elisity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/exabeam-fusion-siem</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/exabeam-fusion-xdr</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/fortinet-fortianalyzer</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/fortinet-fortigate</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/fortinet-fortinac</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/fortinet-fortisiem</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/fortinet-fortisoar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/garland</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/gatewatcher</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/google-cloud-secops-siem</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/google-cloud-secops-soar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/hewlett-packard-enterprise</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/ibm</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/infoblox</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/ivanti</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/keysight</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/microsoft-endpoint-configuration-manager</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/netwitness</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/nucleus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/nunsys</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/opentext</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/opscura</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/palo-alto-networks-cortex-xsoar</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/palo-alto-networks-next-gen-firewall</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/phosphorus</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/redseal</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/reliaquest</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/secureworks</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/securitygate</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/sekoia</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/servicenow-service-graph-connector</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/servicenow-vulnerability-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/siemens-ruggedcom-crossbow</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/siemens-siberprotect</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/skybox</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/splunk</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/stormshield-sns</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/swimlane</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/tanium</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/tdi-technologies</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/telefonica-tech</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/tenable</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/threatquotient</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/trellix</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/trellix-ndr</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/txone-edgeone</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/txone-ot-defense-console</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/viakoo</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/vmware</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/wallix</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integrations/xona</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/asset-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/endpoint-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/identity-access-control</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/intrusion-detection-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/intrusion-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/managed-detection-response</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/network-security-segmentation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/risk-quantification-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/security-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/integration-categories/vulnerability-management-remediation</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/dewa-relies-on-nozomi-networks-to-ensure-world-class-delivery-of-electricity-and-water-utility-services</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/enel-secures-their-global-power-generation-network</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/european-heating-supply-company-monitors-over-200-sites-with-a-single-device</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/global-medical-technology-provider-gains-deep-visibility-into-its-manufacturing-processes</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/global-pharma-expands-ot-visibility-and-strengthens-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/keysight-strengthens-their-production-line-defenses</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/konkuk-university-hospital-strengthens-their-security-and-collaboration</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/national-gas-distributor-achieves-pipeline-visibility</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/oil-gas-producer-deploys-global-ics-security-program</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/prairies-edge-casino-resort-strengthens-cyber-resilience-without-disrupting-operations</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/protecting-the-2024-paris-olympics-critical-infrastructure-from-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/the-valencian-health-department-improves-security-and-protection</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/top-five-global-airport-improves-visibility-and-security</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/trustpower-safeguards-new-zealands-power-and-telecoms-network</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/case-studies/vermont-electric-improves-ics-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/watch/securing-the-unseen-ai-driven-ot-iot-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/vertical/airports</loc>
    </url>
    <url>
        <loc>https://www.nozominetworks.com/clp/manufacturing</loc>
    </url>
</urlset>