<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.iddataweb.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.iddataweb.com/resource/identity-risk-detecting-and-mitigating-identity-threats/</loc>
		<lastmod>2026-04-10T19:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/the-state-of-identity-how-organizations-are-bridging-the-confidence-gap/</loc>
		<lastmod>2026-04-12T15:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/id-dataweb-platform/</loc>
		<lastmod>2026-04-14T04:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/id-dataweb-threat-detection-playbook/</loc>
		<lastmod>2026-04-14T04:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/id-dataweb-industry-coverage/</loc>
		<lastmod>2026-04-14T04:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/id-dataweb-overview/</loc>
		<lastmod>2026-04-14T04:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/identity-security-in-2026-where-we-are-and-whats-next/</loc>
		<lastmod>2026-04-15T19:14:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/evolving-identity-risk-programs-countering-phishing-fraud-and-fake-candidates/</loc>
		<lastmod>2026-04-15T19:14:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/identity-under-attack-why-every-business-must-respond-now/</loc>
		<lastmod>2026-04-15T19:14:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/scattered-spider-exposed-critical-takeaways-for-cyber-defenders/</loc>
		<lastmod>2026-04-15T19:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.iddataweb.com/resource/beyond-mfa-securing-the-human-element-with-identity-threat-detection/</loc>
		<lastmod>2026-04-15T19:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.iddataweb.com/wp-content/uploads/Generic_Texture_Thumbnails_03.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->