<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//athenasecuritygroup.ai/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://athenasecuritygroup.ai/the-faculties-of-defense/</loc>
		<lastmod>2026-03-28T15:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/03/Screenshot-2026-03-05-at-9.37.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-crucible-of-intelligence-benchmarking-llms-on-the-trailing-edge-of-cyber-warfare/</loc>
		<lastmod>2026-03-28T15:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-convergence-of-sight/</loc>
		<lastmod>2026-03-28T15:13:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-open-field-why-open-systems-architecture-determines-mttr-in-the-age-of-ai/</loc>
		<lastmod>2026-03-28T15:13:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/moving-at-the-speed-of-ai-the-art-of-awareness-in-an-age-of-intelligent-adversaries/</loc>
		<lastmod>2026-03-28T15:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-hidden-hands-of-intelligence-on-the-human-spirit-behind-the-machine-mind/</loc>
		<lastmod>2026-03-28T15:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-open-gate-and-the-hidden-army-on-the-strategic-power-of-open-source-in-cyber-defense/</loc>
		<lastmod>2026-03-28T15:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-mirror-and-the-machine/</loc>
		<lastmod>2026-03-28T15:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/ai-guardrails-navigating-the-standards-and-practical-landscape/</loc>
		<lastmod>2026-03-28T15:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/order-from-chaos-benchmarking-llms-for-threat-intelligence/</loc>
		<lastmod>2026-03-28T15:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/building-cyber-resilience-through-soc-2-and-iso-27001/</loc>
		<lastmod>2026-03-28T15:13:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/cyber-defense-101/</loc>
		<lastmod>2026-03-28T15:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/when-the-machines-start-talking-to-each-other-look-out-below/</loc>
		<lastmod>2026-03-28T15:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-beginning/</loc>
		<lastmod>2026-03-28T15:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/athena-security-group-releases-athena-core-2-1-and-pallas-2-0/</loc>
		<lastmod>2026-03-28T15:14:30+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/03/Screenshot-2026-03-05-at-9.37.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/athena-core-2-0-release/</loc>
		<lastmod>2026-03-28T15:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/peter-worth-featured-on-ciso-series-podcast/</loc>
		<lastmod>2026-03-28T15:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/03/Screenshot-2026-03-05-at-9.37.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/wazuh-and-athena-security-group-announce-partnership-to-enhance-cyber-defense-capabilities/</loc>
		<lastmod>2026-03-28T15:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2025/10/Wazuh-and-Athena-Security-Group-InternalImage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-last-mile-of-defense/</loc>
		<lastmod>2026-03-28T15:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/03/Screenshot-2026-03-05-at-9.37.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://athenasecuritygroup.ai/the-mythos-threshold-when-ai-becomes-a-cyber-sovereign/</loc>
		<lastmod>2026-04-14T00:12:02+00:00</lastmod>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.35.49-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.34.29-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.35.49-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.37.43-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.38.24-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.40.45-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.41.38-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://athenasecuritygroup.ai/wp-content/uploads/2026/04/Screenshot-2026-04-13-at-6.42.42-PM.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->