<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    
    <url>
        <loc>https://www.3rdwave.io/about-us</loc>
        <lastmod>2026-04-08</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/blog</loc>
        <lastmod>2026-04-02</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/case-studies</loc>
        <lastmod>2026-04-06</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/contactus</loc>
        <lastmod>2026-04-02</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/cyber-risk-protection</loc>
        <lastmod>2026-04-08</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/managed-detection-response</loc>
        <lastmod>2026-04-06</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/security-awareness-training</loc>
        <lastmod>2026-04-05</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/vciso</loc>
        <lastmod>2026-04-04</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/vulnerability-pen-testing</loc>
        <lastmod>2026-04-05</lastmod>
    </url><url>
        <loc>https://www.3rdwave.io/</loc>
    </url><url>
        <loc>https://www.3rdwave.io/website/info</loc>
    </url><url>
        <loc>https://www.3rdwave.io/jobs</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/feed</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/denied-why-your-company-was-refused-cyber-insurance-and-what-it-really-means-9</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/can-we-insure-this-8</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/making-risk-management-a-team-sport-7</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/risk-management-through-the-lens-of-insurability-6</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/security-liability-and-recovery-as-a-risk-value-chain-5</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/the-risk-management-lifecycle-outgrew-cybersecurity-4</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/from-alerts-to-verdicts-the-structural-shift-in-enterprise-security-3</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/ai-is-transforming-the-business-faster-than-security-can-adapt-2</loc>
    </url><url>
        <loc>https://www.3rdwave.io/blog/third-wave-blog-1/why-security-providers-like-third-wave-matter-more-than-ever-1</loc>
    </url>
</urlset>