<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://asimily.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-02 14:01:21 GMT -->
	<url>
		<loc>https://asimily.com/</loc>
		<lastmod>2026-04-01T19:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/</loc>
		<lastmod>2026-04-01T11:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/segmentation-orchestration/</loc>
		<lastmod>2026-04-01T21:53:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-nist-csf/</loc>
		<lastmod>2026-03-19T21:32:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/become-a-partner/</loc>
		<lastmod>2026-02-18T20:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/press/</loc>
		<lastmod>2026-02-10T19:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/customer-advisory-board-event-agenda/</loc>
		<lastmod>2025-10-20T19:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/it-capabilities/</loc>
		<lastmod>2025-10-02T13:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/asimily-for-hospitals/</loc>
		<lastmod>2025-12-23T19:46:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-cmmc/</loc>
		<lastmod>2025-04-24T21:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/threat-response/</loc>
		<lastmod>2025-04-15T20:59:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/inventory-visibility/</loc>
		<lastmod>2025-10-01T23:21:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/vulnerability-prioritization/</loc>
		<lastmod>2025-10-03T18:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/governance-risk-compliance/</loc>
		<lastmod>2025-07-14T18:39:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/risk-mitigation/</loc>
		<lastmod>2025-10-03T18:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/overview/</loc>
		<lastmod>2025-10-17T21:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/iot-patching/</loc>
		<lastmod>2025-07-21T20:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/risk-reduction-services/</loc>
		<lastmod>2025-10-02T13:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/configuration-control/</loc>
		<lastmod>2025-06-20T17:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-mitre-attack-framework/</loc>
		<lastmod>2024-06-03T14:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-dora/</loc>
		<lastmod>2024-06-03T14:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-nis2-directive/</loc>
		<lastmod>2024-06-03T14:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-fda/</loc>
		<lastmod>2024-06-03T14:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-pci-dss/</loc>
		<lastmod>2024-06-03T14:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-hipaa/</loc>
		<lastmod>2026-03-18T21:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-cyberscope/</loc>
		<lastmod>2024-06-03T14:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/incident-response-readiness-with-packet-capture/</loc>
		<lastmod>2025-10-02T13:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/iot-risk-simulator/</loc>
		<lastmod>2025-10-02T12:55:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-zero-trust-security-framework/</loc>
		<lastmod>2024-06-03T14:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/compliance-nerc-cip/</loc>
		<lastmod>2024-08-22T18:01:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/pre-purchase-security-risk-avoidance/</loc>
		<lastmod>2025-10-02T13:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/fda-recalls-and-security-advisories/</loc>
		<lastmod>2025-10-02T13:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/medical-device-utilization/</loc>
		<lastmod>2025-10-02T13:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/network-segmentation-and-microsegmentation/</loc>
		<lastmod>2026-02-19T22:33:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/efficient-security-risk-mitigation-workflows/</loc>
		<lastmod>2025-10-02T13:41:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/iot-device-prioritization-by-risk/</loc>
		<lastmod>2025-10-02T13:40:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/risk-based-iot-vulnerability-prioritization/</loc>
		<lastmod>2025-10-02T13:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/continuous-iot-vulnerability-detection/</loc>
		<lastmod>2025-10-02T13:38:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/iot-device-detail-enrichment/</loc>
		<lastmod>2025-10-02T13:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/automated-iot-visibility-deep-categorization/</loc>
		<lastmod>2025-10-02T13:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/energy-utilities/</loc>
		<lastmod>2024-08-15T20:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/transportation/</loc>
		<lastmod>2024-01-29T20:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/financial-services/</loc>
		<lastmod>2024-01-24T20:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/retail/</loc>
		<lastmod>2024-04-01T20:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/hospitality-iot-security/</loc>
		<lastmod>2024-01-16T19:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/contact-us/</loc>
		<lastmod>2026-02-12T23:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/about-us/careers/job-application/</loc>
		<lastmod>2024-12-31T20:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/operational-efficiency/</loc>
		<lastmod>2024-04-26T17:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/manufacturing/</loc>
		<lastmod>2024-08-15T20:19:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/government/</loc>
		<lastmod>2024-01-03T21:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/life-sciences/</loc>
		<lastmod>2024-01-11T19:42:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/about-us/partners/</loc>
		<lastmod>2026-02-20T19:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/healthcare/</loc>
		<lastmod>2023-11-09T17:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/higher-education/</loc>
		<lastmod>2024-01-30T19:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/medical-devices/</loc>
		<lastmod>2023-10-19T10:48:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/search/</loc>
		<lastmod>2023-09-29T22:42:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/job-openings/</loc>
		<lastmod>2023-09-29T20:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/resources/glossary/</loc>
		<lastmod>2023-10-19T10:51:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/resources/faq/</loc>
		<lastmod>2024-09-18T20:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/ot-security/</loc>
		<lastmod>2025-09-24T21:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/iot-security/</loc>
		<lastmod>2023-10-19T10:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/about-us/careers/</loc>
		<lastmod>2025-09-02T17:12:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/about-us/leadership/</loc>
		<lastmod>2026-03-23T20:31:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/integrations/</loc>
		<lastmod>2025-07-30T14:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/inventory-visibility-2/</loc>
		<lastmod>2025-03-28T21:45:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/risk-modeling/</loc>
		<lastmod>2024-04-26T17:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/product/vulnerability-mitigation/</loc>
		<lastmod>2024-06-05T14:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/solutions/</loc>
		<lastmod>2023-09-29T22:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/industries/</loc>
		<lastmod>2023-09-29T20:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/privacy-policy/</loc>
		<lastmod>2025-05-07T23:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/request-a-demo/</loc>
		<lastmod>2026-02-12T23:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/resources/</loc>
		<lastmod>2025-10-22T19:34:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/about-us/</loc>
		<lastmod>2026-02-03T17:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/security-for-data-centers/</loc>
		<lastmod>2026-03-31T21:07:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-pitt-healthcare-cyberattack/</loc>
		<lastmod>2026-03-30T22:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/2026-hipaa-cybersecurity-rule/</loc>
		<lastmod>2026-03-23T18:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-best-protect-your-hospital-after-the-incidents-at-stryker-and-intuitive/</loc>
		<lastmod>2026-03-13T20:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-siem/</loc>
		<lastmod>2026-03-11T19:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/10-iot-healthcare-examples/</loc>
		<lastmod>2026-03-16T20:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-are-cyber-physical-systems/</loc>
		<lastmod>2026-03-09T19:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/microsegmentation/</loc>
		<lastmod>2026-03-09T22:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/ot-network-segmentation/</loc>
		<lastmod>2026-03-04T22:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/network-segmentation/</loc>
		<lastmod>2026-03-02T21:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-10-emerging-challenges-of-cybersecurity/</loc>
		<lastmod>2026-03-03T21:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/unlock-full-potential-of-cisco-ise-with-asimily-integration/</loc>
		<lastmod>2026-02-17T21:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/navigating-the-2026-hipaa-security-rule-changes-what-network-segmentation-requirements-mean-for-healthcare-iot-security/</loc>
		<lastmod>2026-02-06T21:26:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-asimily-enables-smart-segmentation-operationalizing-zero-trust-initiatives/</loc>
		<lastmod>2026-01-21T23:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-nearly-80-of-segmentation-projects-fail-to-operationalize/</loc>
		<lastmod>2026-01-12T20:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/looking-back-at-2025-key-trends-shaping-cyber-asset-exposure-management/</loc>
		<lastmod>2026-01-06T20:05:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/asimily-year-in-review-2025-webinar/</loc>
		<lastmod>2026-01-06T19:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/macro-network-segmentation/</loc>
		<lastmod>2026-01-29T23:16:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/common-faqs-about-asimilys-iomt-security-solution/</loc>
		<lastmod>2025-12-30T20:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/state-of-iomt-cybersecurity-2025/</loc>
		<lastmod>2026-03-10T19:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-the-best-iomt-security-platform-for-hospitals-with-thousands-of-connected-devices/</loc>
		<lastmod>2025-12-15T21:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-unified-visibility-across-all-cyber-assets-reduces-your-attack-surface/</loc>
		<lastmod>2025-12-08T19:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/building-cyber-resilience-through-proactive-exposure-management/</loc>
		<lastmod>2025-12-05T21:13:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/applying-zero-trust-frameworks-across-your-entire-cyber-asset-attack-surfaceument/</loc>
		<lastmod>2025-12-03T21:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/smart-vulnerability-prioritization-is-the-key-to-unlocking-exposure-management/</loc>
		<lastmod>2025-12-02T20:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-evolution-from-caasm-to-cyber-asset-exposure-management/</loc>
		<lastmod>2025-11-19T17:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-cyber-asset-attack-surface-management-caasm/</loc>
		<lastmod>2025-11-03T19:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-you-cant-see-will-haunt-you-the-horror-of-incomplete-asset-inventories/</loc>
		<lastmod>2025-10-30T19:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/navigating-the-coast-guards-maritime-cybersecurity-rule-how-asimily-enables-compliance/</loc>
		<lastmod>2025-10-28T18:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-cisa-asset-inventory-requirement-that-changed-everything-for-ot-and-how-to-actually-meet-it/</loc>
		<lastmod>2025-10-21T19:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-asset-visibility-challenge-has-a-new-approach-next-generation-cyber-asset-and-exposure-management/</loc>
		<lastmod>2025-10-17T21:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-data-quality-crisis-your-fragmented-security-stack-is-lying-to-you/</loc>
		<lastmod>2025-10-17T18:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/breaking-the-vulnerability-backlog-why-prioritization-without-complete-visibility-fails/</loc>
		<lastmod>2025-10-14T19:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-iot-devices-most-vulnerable-to-cyberattacks/</loc>
		<lastmod>2026-02-09T23:38:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-hidden-cost-of-partial-visibility-why-your-security-stack-is-leaving-money-on-the-table/</loc>
		<lastmod>2025-10-08T19:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cybersecurity-awareness-month-2025-key-trends-in-iot-security/</loc>
		<lastmod>2025-10-02T17:37:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-sboms-are-critical-to-your-iot-security-strategy/</loc>
		<lastmod>2025-09-30T17:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cybersecurity-essentials-for-pharmaceutical-manufacturing-4-0/</loc>
		<lastmod>2025-09-25T18:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/iomt-risk-management-ecosystem-2026/</loc>
		<lastmod>2025-10-24T18:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/implementing-the-sans-5-critical-ics-cybersecurity-controls-a-practical-guide/</loc>
		<lastmod>2025-09-23T19:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/health-system-cybersecurity-in-the-post-windows-10-era/</loc>
		<lastmod>2025-09-18T19:51:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/identifying-prioritizing-and-protecting-ics-crown-jewel-assets/</loc>
		<lastmod>2025-09-15T22:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/operational-resilience-starts-with-ot-visibility/</loc>
		<lastmod>2025-09-11T20:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-role-of-ai-in-risk-prioritization/</loc>
		<lastmod>2025-09-09T17:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/network-segmentation-security-best-practices/</loc>
		<lastmod>2026-02-10T19:47:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/ot-buyers-guide/</loc>
		<lastmod>2025-09-05T20:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/salt-typhoon-a-wake-up-call-for-infrastructure-security-in-the-age-of-connected-devices/</loc>
		<lastmod>2025-09-04T20:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-attack-surface-is-protected-by-nac/</loc>
		<lastmod>2026-02-03T19:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-convergence-of-iot-and-it-demands-a-new-approach-to-visibility/</loc>
		<lastmod>2025-08-25T21:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/press-release-asimily-achieves-soc-2-type-ii-certification-and-c5-attestation-strengthening-global-compliance-leadership-in-iot-and-ot-risk-management/</loc>
		<lastmod>2025-08-15T16:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/comprehensive-iot-patching-password-management-unlocking-efficiency-security/</loc>
		<lastmod>2025-08-13T19:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/ics-vulnerability-management-explained-risks-realities-and-best-practices/</loc>
		<lastmod>2025-08-12T19:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/iot-ot-iomt-webinar-september-23/</loc>
		<lastmod>2025-08-06T21:47:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/outpacing-threats-in-the-internet-of-robotic-things-iort/</loc>
		<lastmod>2025-08-05T16:36:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/most-notable-healthcare-cyberattacks-of-2025/</loc>
		<lastmod>2025-11-04T17:29:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-iot-and-ot-devices-in-manufacturing-lessons-from-the-front-lines/</loc>
		<lastmod>2025-07-30T22:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-utilities-cyberattacks-of-2025/</loc>
		<lastmod>2026-02-10T20:09:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/retail-cyberattacks-that-hurt-businesses-2025/</loc>
		<lastmod>2025-12-16T20:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/visibility-in-fortifying-iot-device-security/</loc>
		<lastmod>2025-07-28T19:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/unlocking-smarter-iot-risk-mitigation-using-a-maturity-model-framework/</loc>
		<lastmod>2025-07-24T19:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cyberattacks-hospitality-2023-2025/</loc>
		<lastmod>2026-02-10T20:25:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/ot-security-solutions-a-guide-to-protecting-operational-technology/</loc>
		<lastmod>2025-07-17T22:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/turning-iot-security-challenges-into-strategic-wins-with-risk-prioritization/</loc>
		<lastmod>2025-07-15T17:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-top-5-operational-technology-security-challenges-in-2025/</loc>
		<lastmod>2026-02-10T20:26:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-top-internet-of-things-iot-cybersecurity-breaches-in-2025/</loc>
		<lastmod>2026-02-10T20:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-solutions-and-how-they-protect-connected-devices/</loc>
		<lastmod>2025-07-11T20:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/introducing-iot-patching/</loc>
		<lastmod>2025-07-10T20:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cyberattacks-manufacturing/</loc>
		<lastmod>2025-12-16T20:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-manage-iot-device-configurations-at-scale/</loc>
		<lastmod>2025-06-30T21:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/when-third-party-maintenance-alters-your-iot-device-to-an-unsecured-state/</loc>
		<lastmod>2025-06-30T18:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-a-hardened-baseline-configuration-for-an-iot-device/</loc>
		<lastmod>2025-06-26T20:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-revert-an-iot-device-back-to-a-hardened-state-in-the-event-of-a-ransomware-attack/</loc>
		<lastmod>2026-02-12T19:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/strengthening-iot-security-nist-guidance-on-configuration-control-and-recovery/</loc>
		<lastmod>2026-02-12T19:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/insider-threats-changed-your-device-configuration-heres-how-to-respond/</loc>
		<lastmod>2025-06-17T17:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-well-meaning-device-changes-accidentally-weaken-iot-security/</loc>
		<lastmod>2025-06-12T20:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-meet-iomt-grc-requirements-in-healthcare/</loc>
		<lastmod>2025-06-09T22:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/reducing-risk-for-ot-iot-manufacturing-webinar/</loc>
		<lastmod>2025-06-06T19:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/largest-transportation-and-logistics-cyberattacks/</loc>
		<lastmod>2026-02-12T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-hidden-costs-of-data-collectors-in-iot-ot-and-iomt-security/</loc>
		<lastmod>2025-06-05T20:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-growing-danger-of-ignoring-ip-camera-vulnerabilities/</loc>
		<lastmod>2025-06-03T19:35:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/essential-tips-to-achieve-risk-reduction-in-iomt/</loc>
		<lastmod>2025-05-30T19:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/12-core-areas-of-consideration-you-cant-avoid-when-mitigating-risk-in-iomt/</loc>
		<lastmod>2025-06-27T17:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/four-critical-questions-to-evaluate-your-iomt-security-posture/</loc>
		<lastmod>2025-05-20T22:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/coordinating-stakeholders-across-the-hospital-ecosystem-for-risk-reduction-in-iomt/</loc>
		<lastmod>2025-05-19T18:24:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/five-essential-outcomes-from-a-risk-mitigation-project-in-iomt/</loc>
		<lastmod>2025-05-16T16:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/closing-the-iomt-knowledge-gap-between-htm-and-cybersecurity/</loc>
		<lastmod>2025-05-12T22:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/addressing-essential-challenges-in-healthcare-technology-management-from-staffing-to-skills/</loc>
		<lastmod>2025-05-08T19:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/fortifying-your-network-at-scale-with-bulk-iot-patching/</loc>
		<lastmod>2025-05-06T18:10:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/even-the-aggregated-cve-database-isnt-enough/</loc>
		<lastmod>2025-04-30T17:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cve-aggregation-in-times-of-uncertainty/</loc>
		<lastmod>2025-04-30T17:24:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/stay-ahead-the-power-of-scheduled-iot-patching/</loc>
		<lastmod>2026-02-12T19:15:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/maximize-uptime-and-minimize-vulnerabilities-with-automated-iot-patching/</loc>
		<lastmod>2026-02-12T19:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/managing-the-risks-of-incomplete-vendor-updates/</loc>
		<lastmod>2025-04-18T16:33:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/from-cybersecurity-to-community-impact-how-securing-iomt-devices-inspired-a-blood-donation-journey/</loc>
		<lastmod>2025-04-15T19:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-solve-the-fastest-growing-attack-surface-with-iot-patching/</loc>
		<lastmod>2025-04-10T19:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/asimily-april-2025-mitigating-iot-device-risk-in-2025/</loc>
		<lastmod>2025-04-09T16:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/zero-trust-in-healthcare-when-good-intentions-go-awry/</loc>
		<lastmod>2025-04-08T17:24:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-manage-patches-for-your-entire-iot-fleet/</loc>
		<lastmod>2025-04-04T16:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/how-to-choose-the-right-iomt-security-solution-2025/#new_tab</loc>
		<lastmod>2026-03-10T19:47:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/when-network-segmentation-is-too-slow-to-mitigate-risk/</loc>
		<lastmod>2026-01-21T23:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/infographic-six-iot-iomt-security-workflows-that-can-be-automated-for-efficiency/</loc>
		<lastmod>2025-03-27T19:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/mitigating-the-risks-of-iot-patching/</loc>
		<lastmod>2025-03-31T21:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/2-7-billion-records-exposed-mars-hydros-iot-nightmare-highlights-security-gaps/</loc>
		<lastmod>2025-06-10T19:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/passive-vs-active-scanning-for-iot-what-is-the-difference-and-why-it-matters/</loc>
		<lastmod>2025-03-18T20:56:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-cisos-guide-to-turning-iot-security-into-a-strategic-advantage/</loc>
		<lastmod>2025-03-14T19:52:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-an-all-in-one-platform-is-necessary-for-real-iot-risk-mitigation/</loc>
		<lastmod>2025-03-11T16:16:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/navigating-the-iot-attack-lifecycle-a-comprehensive-approach-to-prevention-mitigation-and-recovery/</loc>
		<lastmod>2025-03-06T19:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/introducing-iot-patching-from-asimily-your-key-to-scaling-risk-mitigation/</loc>
		<lastmod>2025-03-31T21:20:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-and-blood-centers-of-america-partner-to-protect-the-nations-blood-banking-network-from-cyberattacks/</loc>
		<lastmod>2025-06-27T17:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/defend-your-iot-with-device-hardening-tactics-for-a-secure-2025/</loc>
		<lastmod>2025-02-21T18:42:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/revolutionizing-iot-security-with-end-to-end-lifecycle-control/</loc>
		<lastmod>2025-03-07T20:18:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asset-inventory-cybersecurity-the-foundation-you-need/</loc>
		<lastmod>2025-02-13T22:38:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/strengthening-your-supply-chain-proven-ot-and-iiot-cybersecurity-strategies/</loc>
		<lastmod>2025-02-06T18:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-iot-under-cmmc/</loc>
		<lastmod>2025-06-10T19:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/streamline-your-ot-security-procurement-essential-ot-rfp-template-guide/</loc>
		<lastmod>2025-01-28T18:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/master-iomt-security-vendor-selection-a-strategic-rfp-template-for-healthcare-tech-leaders/</loc>
		<lastmod>2025-01-22T23:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/best-practices-for-shielding-blood-banks-from-cyber-predators-in-2025/</loc>
		<lastmod>2026-02-12T19:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/from-farm-to-firewall-protecting-food-manufacturing-in-the-iot-era/</loc>
		<lastmod>2025-01-16T20:16:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/making-healthcare-organizations-more-secure-with-smart-networking-decisions/</loc>
		<lastmod>2025-01-14T21:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/dancing-with-data-harmonizing-device-states-and-relationships-in-iot-security-strategies/</loc>
		<lastmod>2025-01-09T20:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/reviewing-the-state-of-healthcare-cybersecurity-in-2024-10-key-takeaways-from-the-ponemon-institute-report/</loc>
		<lastmod>2025-01-10T22:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/hhs-office-for-civil-rights-proposes-significant-expansion-of-hipaa-security-rule-to-encompass-medical-devices/</loc>
		<lastmod>2024-12-31T03:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/assessing-risks-of-internet-connected-ics-in-critical-sectors/</loc>
		<lastmod>2024-12-13T20:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-patching-paradox-security-challenges-in-distributed-internet-of-things-environments/</loc>
		<lastmod>2024-12-13T20:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/powering-up-the-bold-future-of-cybersecurity-regulations-for-utilities/</loc>
		<lastmod>2024-12-12T19:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-connected-hospitals-key-insights-from-the-cybersecurity-summit/</loc>
		<lastmod>2024-12-13T19:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/medical-device-security-standards-2025-what-hdos-need-to-know/</loc>
		<lastmod>2024-12-05T23:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-successfully-protects-operational-technology-in-nrel-ceca-testing/</loc>
		<lastmod>2024-12-05T17:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-power-of-many-harnessing-healthcare-device-synergy-across-a-multi-location-network/</loc>
		<lastmod>2025-02-05T00:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-ranked-as-the-11th-fastest-growing-cybersecurity-company-in-north-america-on-the-2024-deloitte-technology-fast-500/</loc>
		<lastmod>2025-01-16T23:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/11-common-iot-devices-that-are-vulnerable-to-hacking/</loc>
		<lastmod>2024-11-19T19:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/identifying-lateral-movement-on-your-device-network/</loc>
		<lastmod>2024-11-13T23:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-navigating-the-connected-world/</loc>
		<lastmod>2024-11-07T21:21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/leveraging-the-purdue-model-to-understand-your-organizations-ics-security-needs/</loc>
		<lastmod>2024-11-04T20:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-top-cybersecurity-hacks-in-casinos-and-gaming/</loc>
		<lastmod>2024-10-30T21:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/strong-iot-security-has-become-necessary-to-protect-elections/</loc>
		<lastmod>2024-10-23T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/boost-your-htm-cybersecurity-game-with-the-magic-of-staff-augmentation/</loc>
		<lastmod>2024-10-16T16:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-illusion-of-safety-in-ot-ed-jowett-on-the-realities-of-modern-device-security-challenges/</loc>
		<lastmod>2024-10-29T17:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/safeguarding-smart-buildings-cybersecurity-for-cybersecurity-for-building-automation-systems-bas/</loc>
		<lastmod>2025-04-04T19:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/5-reasons-vulnerability-management-for-iot-isnt-enough/</loc>
		<lastmod>2024-10-02T23:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-drift-stops-here-asimilys-configuration-control-revolutionizes-iot-security/</loc>
		<lastmod>2025-06-10T19:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/four-years-undetected-the-iot-security-lessons-from-raptor-train/</loc>
		<lastmod>2024-10-22T16:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-extreme-weather-events-increase-the-risk-of-cyber-attacks-on-health-systems/</loc>
		<lastmod>2026-02-12T19:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/4-types-of-medical-device-implants-and-their-biggest-security-risks/</loc>
		<lastmod>2026-02-12T19:25:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-ten-cybersecurity-conferences/</loc>
		<lastmod>2026-02-06T21:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-honeypots-matter-in-iot-ot-security/</loc>
		<lastmod>2024-09-11T21:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/infographic-the-state-of-iot-security-2024/</loc>
		<lastmod>2024-09-06T19:16:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/6-reasons-why-the-public-sector-is-a-prime-target-for-cyberattacks/</loc>
		<lastmod>2026-02-12T19:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/medical-device-security-starts-at-the-supply-chain/</loc>
		<lastmod>2026-02-12T19:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/extreme-weather-events-increase-cybersecurity-risks-for-smart-cities/</loc>
		<lastmod>2026-02-12T19:19:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-role-of-iot-in-smart-cities/</loc>
		<lastmod>2024-08-26T20:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-cost-of-upgrading-connected-iomt-devices/</loc>
		<lastmod>2024-08-22T20:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/flawless-program-implementation-is-crucial-to-iomt-security/</loc>
		<lastmod>2024-08-15T19:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/indicators-of-compromise-in-iot/</loc>
		<lastmod>2024-08-14T18:29:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-top-5-trends-takeaways-black-hat-2024/</loc>
		<lastmod>2024-08-12T16:20:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/detect-mitigate-low-slow-cyberattacks-iot/</loc>
		<lastmod>2024-08-08T18:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-iomt-security-helps-with-medical-device-utilization/</loc>
		<lastmod>2024-08-05T19:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/ferc/</loc>
		<lastmod>2024-07-30T17:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/nerc-cip/</loc>
		<lastmod>2024-07-30T16:46:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/medical-device-security-in-germany-an-interview-with-asimilys-arne-trittelvitz/</loc>
		<lastmod>2024-07-30T16:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/integrated-iot-security-accelerates-program-maturity/</loc>
		<lastmod>2025-06-26T22:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/crowdstrike-windows-outage/</loc>
		<lastmod>2024-08-14T18:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/zero-trust-architecture-for-iot-security/</loc>
		<lastmod>2024-07-18T18:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/3-key-security-lessons-from-recent-healthcare-cyber-attacks/</loc>
		<lastmod>2026-02-10T20:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-importance-of-securing-iot-pacemakers-to-increase-patient-safety/</loc>
		<lastmod>2024-07-09T17:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/targeted-remediation-recommendations-iot-security/</loc>
		<lastmod>2025-06-26T22:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-sensor-vulnerabilities/</loc>
		<lastmod>2024-06-27T20:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/exposure-management-strategy-for-cyber-physical-systems/</loc>
		<lastmod>2024-07-23T17:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/vulnerability-management-risk-analysis/</loc>
		<lastmod>2025-11-06T19:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/safeguard-routers-mitigating-iot-security-risks/</loc>
		<lastmod>2024-06-10T13:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-medical-imaging-equipment-a-comprehensive-approach/</loc>
		<lastmod>2024-06-06T17:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-the-mitre-emb3d-framework/</loc>
		<lastmod>2024-06-05T13:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-6-healthcare-cyberattacks-of-may-2024/</loc>
		<lastmod>2026-02-10T20:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/safeguarding-smart-traffic-lights-smart-cities/</loc>
		<lastmod>2024-06-04T13:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-cybersecurity-configuration-tips-for-iot-devices/</loc>
		<lastmod>2025-06-10T19:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/2024-cybersecurity-trends-water-and-wastewater/</loc>
		<lastmod>2024-07-23T17:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/safeguarding-atms-mitigating-iot-security-risks/</loc>
		<lastmod>2024-05-28T13:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-device-security-dora-compliance/</loc>
		<lastmod>2024-05-29T17:09:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/rfid-vulnerabilities-iot-security-challenges/</loc>
		<lastmod>2024-07-23T18:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/us-department-energy-clean-energy-cybersecurity/</loc>
		<lastmod>2024-05-22T17:47:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/emily-bonazellis-clinical-engineering-spotlight/</loc>
		<lastmod>2024-05-22T20:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/targeted-segmentation-manage-iot-risk-10x-faster/</loc>
		<lastmod>2024-05-21T13:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/anthony-phoenixs-journey-to-htm-excellence/</loc>
		<lastmod>2024-05-20T15:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/mitigating-vulnerabilities-in-infusion-pumps/</loc>
		<lastmod>2026-02-12T19:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/ensure-protection-cyber-physical-systems-cps/</loc>
		<lastmod>2024-05-14T16:12:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/exploitability-in-the-wild-vs-exploitability-analysis/</loc>
		<lastmod>2025-06-30T22:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/managing-third-party-iot-security-risk/</loc>
		<lastmod>2024-05-08T17:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/role-of-epss-in-prioritizing-security-threats/</loc>
		<lastmod>2024-05-08T17:23:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-wins-3-cybersecurity-excellence-awards/</loc>
		<lastmod>2024-05-08T14:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/global-infosec-most-innovative-healthcare-award/</loc>
		<lastmod>2024-05-07T16:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/not-another-demo-e43-asimily/</loc>
		<lastmod>2024-05-07T14:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/4-iot-trends-uk-businesses-should-watch-in-2024/</loc>
		<lastmod>2024-05-06T17:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/data-enrichment-the-key-to-minimizing-iot-ot-risk/</loc>
		<lastmod>2024-05-02T13:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/impact-of-cisa-cyber-incident-reporting-rules/</loc>
		<lastmod>2024-05-01T13:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-key-statistics-2024/</loc>
		<lastmod>2026-02-12T19:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/techopedia-corporate-owned-iot-devices-are-high-risk-and-under-siege-2/</loc>
		<lastmod>2024-05-06T17:04:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/pivot-from-direct-to-channel/</loc>
		<lastmod>2024-05-01T13:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/vulnerability-prioritization-iot-security-risk/</loc>
		<lastmod>2025-06-27T16:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/middle-east-hospitals-need-iot-security/</loc>
		<lastmod>2024-04-25T13:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-devices-and-cyber-disaster-recovery/</loc>
		<lastmod>2024-04-18T22:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/dangers-of-iot-breaches-hvac-technology/</loc>
		<lastmod>2024-04-18T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-secolve-iot-security-to-australia/</loc>
		<lastmod>2024-04-17T13:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-requires-effective-forensic-analysis/</loc>
		<lastmod>2024-04-16T13:17:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/necessity-of-continuous-vulnerability-detection/</loc>
		<lastmod>2025-11-06T19:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/smart-tv-security-corporate-data-protection/</loc>
		<lastmod>2024-04-10T14:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-evolution-2024-iiot-product-of-the-year/</loc>
		<lastmod>2024-04-10T14:09:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/cybersecurity-patient-care/</loc>
		<lastmod>2024-04-04T13:21:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-camera-vulnerabilities-exposed/</loc>
		<lastmod>2024-04-04T14:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/change-healthcare-ransomware-proposed-legislation/</loc>
		<lastmod>2026-02-12T19:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/cyber-threats-healthcare-wfed-gov/</loc>
		<lastmod>2024-04-04T13:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-featured-in-crns-2024-iot-50-list/</loc>
		<lastmod>2024-04-01T15:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/4-recent-cyberattacks-government-breach/</loc>
		<lastmod>2025-06-27T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-vulnerabilities-in-building-access-control/</loc>
		<lastmod>2024-03-27T13:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/white-houses-hospital-cybersecurity-budget-2025/</loc>
		<lastmod>2026-02-10T20:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimilys-launch-crn-2024-partner-program-guide/</loc>
		<lastmod>2024-03-25T15:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/limitations-of-digital-trust-labels-iot-security/</loc>
		<lastmod>2026-02-10T20:24:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/manufacturers-must-secure-iot-remote-access-risks/</loc>
		<lastmod>2024-03-19T13:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-it-news-iot-predictions-for-2024/</loc>
		<lastmod>2024-03-18T16:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/analyzing-the-growing-number-of-iiot-device-hacks/</loc>
		<lastmod>2024-03-18T16:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-you-should-know-about-nist-csf-2-0/</loc>
		<lastmod>2024-04-01T17:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/printers-pose-hidden-iot-security-risks/</loc>
		<lastmod>2024-05-22T14:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-gold-globee-for-vulnerability-management/</loc>
		<lastmod>2024-03-11T10:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/egt-selected-as-asimilys-gcc-partner/</loc>
		<lastmod>2024-03-07T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cybersecurity-ransomware-to-medical-devices/</loc>
		<lastmod>2024-03-05T15:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-challenges-in-2024/</loc>
		<lastmod>2026-02-12T19:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/renaissance-irish-distribution-partner-asimily/</loc>
		<lastmod>2024-02-28T20:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/rising-cyber-risks-from-accelerated-use-of-iot/</loc>
		<lastmod>2024-02-27T18:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/utilization-data-improves-hospital-revenue/</loc>
		<lastmod>2024-04-01T15:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-and-it2trust-bring-iot-security-to-the-nordics/</loc>
		<lastmod>2024-02-21T16:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/understanding-new-sec-cyber-risk-disclosure-rules/</loc>
		<lastmod>2024-02-20T17:26:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/4-cyberattacks-universities-and-colleges/</loc>
		<lastmod>2026-02-12T19:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/life-sciences-iot-security-cyberattacks/</loc>
		<lastmod>2026-02-12T19:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-is-a-top-concern-in-2024/</loc>
		<lastmod>2024-02-14T18:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/st-lawrence-health-case-study/</loc>
		<lastmod>2024-02-13T15:11:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cyber-risk-quantification-financial-centric/</loc>
		<lastmod>2024-02-12T14:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-hhs-hicp-compliance/</loc>
		<lastmod>2024-05-01T14:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-evolution-opportunities-for-isvs/</loc>
		<lastmod>2024-02-08T15:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/iot-device-security-in-2024-the-high-cost-of-doing-nothing#new_tab</loc>
		<lastmod>2024-12-31T17:38:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/harness-the-power-of-iot-with-accurate-inventory/</loc>
		<lastmod>2025-02-07T23:24:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/5-network-monitoring-best-practices-for-2024/</loc>
		<lastmod>2024-01-29T17:19:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/omb-and-what-it-means-for-securing-iot-devices/</loc>
		<lastmod>2026-02-12T19:19:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/smart-cities-need-smart-iot-security/</loc>
		<lastmod>2024-02-05T21:11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/industrial-iiot-it-ot-convergence-and-security-risks/</loc>
		<lastmod>2024-02-05T21:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcareittoday-iomt-cybersecurity-predictions/</loc>
		<lastmod>2024-01-08T17:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/betanews-iot-predictions-for-2024/</loc>
		<lastmod>2024-10-16T18:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/amiviz-asimily-partner-middle-east-iot-security/</loc>
		<lastmod>2024-01-04T15:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/casinos-face-new-iot-security-threats/</loc>
		<lastmod>2023-12-20T16:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/your-guide-to-industrial-iot-security/</loc>
		<lastmod>2026-02-12T19:23:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/new-sec-cyber-risk-disclosure-rules/</loc>
		<lastmod>2024-05-03T17:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/6-common-iiot-cyberattacks-manufacturers/</loc>
		<lastmod>2023-12-11T15:34:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-predictions-for-2024-and-beyond/</loc>
		<lastmod>2026-02-10T20:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-choose-the-right-iomt-security-vendor/</loc>
		<lastmod>2026-02-10T20:15:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/increasing-manufacturers-iiot-cyberattacks/</loc>
		<lastmod>2023-12-06T14:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/most-innovative-security-product-cyber-security-awards/</loc>
		<lastmod>2023-12-04T21:47:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-cameras-are-vulnerable-cyberattacks/</loc>
		<lastmod>2023-11-30T14:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/betanews-qa-securing-healthcare-devices/</loc>
		<lastmod>2023-11-30T14:15:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/track-and-prioritize-real-world-vulnerabilities/</loc>
		<lastmod>2023-11-29T17:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-device-security-incident-response/</loc>
		<lastmod>2023-12-28T16:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/understanding-the-nis2-for-iot-risk-management/</loc>
		<lastmod>2023-11-28T17:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/epss-and-its-role-in-vulnerability-management/</loc>
		<lastmod>2025-11-06T19:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/crn-2023-stellar-startup/</loc>
		<lastmod>2023-12-04T21:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-is-shadow-it-a-major-security-challenge/</loc>
		<lastmod>2024-07-25T21:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-deloitte-technology-fast-500/</loc>
		<lastmod>2024-05-07T14:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/pay-attention-cyber-trust-mark/</loc>
		<lastmod>2023-12-04T21:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-named-25-hottest-iot-companies/</loc>
		<lastmod>2023-12-04T21:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/vulnerability-prioritization-for-iomt-security/</loc>
		<lastmod>2025-06-26T22:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-drive-iot-security-resilience/</loc>
		<lastmod>2023-11-29T07:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/gov-medical-device-cybersecurity/</loc>
		<lastmod>2023-12-04T21:49:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/applying-cvss-to-medical-devices/</loc>
		<lastmod>2023-11-29T07:01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cyber-defense-top-innovator-healthcare-iot/</loc>
		<lastmod>2023-12-04T21:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cybersecurity-compliance/</loc>
		<lastmod>2023-11-29T07:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-devices-are-easy-targets-for-cyberattacks/</loc>
		<lastmod>2023-11-29T07:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/positive-impact-cyber-trust-mark-on-iomt/</loc>
		<lastmod>2023-12-04T21:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-mitigate-the-risk-of-device-sprawl/</loc>
		<lastmod>2023-11-30T16:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/medical-device-patching-management/</loc>
		<lastmod>2023-11-29T07:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-the-mitre-attack-framework/</loc>
		<lastmod>2025-01-21T20:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-launches-iot-security-partner-program/</loc>
		<lastmod>2023-11-29T07:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-are-sboms-and-why-you-should-care/</loc>
		<lastmod>2024-04-05T15:59:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/5-critical-iot-security-challenges/</loc>
		<lastmod>2024-07-23T17:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/5-tips-for-protecting-connected-medical-devices/</loc>
		<lastmod>2023-12-04T21:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iomt-security-threat-detection-incident-response/</loc>
		<lastmod>2025-02-07T23:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/decommissioning/</loc>
		<lastmod>2023-09-20T18:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/chime/</loc>
		<lastmod>2023-09-20T18:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ttp/</loc>
		<lastmod>2023-09-20T18:14:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/protocol/</loc>
		<lastmod>2023-09-20T18:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/device-procurement/</loc>
		<lastmod>2023-09-20T18:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/patch-management/</loc>
		<lastmod>2023-09-20T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ransomware-attacks/</loc>
		<lastmod>2023-09-20T18:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/phishing/</loc>
		<lastmod>2023-09-20T18:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ddos/</loc>
		<lastmod>2023-09-20T18:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/sdlc/</loc>
		<lastmod>2023-09-20T18:12:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/firewall/</loc>
		<lastmod>2023-09-20T18:12:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ids/</loc>
		<lastmod>2023-09-20T18:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/tcp/</loc>
		<lastmod>2023-09-20T18:11:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/udp/</loc>
		<lastmod>2023-09-20T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/asset-inventory/</loc>
		<lastmod>2023-09-20T18:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/device-visibility/</loc>
		<lastmod>2023-09-20T18:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/device-utilization/</loc>
		<lastmod>2023-09-20T18:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/vulnerability-mitigation/</loc>
		<lastmod>2023-09-20T18:07:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/vulnerability-score-vs-risk-score/</loc>
		<lastmod>2023-09-20T18:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/dos/</loc>
		<lastmod>2023-09-20T18:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/xdr/</loc>
		<lastmod>2023-09-20T18:05:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/csf/</loc>
		<lastmod>2023-09-20T18:05:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/microsegmentation/</loc>
		<lastmod>2023-09-20T18:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/macrosegmentation/</loc>
		<lastmod>2023-09-20T18:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/network-segmentation/</loc>
		<lastmod>2026-03-02T21:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/zero-trust/</loc>
		<lastmod>2023-09-20T18:04:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/bms/</loc>
		<lastmod>2023-09-20T18:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/tjc/</loc>
		<lastmod>2023-09-20T18:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/sso/</loc>
		<lastmod>2023-09-20T18:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/soc/</loc>
		<lastmod>2023-09-20T18:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/soar/</loc>
		<lastmod>2023-09-20T18:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/siem/</loc>
		<lastmod>2023-09-20T18:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ot/</loc>
		<lastmod>2023-09-20T18:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/passive-vs-active-threats/</loc>
		<lastmod>2023-11-28T15:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/nist/</loc>
		<lastmod>2023-09-20T17:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/nac/</loc>
		<lastmod>2023-09-20T17:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/mitre-attck-framework/</loc>
		<lastmod>2023-09-20T17:57:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/mitre/</loc>
		<lastmod>2023-09-20T17:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/mds2/</loc>
		<lastmod>2023-09-20T17:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/mac/</loc>
		<lastmod>2023-09-20T17:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/low-slow-attack/</loc>
		<lastmod>2023-09-20T17:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/itsm/</loc>
		<lastmod>2023-09-20T19:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ipam/</loc>
		<lastmod>2026-03-04T20:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/iot/</loc>
		<lastmod>2023-09-20T17:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/iomt/</loc>
		<lastmod>2023-09-20T17:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/iolt/</loc>
		<lastmod>2023-09-20T17:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/htm/</loc>
		<lastmod>2023-09-20T17:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/first/</loc>
		<lastmod>2023-09-20T19:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/epss/</loc>
		<lastmod>2023-09-20T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ehr/</loc>
		<lastmod>2023-09-27T19:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/edr/</loc>
		<lastmod>2023-09-20T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/eam/</loc>
		<lastmod>2023-09-20T17:28:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/dnv/</loc>
		<lastmod>2023-09-27T19:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/dhcp/</loc>
		<lastmod>2023-09-20T17:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/cvss/</loc>
		<lastmod>2023-09-20T17:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/cves/</loc>
		<lastmod>2023-09-20T17:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/cmms/</loc>
		<lastmod>2023-09-20T17:27:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/cmdb/</loc>
		<lastmod>2023-09-20T17:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/ce/</loc>
		<lastmod>2023-09-20T17:26:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/api/</loc>
		<lastmod>2023-09-20T17:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-detect-if-a-device-has-been-compromised/</loc>
		<lastmod>2023-09-20T17:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-capture-data-from-a-device-that-has-suspicious-behavior/</loc>
		<lastmod>2023-09-20T17:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-know-if-a-device-is-subject-to-a-recall/</loc>
		<lastmod>2023-09-28T23:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-are-recalls-handled-for-iot-or-iomt-devices/</loc>
		<lastmod>2023-09-20T17:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-an-edge-processor/</loc>
		<lastmod>2023-09-20T17:20:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-a-1u-rack/</loc>
		<lastmod>2023-09-20T17:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-a-network-tap/</loc>
		<lastmod>2023-09-20T17:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-a-span-port/</loc>
		<lastmod>2023-09-20T17:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-micro-segmentation/</loc>
		<lastmod>2023-09-20T17:13:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-segment-devices-in-my-network/</loc>
		<lastmod>2023-09-20T17:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-patch-a-device/</loc>
		<lastmod>2023-09-20T17:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-fix-a-security-vulnerability-on-a-device-what-if-there-is-no-patch-available/</loc>
		<lastmod>2023-09-20T17:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-supply-chain-cyber-threats/</loc>
		<lastmod>2023-09-20T17:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-advanced-persistent-threats-apts/</loc>
		<lastmod>2023-09-20T17:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-healthcare-organizations-protect-against-cyber-threats-targeting-telemedicine/</loc>
		<lastmod>2023-09-20T17:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-cyber-threats-targeting-industrial-control-systems-ics/</loc>
		<lastmod>2023-09-20T17:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-cyber-threats-targeting-mobile-devices/</loc>
		<lastmod>2023-09-20T17:05:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-cyber-threats-targeting-internet-of-things-iot-devices/</loc>
		<lastmod>2023-09-20T17:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-secure-their-cloud-based-systems-and-data/</loc>
		<lastmod>2023-09-20T17:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-malware-and-ransomware-attacks/</loc>
		<lastmod>2023-09-20T17:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-secure-their-networks-and-devices-from-unauthorized-access/</loc>
		<lastmod>2023-09-20T17:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-are-the-best-practices-for-incident-response-and-recovery-in-the-event-of-a-cyberattack/</loc>
		<lastmod>2023-09-20T16:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-organizations-protect-against-phishing-and-social-engineering-attacks/</loc>
		<lastmod>2023-09-20T16:58:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-healthcare-organizations-ensure-compliance-with-regulations-such-as-hipaa/</loc>
		<lastmod>2023-09-20T16:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-can-healthcare-organizations-protect-patient-data-from-cyberattacks/</loc>
		<lastmod>2023-09-20T16:57:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-the-role-of-employee-education-and-training-in-cybersecurity/</loc>
		<lastmod>2023-09-20T16:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-are-the-main-cyber-threats-facing-the-healthcare-industry/</loc>
		<lastmod>2023-09-20T16:56:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-ot-asset-management/</loc>
		<lastmod>2023-09-20T16:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-many-iot-devices-are-there/</loc>
		<lastmod>2023-09-20T16:55:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-are-the-major-concerns-regarding-iot-devices/</loc>
		<lastmod>2023-09-20T16:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-is-healthcare-cybersecurity-different-from-other-industries/</loc>
		<lastmod>2023-09-20T16:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-hackers-breach-healthcare-cybersecurity/</loc>
		<lastmod>2023-09-20T16:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-i-protect-my-medical-data/</loc>
		<lastmod>2023-09-20T16:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-is-healthcare-cybersecurity/</loc>
		<lastmod>2023-09-20T16:50:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/who-makes-iot-devices/</loc>
		<lastmod>2023-09-20T16:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-iot-devices-connect-to-the-internet/</loc>
		<lastmod>2023-09-20T16:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-iot-devices-work/</loc>
		<lastmod>2023-09-20T16:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-are-iot-devices-controlled/</loc>
		<lastmod>2023-09-20T16:47:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-iot-devices-communicate/</loc>
		<lastmod>2023-09-20T16:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/will-generative-ai-impact-iot-cybersecurity/</loc>
		<lastmod>2023-11-29T07:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-security-doing-nothing-carries-a-high-cost/</loc>
		<lastmod>2026-02-12T19:26:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/dnv-recommended-security-guidelines/</loc>
		<lastmod>2026-02-12T19:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/job/customer-success-manager/</loc>
		<lastmod>2024-12-02T21:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/job/sr-engineer-ui/</loc>
		<lastmod>2025-06-19T01:08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/job/senior-software-engineer/</loc>
		<lastmod>2025-08-11T16:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-iot-security-integration-capabilities/</loc>
		<lastmod>2025-06-27T17:37:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/methodist-le-bonheur-healthcare/</loc>
		<lastmod>2023-11-29T06:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-device-inventory-needs-real-time-accuracy/</loc>
		<lastmod>2023-11-29T07:05:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-wannacry-legacy-securing-medical-devices/</loc>
		<lastmod>2023-11-29T07:06:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iomt-third-party-risk-management/</loc>
		<lastmod>2023-11-29T07:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/new-report-hospitals-iomt-cybersecurity-risk/</loc>
		<lastmod>2023-11-29T07:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-joint-commission-recommended-action/</loc>
		<lastmod>2025-02-07T23:33:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/total-cost-of-ownership-analysis-on-connected-device-cybersecurity-risk-1/#new_tab</loc>
		<lastmod>2024-02-15T22:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/identifying-security-kpis-for-healthcare/</loc>
		<lastmod>2026-02-12T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/agentless-monitoring/</loc>
		<lastmod>2023-08-11T21:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/aehis/</loc>
		<lastmod>2023-08-11T21:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/glossary/aami/</loc>
		<lastmod>2023-08-11T21:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/the-state-of-reverse-tunneling-in-2023/</loc>
		<lastmod>2023-11-29T07:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-many-healthcare-cybersecurity-breaches-occur-each-year/</loc>
		<lastmod>2023-08-23T19:53:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/do-iot-devices-pose-a-greater-risk-than-other-computing-devices-on-a-network/</loc>
		<lastmod>2023-08-23T19:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/why-are-iot-devices-vulnerable-to-risk/</loc>
		<lastmod>2023-09-20T16:39:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-are-iot-devices-protected-from-hackers/</loc>
		<lastmod>2023-08-23T19:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-are-examples-of-iot-devices/</loc>
		<lastmod>2023-09-20T16:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-do-iot-devices-update-remotely/</loc>
		<lastmod>2023-09-20T16:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/how-to-secure-iot-devices/</loc>
		<lastmod>2023-09-20T16:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/what-are-iot-devices/</loc>
		<lastmod>2023-09-20T16:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/faq/why-is-iot-security-important/</loc>
		<lastmod>2023-09-20T16:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-hospital-cybersecurity-challenges-best-practices-in-the-middle-east#new_tab</loc>
		<lastmod>2023-11-29T06:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/case-study-memorialcare/</loc>
		<lastmod>2023-11-29T06:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-security-summary-report/</loc>
		<lastmod>2023-11-29T07:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/medical-device-security-405d-hicp-compliance/</loc>
		<lastmod>2026-02-10T20:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/htm-cybersecurity-to-defend-healthcare/</loc>
		<lastmod>2024-07-23T17:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-cybersecurity-budget/</loc>
		<lastmod>2023-11-29T07:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/understanding-epss-and-lomt/</loc>
		<lastmod>2023-11-29T07:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-announces-partnership-with-handle-global/</loc>
		<lastmod>2023-11-29T07:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/managing-third-party-risk/</loc>
		<lastmod>2023-11-29T06:49:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/securing-medical-devices-throughout-the-lifecycle/</loc>
		<lastmod>2023-11-29T07:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/htm-spotlight-paul-moore-cybersecurity-hero/</loc>
		<lastmod>2023-11-29T07:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/htm-spotlight-rudy-flores-an-htm-hero/</loc>
		<lastmod>2024-03-06T14:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/strategies-to-address-the-htm-cybersecurity-staffing-shortage/</loc>
		<lastmod>2023-11-29T06:49:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/mitigating-iot-vulnerabilities-in-healthcare/</loc>
		<lastmod>2023-11-29T07:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/traditional-healthcare-cybersecurity-failing/</loc>
		<lastmod>2023-11-29T07:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/holistic-iomt-risk-remediation-strategy/</loc>
		<lastmod>2023-11-29T07:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/policy-based-action-in-iot-security/</loc>
		<lastmod>2023-11-29T07:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/minimize-iot-medical-device-vulnerabilities/</loc>
		<lastmod>2023-11-29T07:12:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/improve-universities-iot-security-risk/</loc>
		<lastmod>2026-02-12T19:21:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/grading-phishing-scam-made-on-a-cybersecurity-co/</loc>
		<lastmod>2026-02-10T20:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/intelligent-health-tech-ciso-lessons-from-the-clop-ransomware-attack-targeting-healthcare-data/</loc>
		<lastmod>2023-11-29T07:12:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/upgrading-or-replacing-medical-devices/</loc>
		<lastmod>2023-11-29T07:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/hospitals-must-embrace-iomt-device-security/</loc>
		<lastmod>2023-11-29T07:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/harden-devices-without-a-nac/</loc>
		<lastmod>2023-11-29T07:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-the-omnibus-bill-means-for-medical-devices-and-what-to-know/</loc>
		<lastmod>2023-11-29T07:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar/henry-ford-health-case-study-asimily-extreme-networks/</loc>
		<lastmod>2023-11-29T06:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/common-healthcare-iot-devices-security-risks/</loc>
		<lastmod>2023-11-29T07:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/esecurity-planet-best-vulnerability-management-tools-and-solutions/</loc>
		<lastmod>2023-11-29T06:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/targeted-segmentation/</loc>
		<lastmod>2024-04-12T18:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/forbes-shankar-somasundaram-why-healthcare-organizations-desperately-need-incident-response/</loc>
		<lastmod>2023-11-29T07:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/average-cost-of-a-life-science-data-breach-is-5m/</loc>
		<lastmod>2023-11-29T07:14:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar/asimily-cisco-ise/</loc>
		<lastmod>2024-12-31T18:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/case-study-tufts-medicine/</loc>
		<lastmod>2023-11-29T06:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/asimily-and-the-nist-alignment-1/#new_tab</loc>
		<lastmod>2024-02-15T22:07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/introducing-new-asimily-risk-simulations/</loc>
		<lastmod>2024-10-31T22:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar/beyond-zero-trust-8-steps-to-holistic-iomt-security/</loc>
		<lastmod>2023-11-29T06:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/government-inaction-adds-pressure-to-iomt-device-and-data-security/</loc>
		<lastmod>2023-11-29T07:15:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/effectively-communicating-the-value-of-iomt-security/</loc>
		<lastmod>2023-11-29T06:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-technology-predictions-for-2023/</loc>
		<lastmod>2023-11-29T07:15:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/asimily-beyond-zero-trust-ebook-new-2/#new_tab</loc>
		<lastmod>2024-02-15T22:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-is-risk-based-vulnerability-management/</loc>
		<lastmod>2023-11-29T07:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/forensic-analysis-guide-for-iomt-cybersecurity/</loc>
		<lastmod>2023-11-29T07:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/five-reasons-why-hdos-expect-a-major-cyberattack/</loc>
		<lastmod>2023-11-29T07:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/combating-medical-iot-device-security-risks/</loc>
		<lastmod>2023-11-29T07:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/simily-announces-seven-2022-award-wins-for-excellence-in-iot-and-healthcare-cybersecurity/</loc>
		<lastmod>2023-11-29T07:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-medical-devices-cybersecurity-strategies/</loc>
		<lastmod>2025-07-28T21:03:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-wins-multiple-cybersecurity-awards/</loc>
		<lastmod>2026-02-10T20:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-org-risk-score/</loc>
		<lastmod>2023-11-29T07:17:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/iomt-cybersecurity-essentials/</loc>
		<lastmod>2023-11-29T06:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/security-risk-capital-planning/</loc>
		<lastmod>2023-11-29T06:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/using-a-building-management-system-in-healthcare-guide-to-cybersecurity-solutions/</loc>
		<lastmod>2026-02-10T20:20:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iomt-inventory-management-cybersecurity/</loc>
		<lastmod>2023-11-29T07:17:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/cybersecurity-awareness-david-finn/</loc>
		<lastmod>2023-11-29T06:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/a-case-for-securing-medical-devices-across-their-lifecycle/</loc>
		<lastmod>2023-11-29T07:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/combating-security-risks-is-especially-tough-with-medical-iot-devices/</loc>
		<lastmod>2023-11-29T07:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/security-challenges-for-networked-medical-devices/</loc>
		<lastmod>2023-11-29T07:18:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/cisos-medical-device-security-risk-assessment/</loc>
		<lastmod>2025-06-23T19:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/3-fundamentals-of-building-an-effective-iomt-security-strategy/</loc>
		<lastmod>2025-06-27T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/beat-these-common-edge-computing-challenges/</loc>
		<lastmod>2023-11-29T07:19:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-device-security-vulnerability-management/</loc>
		<lastmod>2024-01-12T14:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/cybersecurity-awareness-experts/</loc>
		<lastmod>2023-11-29T06:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/enhancing-iomt-procurement-decisions/</loc>
		<lastmod>2023-11-29T07:29:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/challenges-of-medical-device-cybersecurity/</loc>
		<lastmod>2023-11-29T07:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/cybersecurity-center-of-excellence/</loc>
		<lastmod>2023-11-29T07:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-reports-165-revenue-growth-and-expansion-of-team/</loc>
		<lastmod>2023-11-29T07:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-wins-2022-iot-evolution-product-of-the-year-award-for-innovation-in-iot-security-and-risk-remediation/</loc>
		<lastmod>2023-11-29T07:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-announces-memorialcare-investment/</loc>
		<lastmod>2023-11-29T07:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-ranks-170-on-inc5000-list2/</loc>
		<lastmod>2023-11-29T07:21:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/secutech-protect-internet-of-medical-things-devices/</loc>
		<lastmod>2023-11-29T07:21:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/edge-computing-4-key-security-issues-for-cios-to-prioritize/</loc>
		<lastmod>2023-11-29T07:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/edge-computing-4-pillars-for-cios-and-it-leaders/</loc>
		<lastmod>2023-11-29T07:23:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/safety-detectives-qa-with-asimily/</loc>
		<lastmod>2023-11-29T07:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/how-to-ask-for-a-cybersecurity-budget/</loc>
		<lastmod>2023-11-29T07:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/howto-approach-iomt-security-and-risk-management/</loc>
		<lastmod>2023-12-04T21:51:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/forbes_expert_panel_16_telling_metrics_tech_leaders/</loc>
		<lastmod>2023-11-29T07:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/asimily-iomt-cybersecurity-webinar-series-2/</loc>
		<lastmod>2023-11-29T07:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/webinar-and-podcast/examining-iomt-vulnerability-management-incident-response/</loc>
		<lastmod>2025-01-06T01:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/what-are-mds2s-and-why-should-you-care/</loc>
		<lastmod>2024-02-21T21:58:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/capital-planning-through-utilization-monitoring/</loc>
		<lastmod>2024-05-29T18:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/putting-patients-first-by-accelerating-vulnerability-management-of-iomt/</loc>
		<lastmod>2023-11-29T07:25:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/iot-device-security-top-4-ways-to-secure-your-healthcare-iot-devices/</loc>
		<lastmod>2024-07-10T22:38:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-priorities-healthcare/</loc>
		<lastmod>2023-11-29T07:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/why-healthcare-is-prime-target-for-cyberattacks/</loc>
		<lastmod>2024-02-06T15:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/top-10-tips-for-healthcare-cybersecurity/</loc>
		<lastmod>2023-11-29T07:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/patching-medical-devices-security/</loc>
		<lastmod>2026-02-12T19:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/healthcare-cybersecurity-is-a-serious-concern/</loc>
		<lastmod>2024-07-23T17:56:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://asimily.com/blog/asimily-iot-benefits-in-healthcare/</loc>
		<lastmod>2025-06-27T17:37:17+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
