<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.dotcomsecurity.co.za/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/put-an-end-to-cyberattacks-on-endpoint-assets/</loc>
		<lastmod>2025-10-23T08:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/08/blog_page_header.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/08/blog_page_header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/dotcom-security-seals-cybersecurity-partnership-with-huawei/</loc>
		<lastmod>2025-10-23T08:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/07/cyber_futuristic_blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/07/cyber_futuristic_blog_image-v2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/07/cyber_futuristic_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/dont-have-your-head-in-the-clouds-with-data-storage-security/</loc>
		<lastmod>2025-10-23T08:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/06/head_cloud_blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/06/head_cloud_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/empowering-secure-cloud-transformation-in-south-africa-dotcom-cybersecurity-announces-restack-partnership/</loc>
		<lastmod>2025-10-23T08:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/05/futuristic-cityscape-featuring-glowing-cloud-symbolizing-digital-technology-connectivity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/05/462f65b9-98d7-4153-9812-1c9d02059c6e.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/05/futuristic-cityscape-featuring-glowing-cloud-symbolizing-digital-technology-connectivity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/south-africa-ranks-as-no-1-target-for-cyberattacks-in-africa/</loc>
		<lastmod>2025-10-23T08:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/04/2html-css-collage-concept-with-person.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/04/dotcom-blog-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/04/2html-css-collage-concept-with-person.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/is-your-financial-institution-compliant-with-sas-new-cybersecurity-law/</loc>
		<lastmod>2025-11-20T09:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/09/woman-looking-computer-screen-with-words-graph-it.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/09/woman-looking-computer-screen-with-words-graph-it.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/dotcoms-playbook-for-swift-smart-incident-response/</loc>
		<lastmod>2026-01-29T12:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/11/blog_image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/11/blog_image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/inside-the-defenders-playbook-why-your-soc-is-the-real-mvp/</loc>
		<lastmod>2026-01-29T12:03:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/10/Blog-articles-%E2%80%93-4A.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/10/Blog-articles-image-%E2%80%93-4A.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/10/Blog-articles-%E2%80%93-4A.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/machine-learning-and-ai-in-security-solutions-balancing-innovation-and-control/</loc>
		<lastmod>2026-02-24T11:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2026/02/AI_blog02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2026/02/AI_blog02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/practical-strategies-to-protect-your-organisation/</loc>
		<lastmod>2026-02-24T11:08:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2026/01/blog_image2A.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2026/01/blog_image2A.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dotcomsecurity.co.za/blog/dont-let-third-party-risk-become-your-next-cybersecurity-breach/</loc>
		<lastmod>2026-02-24T11:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/12/supplier_risk.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dotcomsecurity.co.za/wp-content/uploads/2025/12/supplier_risk.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->