<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://jp.security.ntt</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://jp.security.ntt/about/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/about/ceo_message/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/about/brand_statement/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/about/nttsecurity_japan/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/about/nttsecurity_holdings/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/search_category/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/search_issue/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_consulting_education_consultation/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_management/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_monitoring_detection/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_incident_response_investigation/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/ot_security/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/automobile_cyber_security/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/iot-product-security/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/mdr/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/SOC_in_Pocket/SOC_in_Pocket_overview/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/message/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/interview/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/interview/1/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/interview/2/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/interview/3/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/interview/4/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/new-graduate/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/on-going/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/inquiry/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/contact/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/download/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/privacy_nsj/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/cookies/</loc>
<lastmod>2026-04-03T06:38:59.503Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/page/4/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/category/info/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/category/release/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/category/release/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/category/release/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/category/event/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20260409/</loc>
<lastmod>2026-03-25T23:13:05.310Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260325/</loc>
<lastmod>2026-03-24T23:30:04.985Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260311/</loc>
<lastmod>2026-03-10T23:15:38.875Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260303/</loc>
<lastmod>2026-04-02T06:19:48.290Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260212/</loc>
<lastmod>2026-03-05T00:46:42.327Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260203/</loc>
<lastmod>2026-02-03T01:00:05.287Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260128/</loc>
<lastmod>2026-01-28T01:53:42.192Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20260204/</loc>
<lastmod>2026-02-03T00:12:08.057Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20260106/</loc>
<lastmod>2026-01-06T02:00:05.270Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20251212/</loc>
<lastmod>2025-12-11T03:14:29.193Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20251126/</loc>
<lastmod>2025-11-26T03:30:05.062Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20251118/</loc>
<lastmod>2025-11-20T23:29:00.382Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20251112/</loc>
<lastmod>2025-11-18T06:10:35.354Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20251029/</loc>
<lastmod>2025-10-28T23:30:04.973Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20251106/</loc>
<lastmod>2025-11-04T23:56:52.014Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20251202/</loc>
<lastmod>2025-12-01T02:37:10.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/news_20250821/</loc>
<lastmod>2025-08-22T01:07:34.257Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20250910/</loc>
<lastmod>2025-09-08T08:14:01.928Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250709/</loc>
<lastmod>2025-07-29T02:45:49.651Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20250708/</loc>
<lastmod>2025-07-29T08:21:57.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250626/</loc>
<lastmod>2025-07-29T02:46:42.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250611/</loc>
<lastmod>2025-07-29T02:46:10.805Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20250528/</loc>
<lastmod>2025-07-29T08:22:05.012Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250527/</loc>
<lastmod>2025-07-29T02:46:25.886Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250523/</loc>
<lastmod>2025-07-29T02:47:02.807Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/seminar_20250424/</loc>
<lastmod>2025-07-29T08:22:14.821Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250416/</loc>
<lastmod>2025-07-29T02:47:37.474Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250409/</loc>
<lastmod>2025-07-29T02:47:22.898Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20250403/</loc>
<lastmod>2025-07-29T02:47:53.202Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20240425/</loc>
<lastmod>2025-07-30T06:58:38.007Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20231113/</loc>
<lastmod>2025-07-30T06:59:35.049Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20230919/</loc>
<lastmod>2025-07-30T07:00:05.099Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/news/release_20230808/</loc>
<lastmod>2025-07-30T07:01:24.403Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/4/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/5/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/6/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/7/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/8/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/9/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/10/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/11/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/12/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/13/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/14/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/15/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/16/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/17/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/18/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/19/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/20/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/21/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/22/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/23/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/24/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/25/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/26/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/27/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/28/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/29/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/30/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/31/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/32/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/33/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/34/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/page/35/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/4/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/5/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/6/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/cyber_security_report/page/7/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/4/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/5/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/6/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/7/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/8/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/9/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/10/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/11/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/12/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/13/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/14/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/15/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/16/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/17/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/18/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/19/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/tech_blog/page/20/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/2/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/3/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/4/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/5/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/6/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/7/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/8/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/security_magazine/page/9/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/category/for-ceo/</loc>
<lastmod>2026-04-03T06:39:00.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/for-ceo/ceo-security-risk-measures/</loc>
<lastmod>2026-01-21T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/mss-siem-difference/</loc>
<lastmod>2026-03-31T23:30:06.742Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/iaafhe7bt/</loc>
<lastmod>2026-03-24T23:30:04.985Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-ids-ips/</loc>
<lastmod>2026-03-17T23:00:05.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/stoatwaffle_malware/</loc>
<lastmod>2026-03-18T07:10:08.824Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/stoatwaffle_malware_en/</loc>
<lastmod>2026-03-18T07:09:58.951Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/caro2026/</loc>
<lastmod>2026-03-18T07:09:37.001Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr202602/</loc>
<lastmod>2026-03-13T04:10:32.459Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/seccon_ctf14_finals/</loc>
<lastmod>2026-03-11T00:57:58.834Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-antivirus/</loc>
<lastmod>2026-03-10T23:00:04.844Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ot_security28/</loc>
<lastmod>2026-03-09T11:03:28.232Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/epp-edr-difference/</loc>
<lastmod>2026-03-03T23:00:04.802Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ot_security_asset_visibility/</loc>
<lastmod>2026-03-03T05:50:59.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/watis_ot_security26/</loc>
<lastmod>2026-02-27T08:28:27.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-cnapp/</loc>
<lastmod>2026-02-24T23:30:05.323Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/mdr-comparison/</loc>
<lastmod>2026-02-17T23:30:04.802Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr202601/</loc>
<lastmod>2026-02-16T08:40:55.252Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/25/</loc>
<lastmod>2026-02-13T11:05:38.435Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-epp/</loc>
<lastmod>2026-02-11T23:24:10.069Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/24/</loc>
<lastmod>2026-02-06T10:44:47.984Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-mdr-service/</loc>
<lastmod>2026-02-03T23:00:04.865Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/jsac2026/</loc>
<lastmod>2026-02-02T04:38:56.974Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/avar2025/</loc>
<lastmod>2026-01-28T06:36:18.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ransomware-malware-difference/</loc>
<lastmod>2026-01-27T23:15:04.773Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-cloud-security/</loc>
<lastmod>2026-01-20T23:30:05.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/23/</loc>
<lastmod>2026-01-20T09:23:40.896Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202512/</loc>
<lastmod>2026-01-20T00:48:44.886Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ransomware-attack/</loc>
<lastmod>2026-01-13T23:30:04.813Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/sip01/</loc>
<lastmod>2026-01-13T05:13:11.862Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-mitre-attck/</loc>
<lastmod>2026-01-07T02:16:44.168Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/itmedia-tieup-20251201/</loc>
<lastmod>2026-01-07T04:43:41.192Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/21/</loc>
<lastmod>2025-12-24T07:46:40.563Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/20/</loc>
<lastmod>2025-12-24T06:55:05.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ransomware-what-to-do/</loc>
<lastmod>2026-01-07T02:25:58.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/19/</loc>
<lastmod>2025-12-19T09:16:09.255Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-zero-day-attack/</loc>
<lastmod>2025-12-17T07:10:55.839Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc_introduction_worksho2026/</loc>
<lastmod>2026-01-09T02:25:45.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/18/</loc>
<lastmod>2025-12-16T05:53:58.832Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202511/</loc>
<lastmod>2025-12-12T05:42:40.632Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/react2shell_malware_zndoor/</loc>
<lastmod>2025-12-12T00:19:52.918Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/ransomware-infection-route/</loc>
<lastmod>2026-01-07T02:27:09.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/llm-mcp-malware-function-naming-practices/</loc>
<lastmod>2025-12-10T00:56:29.007Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/anti-ransomware/</loc>
<lastmod>2026-01-07T02:28:02.568Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-cyber-kill-chain/</loc>
<lastmod>2025-11-25T23:54:04.851Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/17/</loc>
<lastmod>2025-11-19T03:01:42.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-a-targeted-attack/</loc>
<lastmod>2025-11-19T00:37:22.632Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202510/</loc>
<lastmod>2025-12-04T07:41:45.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-sase/</loc>
<lastmod>2026-01-07T02:32:03.513Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-supply-chain-attack/</loc>
<lastmod>2025-11-05T00:04:09.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/16/</loc>
<lastmod>2025-12-12T06:35:49.778Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-ransomware/</loc>
<lastmod>2026-01-07T02:34:32.708Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/vb2025/</loc>
<lastmod>2025-10-23T10:24:00.875Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-incident-response/</loc>
<lastmod>2025-10-22T00:00:05.631Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/first2025/</loc>
<lastmod>2025-10-23T10:24:33.587Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/edr-ndr-difference/</loc>
<lastmod>2026-01-07T02:59:03.634Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202509/</loc>
<lastmod>2025-10-16T06:15:34.705Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ottercandy_malware_e/</loc>
<lastmod>2025-10-16T06:38:43.135Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ottercandy_malware_j/</loc>
<lastmod>2025-10-16T06:40:22.948Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-analyst-event-20251010/</loc>
<lastmod>2025-10-29T08:27:48.487Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-threat-hunting/</loc>
<lastmod>2026-03-18T01:44:43.566Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-zero-trust/</loc>
<lastmod>2025-10-01T02:38:18.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/edr-soc-difference/</loc>
<lastmod>2026-03-18T01:42:05.413Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-ndr/</loc>
<lastmod>2026-01-07T02:55:03.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202508/</loc>
<lastmod>2025-09-12T02:51:53.888Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/siem-soar-difference/</loc>
<lastmod>2026-03-18T01:40:30.083Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/15/</loc>
<lastmod>2025-12-03T08:04:48.272Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/14/</loc>
<lastmod>2025-12-03T07:29:37.665Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-soar/</loc>
<lastmod>2025-09-03T00:00:05.221Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/edr-siem-difference/</loc>
<lastmod>2025-08-27T23:48:12.993Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-mdr/</loc>
<lastmod>2026-01-07T23:25:18.054Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/13/</loc>
<lastmod>2025-12-02T10:12:24.686Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-siem/</loc>
<lastmod>2026-03-18T01:38:48.388Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/12/</loc>
<lastmod>2025-12-02T10:03:11.801Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/11/</loc>
<lastmod>2025-12-02T09:47:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/10/</loc>
<lastmod>2025-12-02T09:42:35.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/09/</loc>
<lastmod>2025-12-02T09:38:10.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/08/</loc>
<lastmod>2025-12-02T09:19:58.775Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20250807/</loc>
<lastmod>2025-08-22T11:44:19.058Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/07/</loc>
<lastmod>2025-12-02T09:13:12.326Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/06/</loc>
<lastmod>2025-12-02T08:55:11.997Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/soc-siem-difference/</loc>
<lastmod>2025-08-20T00:16:38.886Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/05/</loc>
<lastmod>2025-12-02T08:46:17.268Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/04/</loc>
<lastmod>2025-12-02T08:46:30.586Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/03/</loc>
<lastmod>2025-12-02T08:46:41.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/02/</loc>
<lastmod>2025-12-02T08:46:53.412Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/01/</loc>
<lastmod>2025-12-02T01:04:25.595Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/edr-xdr-difference/</loc>
<lastmod>2026-01-07T03:18:42.014Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-xdr/</loc>
<lastmod>2025-08-22T04:12:50.984Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-edr/</loc>
<lastmod>2026-03-18T01:35:44.337Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-soc-service/</loc>
<lastmod>2026-03-19T03:01:11.584Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-csirt/</loc>
<lastmod>2026-03-18T01:30:59.866Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202507/</loc>
<lastmod>2025-08-26T05:40:38.505Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/htb-business-ctf-2025-writeup-forensics/</loc>
<lastmod>2025-08-26T08:06:30.220Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/hack-the-box-machines-haze-writeup/</loc>
<lastmod>2025-08-27T09:31:14.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/soc-csirt-difference/</loc>
<lastmod>2025-08-07T06:20:26.587Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/sincon2025/</loc>
<lastmod>2025-08-27T09:24:15.963Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-soc/</loc>
<lastmod>2025-08-22T03:28:12.845Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/what-is-mss/</loc>
<lastmod>2026-03-18T01:29:14.184Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/htb-business-ctf-2025-writeup-pwn/</loc>
<lastmod>2025-08-26T08:00:43.564Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/mdr-mss-difference/</loc>
<lastmod>2026-03-18T01:27:34.867Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/htb-business-ctf-2025-writeup-web/</loc>
<lastmod>2025-08-26T08:01:00.770Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202506/</loc>
<lastmod>2025-08-22T11:44:13.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/mdr-edr-xdr-difference/</loc>
<lastmod>2025-08-07T06:22:32.336Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/security_magazine/mdr-soc-difference/</loc>
<lastmod>2025-08-07T06:23:02.889Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/waterplum-ottercookie/</loc>
<lastmod>2025-08-26T08:01:16.390Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/en-waterplum-ottercookie/</loc>
<lastmod>2025-08-27T09:29:43.107Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202505/</loc>
<lastmod>2025-08-22T11:43:54.711Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-analyst-event-20250516/</loc>
<lastmod>2025-08-27T23:30:22.786Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/vtuserjp2/</loc>
<lastmod>2025-08-27T09:31:51.971Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_mcsfile_research/</loc>
<lastmod>2025-09-01T01:24:37.147Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202504/</loc>
<lastmod>2025-08-22T11:43:36.767Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/whitepaper-msc/</loc>
<lastmod>2025-08-27T09:33:13.993Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202503/</loc>
<lastmod>2025-08-22T11:43:17.748Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/jsac2025/</loc>
<lastmod>2025-08-27T09:35:05.899Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202502/</loc>
<lastmod>2025-08-22T11:43:08.572Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/en-contagious-interview-ottercookie/</loc>
<lastmod>2025-08-28T08:22:55.524Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202501/</loc>
<lastmod>2025-08-22T11:42:55.030Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/sas-ctf-2024-final/</loc>
<lastmod>2025-08-27T11:05:30.923Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/contagious-interview-ottercookie/</loc>
<lastmod>2025-08-27T09:38:19.008Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/2025-cybersecurity-trend/</loc>
<lastmod>2025-08-26T08:02:37.221Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202412/</loc>
<lastmod>2025-08-22T11:42:44.162Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202411/</loc>
<lastmod>2025-08-22T11:42:33.995Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/defcon-ctf-2024-writeup/</loc>
<lastmod>2025-08-27T11:03:09.697Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/enowars-8-writeup-attack-and-defense/</loc>
<lastmod>2025-08-27T11:04:38.922Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/darkplum-asyncrat/</loc>
<lastmod>2025-08-27T09:40:28.731Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/vb2024/</loc>
<lastmod>2025-08-27T11:01:45.072Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202410/</loc>
<lastmod>2025-08-22T11:42:24.544Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202409/</loc>
<lastmod>2025-08-22T11:42:14.663Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/global_threat_intelligence_report/</loc>
<lastmod>2025-08-28T11:29:13.071Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/appdomainmanager-injection-en/</loc>
<lastmod>2025-08-27T11:01:10.650Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/appdomainmanager-injection/</loc>
<lastmod>2025-08-27T11:00:35.228Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20240806/</loc>
<lastmod>2025-08-22T11:41:44.889Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202408/</loc>
<lastmod>2025-08-22T11:42:06.038Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202407/</loc>
<lastmod>2025-08-22T11:41:56.979Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/controlplug-en/</loc>
<lastmod>2025-08-27T10:59:47.835Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_msixfile/</loc>
<lastmod>2025-08-29T11:52:02.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_msixfile_research/</loc>
<lastmod>2025-09-01T00:51:26.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/whitepaper-msix/</loc>
<lastmod>2025-08-27T10:58:29.716Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/controlplug/</loc>
<lastmod>2025-08-27T10:59:19.750Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202406/</loc>
<lastmod>2025-08-22T11:41:34.647Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202405/</loc>
<lastmod>2025-08-22T11:41:23.818Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_blacktech_report/</loc>
<lastmod>2025-09-01T00:57:32.821Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/pac2-pypowerautomate/</loc>
<lastmod>2025-08-27T11:06:08.961Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/hack-the-box-cyber-apocalypse-ctf-2024/</loc>
<lastmod>2025-08-27T10:56:56.048Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-analyst-event-20240607-and-20240628/</loc>
<lastmod>2025-08-27T10:56:23.328Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/chatspamdetector-ai/</loc>
<lastmod>2025-08-27T10:55:08.543Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/cpd-phishing-email-detection-with-generative-ai/</loc>
<lastmod>2025-08-27T10:54:32.061Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202404/</loc>
<lastmod>2025-08-22T11:41:15.711Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/growup-2023/</loc>
<lastmod>2025-08-28T04:27:42.137Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ivanloader/</loc>
<lastmod>2025-08-28T04:28:31.269Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202403/</loc>
<lastmod>2025-08-22T11:41:07.154Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/jsac-2024/</loc>
<lastmod>2025-08-28T04:29:28.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/jsae-scis-2024/</loc>
<lastmod>2025-08-28T04:30:58.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/blackhat-europe-2023/</loc>
<lastmod>2025-09-01T07:55:49.044Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202402/</loc>
<lastmod>2025-08-22T11:40:59.133Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/inside-power-automate-cloud-flow/</loc>
<lastmod>2025-08-28T04:22:08.580Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_20240130/</loc>
<lastmod>2025-08-22T11:40:40.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ntt-mss-2024-3-2/</loc>
<lastmod>2025-08-28T04:25:55.669Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/blackhat-europe-2023-arsenal-power-automate-c2/</loc>
<lastmod>2025-08-28T04:42:46.946Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-reseacher/</loc>
<lastmod>2025-08-29T10:38:26.321Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/avar2023/</loc>
<lastmod>2025-08-28T04:59:11.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202401/</loc>
<lastmod>2025-08-22T11:40:51.097Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i3sm/</loc>
<lastmod>2025-09-01T07:06:50.261Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/hacklu2023/</loc>
<lastmod>2025-08-29T10:40:06.825Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/hack-lu-ctf-2023-writeup/</loc>
<lastmod>2025-08-29T11:06:30.231Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202312/</loc>
<lastmod>2025-08-22T11:40:33.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/vb2023/</loc>
<lastmod>2025-08-29T11:18:07.532Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/seccamp-yamanashi-2023/</loc>
<lastmod>2025-08-29T11:23:10.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20231102/</loc>
<lastmod>2025-08-22T11:40:10.763Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202311/</loc>
<lastmod>2025-08-22T11:40:25.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/hitcon-cmt-2023/</loc>
<lastmod>2025-08-29T11:33:44.789Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20231027/</loc>
<lastmod>2025-08-22T11:40:04.779Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202310/</loc>
<lastmod>2025-08-22T11:40:17.770Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102id0w/</loc>
<lastmod>2025-09-01T05:48:14.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202309/</loc>
<lastmod>2025-08-22T11:39:58.389Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20230831/</loc>
<lastmod>2025-08-22T11:39:37.797Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202308/</loc>
<lastmod>2025-08-22T11:39:47.459Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20230725/</loc>
<lastmod>2025-08-22T11:39:18.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202307/</loc>
<lastmod>2025-08-22T11:39:28.835Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ih4f/</loc>
<lastmod>2025-09-01T02:29:05.139Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ih4e/</loc>
<lastmod>2025-09-01T02:23:44.481Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ig84/</loc>
<lastmod>2025-09-03T07:54:38.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ignh/</loc>
<lastmod>2025-09-01T02:57:57.637Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202306/</loc>
<lastmod>2025-08-22T11:39:09.316Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ifsw/</loc>
<lastmod>2025-09-01T05:10:05.072Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ifpu/</loc>
<lastmod>2025-09-01T05:17:32.857Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20230529/</loc>
<lastmod>2025-08-22T11:38:51.031Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_golang_tool/</loc>
<lastmod>2025-09-01T00:52:55.548Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_gimpfuzzy_report/</loc>
<lastmod>2025-09-01T00:54:25.704Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102idrs/</loc>
<lastmod>2025-09-01T05:20:09.696Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202305/</loc>
<lastmod>2025-08-22T11:39:00.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102id12/</loc>
<lastmod>2025-09-01T05:31:24.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i448/</loc>
<lastmod>2025-09-01T05:46:08.044Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i7lq/</loc>
<lastmod>2025-09-01T06:05:31.956Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102id0t/</loc>
<lastmod>2025-09-01T05:54:30.395Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102icvb/</loc>
<lastmod>2025-09-01T06:16:41.733Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ic6o/</loc>
<lastmod>2025-09-01T06:22:06.751Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202304/</loc>
<lastmod>2025-08-22T11:38:40.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202303/</loc>
<lastmod>2025-08-22T11:38:32.079Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i7s1/</loc>
<lastmod>2025-09-03T07:12:24.488Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i7af/</loc>
<lastmod>2025-09-01T06:53:18.490Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202302/</loc>
<lastmod>2025-08-22T11:38:23.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20230113/</loc>
<lastmod>2025-08-22T11:37:56.660Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202301/</loc>
<lastmod>2025-08-22T11:38:13.008Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202212/</loc>
<lastmod>2025-08-22T11:38:05.784Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i1ak/</loc>
<lastmod>2025-09-01T07:24:14.140Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102i2oc/</loc>
<lastmod>2025-09-01T07:13:09.166Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202211/</loc>
<lastmod>2025-08-22T11:37:48.381Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hz18/</loc>
<lastmod>2025-09-01T07:40:57.186Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102htp3/</loc>
<lastmod>2025-08-29T10:33:41.197Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102htzm/</loc>
<lastmod>2025-08-29T09:22:42.810Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202210/</loc>
<lastmod>2025-08-22T11:37:40.458Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_report_on_apt/</loc>
<lastmod>2025-09-01T00:55:55.081Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20220914/</loc>
<lastmod>2025-08-22T11:37:21.632Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/71vecai_o0/</loc>
<lastmod>2025-08-22T11:37:13.731Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202209/</loc>
<lastmod>2025-08-22T11:37:29.336Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202208/</loc>
<lastmod>2025-08-22T11:37:05.848Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hti5/</loc>
<lastmod>2025-08-29T09:04:01.777Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/trickbot-variant-anchor_dns-communicating-over-dns/</loc>
<lastmod>2025-08-29T08:39:27.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/targeted-trickbot-activity-drops-powerbrace-backdo/</loc>
<lastmod>2025-08-29T08:28:08.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-open-house-4-26/</loc>
<lastmod>2025-08-29T08:17:23.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/soc-open-house/</loc>
<lastmod>2025-08-29T08:15:15.424Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/shellbot-victim-overlap-with-emotet-network-infras/</loc>
<lastmod>2025-08-29T08:13:05.171Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ntt-security-holdings-launches-managed-detection-a/</loc>
<lastmod>2025-08-29T08:01:30.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/ntt-global-threat-intelligence-report-webinar/</loc>
<lastmod>2025-08-29T07:58:46.337Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/dridex-and-emotet-infrastructure-overlaps/</loc>
<lastmod>2025-08-29T07:56:24.910Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/analysis-of-an-iranian-apts-e400-powgoop-variant-r/</loc>
<lastmod>2025-08-29T07:51:02.727Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/behind-the-scenes-of-the-emotet-infrastructure/</loc>
<lastmod>2025-08-29T07:39:06.535Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202207/</loc>
<lastmod>2025-08-22T11:36:57.901Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/qv83z0hyyn9/</loc>
<lastmod>2025-08-22T11:36:40.907Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/adhoc_csr_20220617/</loc>
<lastmod>2025-08-22T11:36:32.110Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hq2r/</loc>
<lastmod>2025-08-29T07:29:37.978Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202206/</loc>
<lastmod>2025-08-22T11:36:49.100Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hojk/</loc>
<lastmod>2025-08-29T07:03:32.160Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102ho8o/</loc>
<lastmod>2025-08-29T06:53:51.464Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202205/</loc>
<lastmod>2025-08-22T11:36:26.226Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hncg/</loc>
<lastmod>2025-08-29T06:43:15.345Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hmhv/</loc>
<lastmod>2025-08-29T06:30:29.064Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/cyber_security_report/csr_202204/</loc>
<lastmod>2025-08-22T11:36:17.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hf3q/</loc>
<lastmod>2025-08-29T06:21:27.987Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102heu1/</loc>
<lastmod>2025-08-29T06:14:58.916Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hez7/</loc>
<lastmod>2025-08-29T06:11:40.549Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102heu4/</loc>
<lastmod>2025-08-29T05:43:45.283Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102heu3/</loc>
<lastmod>2025-08-29T05:40:50.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hes5/</loc>
<lastmod>2025-08-29T05:39:03.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hes6/</loc>
<lastmod>2025-08-29T05:37:39.270Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hekm/</loc>
<lastmod>2025-08-29T05:35:24.790Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hekj/</loc>
<lastmod>2025-08-29T05:28:52.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hef7/</loc>
<lastmod>2025-08-29T05:27:24.723Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hei2/</loc>
<lastmod>2025-08-29T05:25:43.820Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hec4/</loc>
<lastmod>2025-08-29T05:20:48.149Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hebx/</loc>
<lastmod>2025-08-29T05:16:40.258Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hdva/</loc>
<lastmod>2025-08-29T05:06:57.286Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102he0p/</loc>
<lastmod>2025-08-29T04:58:54.657Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hdvh/</loc>
<lastmod>2025-08-29T03:10:48.075Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hdvb/</loc>
<lastmod>2025-08-29T03:00:17.442Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hdsj/</loc>
<lastmod>2025-08-29T02:53:36.532Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102hdsh/</loc>
<lastmod>2025-09-03T07:21:13.556Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102h7t6/</loc>
<lastmod>2025-08-29T02:39:38.249Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102h7vx/</loc>
<lastmod>2025-08-29T02:35:41.120Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102h7l2/</loc>
<lastmod>2025-08-29T02:28:00.555Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102h5av/</loc>
<lastmod>2025-08-29T02:21:45.998Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gsqj/</loc>
<lastmod>2025-08-29T02:15:27.044Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fz2k/</loc>
<lastmod>2025-08-29T00:35:45.594Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gr6l/</loc>
<lastmod>2025-08-29T02:01:24.674Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gpur/</loc>
<lastmod>2025-08-29T01:56:24.476Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gm2e/</loc>
<lastmod>2025-08-29T01:48:43.882Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102glv5/</loc>
<lastmod>2025-08-29T01:43:19.723Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gkfp/</loc>
<lastmod>2025-08-29T01:30:16.787Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gi9b/</loc>
<lastmod>2025-08-29T01:15:22.795Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gcm5/</loc>
<lastmod>2025-08-29T01:09:37.961Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_craftypanda_report/</loc>
<lastmod>2025-09-01T00:58:42.089Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gbmj/</loc>
<lastmod>2025-08-29T01:04:37.127Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102gav6/</loc>
<lastmod>2025-08-29T01:02:08.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102g84n/</loc>
<lastmod>2025-08-29T00:59:34.126Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102g1u7/</loc>
<lastmod>2025-08-29T00:54:03.213Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102g0dt/</loc>
<lastmod>2025-08-29T00:49:42.673Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102g03d/</loc>
<lastmod>2025-08-29T00:43:17.894Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fwcg/</loc>
<lastmod>2025-08-29T00:28:19.549Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fwc2/</loc>
<lastmod>2025-08-28T08:22:27.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fw4a/</loc>
<lastmod>2025-08-28T08:17:21.691Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fw9b/</loc>
<lastmod>2025-08-28T08:13:11.721Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvyj/</loc>
<lastmod>2025-08-28T08:08:52.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fw0v/</loc>
<lastmod>2025-08-28T08:04:55.537Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fw48/</loc>
<lastmod>2025-08-28T07:59:47.757Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fw2q/</loc>
<lastmod>2025-08-28T07:57:16.359Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvyi/</loc>
<lastmod>2025-08-28T07:55:11.784Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvyr/</loc>
<lastmod>2025-08-28T07:52:47.821Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvwe/</loc>
<lastmod>2025-08-28T07:50:15.971Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvwd/</loc>
<lastmod>2025-08-28T07:44:13.046Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvwf/</loc>
<lastmod>2025-08-28T07:38:14.527Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvtr/</loc>
<lastmod>2025-08-28T07:31:44.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvqz/</loc>
<lastmod>2025-08-28T07:26:21.116Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvo7/</loc>
<lastmod>2025-08-28T07:21:29.443Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvo6/</loc>
<lastmod>2025-08-28T07:18:02.092Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvls/</loc>
<lastmod>2025-08-28T07:13:30.634Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvjs/</loc>
<lastmod>2025-08-28T07:06:22.650Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvek/</loc>
<lastmod>2025-08-28T07:01:38.137Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fvej/</loc>
<lastmod>2025-08-28T06:51:59.757Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fs3u/</loc>
<lastmod>2025-09-03T07:27:58.258Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fra0/</loc>
<lastmod>2025-08-28T06:39:12.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102foh3/</loc>
<lastmod>2025-08-28T06:34:51.397Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fmlc/</loc>
<lastmod>2025-08-28T06:29:22.273Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fm1h/</loc>
<lastmod>2025-09-03T07:29:44.745Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102flpy/</loc>
<lastmod>2025-08-28T06:09:31.279Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fj39/</loc>
<lastmod>2025-09-03T07:30:28.910Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/102fhci/</loc>
<lastmod>2025-09-01T07:51:51.502Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_taidoor_report/</loc>
<lastmod>2025-09-01T00:59:28.975Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_waterholeattack_chongryon/</loc>
<lastmod>2025-09-01T01:01:52.991Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_rgiexploit_report/</loc>
<lastmod>2025-09-01T01:02:54.232Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/insights_resources/tech_blog/content_hub_ursnif_report/</loc>
<lastmod>2025-09-01T01:00:21.500Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/ot_security/ot-network-asset-discovery/</loc>
<lastmod>2026-03-23T09:28:22.963Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_incident_response_investigation/comprehensive-incident-response/</loc>
<lastmod>2026-03-23T09:27:43.007Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_incident_response_investigation/ir-common-ticket/</loc>
<lastmod>2026-03-23T09:26:42.801Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_monitoring_detection/fishing-monitoring/</loc>
<lastmod>2026-03-23T09:25:59.359Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_monitoring_detection/osint-monitoring/</loc>
<lastmod>2026-03-23T09:24:37.639Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_monitoring_detection/managed-ueba/</loc>
<lastmod>2026-03-23T09:22:52.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/targeted-malware/</loc>
<lastmod>2026-03-23T09:21:49.039Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/red-team/</loc>
<lastmod>2026-03-23T09:20:47.252Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services//iot-product-security/</loc>
<lastmod>2026-03-27T01:07:48.415Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/tenable/</loc>
<lastmod>2026-03-23T09:17:49.685Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/qualys/</loc>
<lastmod>2026-03-23T09:16:40.897Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_diagnosis_assessment_investigation/web-application-platform/</loc>
<lastmod>2026-03-23T09:18:59.859Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_management/privileged-access-management/</loc>
<lastmod>2026-03-23T09:15:45.446Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_consulting_education_consultation/advisory-support/</loc>
<lastmod>2026-03-23T09:14:23.236Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_consulting_education_consultation/security-risk-assessment/</loc>
<lastmod>2026-03-23T09:13:23.915Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_consulting_education_consultation/security-planning/</loc>
<lastmod>2026-03-23T09:05:03.405Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/products_and_services/security_consulting_education_consultation/csirt-support/</loc>
<lastmod>2026-03-23T09:12:23.509Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/da202601/</loc>
<lastmod>2026-03-05T05:15:40.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mk202602/</loc>
<lastmod>2026-03-05T05:16:15.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mk202601/</loc>
<lastmod>2026-03-05T05:17:25.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/pf202501/</loc>
<lastmod>2026-03-05T05:18:02.939Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/iot202602/</loc>
<lastmod>2026-01-27T10:25:29.030Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202509/</loc>
<lastmod>2025-12-15T00:58:26.089Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/pf202503d/</loc>
<lastmod>2025-12-01T09:56:07.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202501/</loc>
<lastmod>2026-02-19T07:44:11.749Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202503c/</loc>
<lastmod>2025-12-01T09:55:44.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202504d/</loc>
<lastmod>2025-12-01T09:55:30.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202505c/</loc>
<lastmod>2025-12-01T09:55:14.302Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202506c/</loc>
<lastmod>2025-12-01T09:54:55.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/mss202508c/</loc>
<lastmod>2025-12-01T09:54:25.747Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/pf202505c/</loc>
<lastmod>2025-12-15T04:25:27.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://jp.security.ntt/careers/job/pf202506c/</loc>
<lastmod>2025-12-15T05:02:29.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
</urlset>
