<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.prophetsecurity.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/about-us</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/thank-you</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/use-cases/cloud</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/integrations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/ai-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/use-cases/endpoint</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/use-cases/phishing</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/use-cases/identity</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/ai-soc-analyst</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/rsa-2025</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/request-a-demo</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/resources</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/customers</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/platform</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/ai-soc-adoption-trends</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/partner</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/prophet-security-faq</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/why-prophet-security</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/free-trial</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/rsa-2026</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/use-cases/data-loss-prevention-dlp</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/health-isac-spring-america-summit-2026</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/gartner-security-risk-management-summit-2026</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/11-questions-you-must-ask-when-evaluating-ai-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/5-ai-soc-best-practices</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/5-things-to-measure-in-an-ai-driven-soc-that-didnt-exist-before</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/6-essential-security-operations-use-cases-for-llms</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/6-key-takeaways-from-the-ai-in-soc-survey-report</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/9-advantages-of-ai-soc-analysts-that-arent-just-hype</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/99-false-positives-and-1-stolen-session-why-socs-need-investigation-depth-not-more-detection</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/agentic-ai-vs-security-copilot-which-approach-powers-your-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-as-a-force-multiplier-for-detection-engineering-and-incident-triage</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-driven-alert-investigation-fueling-soc-efficiency</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-in-security-operations-how-to-get-your-soc-team-ready</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-soc-agents-in-gartner-hype-cycle-for-security-operations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-soc-analyst-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-soc-architecture-integrating-with-siem-soar-case-management-and-more</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-soc-investment-amex-ventures-and-citi-ventures</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/ai-soc-key-to-solving-persistent-soc-challenges</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/alert-triage</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/announcing-prophet-security</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/automated-incident-response-streamlining-your-secops</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/automated-remediation-what-to-automate-what-to-keep-human</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/beyond-alert-tuning-how-ai-and-context-unlocks-scale</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/beyond-the-data-moat-how-ai-soc-startups-can-win-the-cybersecurity-war</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/can-ai-soc-analysts-replace-siems-looking-ahead</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/considering-ai-soc-agents-read-this-gartner-report-first</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/demystifying-soc-automation</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/detection-engineering-in-an-ai-driven-soc-what-actually-needs-to-change</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/dispelling-the-hype-what-an-ai-soc-analyst-can-cant-do</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/email-phishing-investigation-101-best-practices</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/facebook-phishing-email-how-attackers-weaponize-meta-business-manager</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/from-mdr-to-ai-soc-what-the-transition-actually-looks-like</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-ai-agents-are-transforming-incident-response-in-modern-socs</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-ai-soc-enhances-detection-engineering</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-ai-transforms-tier-1-tier-2-and-tier-3-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-build-a-business-case-for-ai-in-the-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-build-an-agile-soc-with-ai-soc-agents</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-build-trust-in-an-ai-soc-a-practical-framework</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-evaluate-ai-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-get-into-cybersecurity-ai-era</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-investigate-an-okta-security-alert</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-investigate-edr-alerts-triage-and-response</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-keep-up-with-talent-attrition-in-a-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-measure-mttr-in-ai-driven-socs</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-reduce-alert-fatigue-in-cybersecurity-best-practices</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-run-a-pov-for-ai-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/how-to-use-llms-like-chatgpt-4-to-investigate-aws-guardduty-alerts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/hype-check-the-state-of-ai-in-the-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/investigating-business-email-compromise-bec-a-practical-approach</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/investigating-geo-impossible-travel-alerts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/key-soc-tools-every-security-operations-center-needs</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/mdr-vs-agentic-ai-soc-analyst-complementary-or-replacement</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/mdrs-and-mssps-vs-prophet-security</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/mttr-reduction-guide-practical-steps-to-sub-2-minute-investigations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/proactive-threat-hunting-why-programs-stall-and-what-directed-hunting-changes</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/prophet-ai-in-action-unmasking-zombie-credentials-in-subsidiary-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/prophet-ai-now-integrates-with-google-security-operations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/prophet-security-named-to-2025-redpoint-infrared-100-list</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/prophet-security-raises-30-million-series-a-led-by-accel</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/redefining-mean-time-to-detect-mttd-in-ai-driven-socs</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/removing-alert-wait-time-in-the-soc-bypassing-the-human-queue</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/rethinking-soc-capacity-how-ai-changes-the-human-cost-curve</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/security-operations-center-soc-best-practices-alert-tuning</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/siem-vs-ai-soc-solving-the-alert-triage-bottleneck</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soar-alternative-why-ai-soc-analysts-are-replacing-static-playbooks</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soar-playbook-maintenance-problem</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soc-analyst-career-advancement-with-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soc-capacity-modeling-how-many-alerts-can-your-team-really-handle</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soc-metrics-that-matter-mttr-mtti-false-negatives-and-more</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/soc-tiers-are-out-how-ai-is-flattening-soc-tier-1-2-3</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/supply-chain-alert-malicious-axios-versions-published-to-npm</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-human-ai-soc-a-practical-guide-to-hybrid-workflows</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-impact-of-ai-soc-agents-on-the-soc-manager</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-night-shift-dilemma-how-ai-soc-agents-end-the-graveyard-shift</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-roi-of-ai-in-the-soc-cost-efficiency-and-analyst-retention</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-siren-song-of-diy-ai-soc-a-warning-from-history</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-soc-hierarchy-of-needs-a-maturity-model-for-modern-operations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/the-truth-about-ai-cyber-attacks-velocity-not-novelty</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/threat-hunting-with-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/to-build-or-not-to-build-a-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-3-scenarios-for-auto-remediation</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-5-ai-soc-analyst-platforms</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-6-soar-platforms-of-2026</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-mdr-providers-of-2026-what-to-evaluate-and-where-the-category-falls-short</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-soc-as-a-service-providers</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/top-soc-challenges-facing-secops-analysts-and-managers</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-are-ai-soc-agents-how-do-they-work</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-claude-mythos-actually-means-for-your-security-program</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-a-managed-soc-how-it-compares-to-ai-soc-analysts</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-agentic-security-everything-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-agentic-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-ai-driven-soc-automation-and-why-does-it-matter-now</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-an-ai-security-analyst-how-it-changes-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-an-autonomous-soc-can-you-build-one-today</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-mfa-fatigue-attack-mfa-bombing-best-practices</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-is-soc-as-a-service-socaas-and-does-it-still-make-sense-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-makes-an-ai-soc-solution-agentic</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/what-rsa-2026-confirmed-the-agentic-soc-is-here</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/when-zoom-phishes-you-unmasking-a-novel-toad-attack-hidden-in-legitimate-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/why-depth-of-investigation-is-the-holy-grail-of-ai-soc-accuracy</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/why-explainability-of-ai-soc-analyst-platforms-is-important</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/why-human-expertise-remains-irreplaceable-in-ai-powered-security-operations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/why-most-dlp-alerts-go-uninvestigated</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/why-your-security-stack-needs-an-ai-soc-orchestrator</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/blog/will-ai-replace-cybersecurity-jobs</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/case-studies/cabinetworks-revolutionizing-soc-efficiency-with-prophet-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/case-studies/fortune-500-soc</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/case-studies/jb-poindexter-co-unlocking-soc-capacity-and-speed-with-prophet-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/case-studies/national-health-provider-scales-soc-with-prophet-security</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/case-studies/zip-boosting-soc-throughput-with-prophet-ai</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/webinar/ai-soc-in-practice-a-security-leaders-view</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/webinar/ghosts-in-the-machine-practitioners-guide-to-ai-soc-ir</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/webinar/hype-check-the-state-of-ai-in-the-soc-2025</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/webinar/the-roi-of-ai-in-the-soc-cost-efficiency-and-team-capacity</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast/balancing-ai-and-human-oversight</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast/leveraging-ai-accelerating-security-operations</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast/leveraging-ai-scaling-security-operations-business-outcomes</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast/risk-ai-how-cisos-evaluate-implement-ai-in-secops</loc>
    </url>
    <url>
        <loc>https://www.prophetsecurity.ai/podcast/secops-evolution-cisos-guide-to-an-ai-soc</loc>
    </url>
</urlset>