<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.hawk.io/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/escalating-cyberthreats-associated-with-russia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/cd0dd818-97f5-4934-9466-d39028ea0b91/Digital+HAWK+Eye+-+high+vignette.jpg</image:loc>
      <image:title>HAWK Blog - Escalating CyberThreats Associated With Russia/Ukraine Confrontation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/detecting-windows-printernightmare-bug-exploit-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628899624668-8BI6F1QGJHM89Q30O1Y2/PriinterNightmare.png</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code</image:title>
      <image:caption>Jason Wheeler, VP Customer Service of HAWK.io, discusses his approach to creating detection rules for the PrinterNightmare exploit. He will also discuss what to look for in the raw Windows event logs, and demonstrate the time saving benefits of HAWK vTTAC™ data enrichment for automatically capturing critical information needed for efficient digital forensics and incident response (DFIR).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628899305934-DC8PT0FCVFMZCB4XOPWR/printernightmare+exploit.png</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628898968701-AE09DYSD1Y41U3J20I0X/printernightmare+Windows+event+log.png</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628884622074-SMMWFG7RUGCA3SBQJHTS/printernightmare+github+exploit+code.png</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628899396340-XZ8XASGG6IFMVHG1II8T/prrinternightmare+HAWKio+log.png</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1629400166701-G1OZI1UWOOEY3PVTMRDV/jason+blog.jpg</image:loc>
      <image:title>HAWK Blog - Detecting Windows PrinterNightmare Bug Exploit Code - Make it stand out</image:title>
      <image:caption>Jason Wheeler, VP Customer Services</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/unicode-reflection-event-null-byte-injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1629142438670-WRMKDVQ7E4CXKQJHLWPD/shutterstock_479414851.jpg</image:loc>
      <image:title>HAWK Blog - Unicode Reflection - Event Null Byte Injection</image:title>
      <image:caption>HAWK experts look at “Log Jam”, the latest Unicode data reflection exploit. How they detected it’s presence and how HAWK.io MDR can complement existing EDR deployments by providing missing telemetry data critical to efficient and effective SOAR efforts.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628531191880-ACUHZUSP45APXD8FFQHA/2021-08-09_13-45-12.png</image:loc>
      <image:title>HAWK Blog - Unicode Reflection - Event Null Byte Injection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628532880202-TR0IYIF2FF984UI6OUZ3/2021-08-09_14-13-41.png</image:loc>
      <image:title>HAWK Blog - Unicode Reflection - Event Null Byte Injection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628533433932-ZPR54TQ3GIP570W33WK0/2021-08-09_14-23-14.png</image:loc>
      <image:title>HAWK Blog - Unicode Reflection - Event Null Byte Injection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1629400519830-2EQCFZY7E5TWIM6SGV2B/jason+blog.jpg</image:loc>
      <image:title>HAWK Blog - Unicode Reflection - Event Null Byte Injection - Make it stand out</image:title>
      <image:caption>Jason Wheeler, VP Customer Services</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/solving-rogue-device-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1628091106403-KQ1X9RC0SKKOZZ5W6MPN/shutterstock_510275821.jpg</image:loc>
      <image:title>HAWK Blog - Solving Rogue Device Detection and User Permission Investigation with Real-Time Data Enrichment and Analysis</image:title>
      <image:caption>Tim Shelton, CTO/Founder of HAWK Network Defense, aka redsand in the hacker community, will explore the core components necessary to drive efficiency and effectiveness of Security Orchestration and Response (SOAR). He will also discuss the requirements to build organizational trust in the processes from incident creation, validation, prioritization, and finally to response. Because the holy grail of SOAR is automated SOAR. There are many hurdles for people, processes, and technology must clear to win the race.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1629400707882-0EDR5NMXEBIB6RCIEC86/tim+blog.jpg</image:loc>
      <image:title>HAWK Blog - Solving Rogue Device Detection and User Permission Investigation with Real-Time Data Enrichment and Analysis - Make it stand out</image:title>
      <image:caption>Tim Shelton, Founder and CTO</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/tag/emerging+threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.hawk.io/blog/tag/announcement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.hawk.io/cloud-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-07-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598227756-EPJYSVP0KDRYN2Y6QL29/Technology-Dollar-Sign.png</image:loc>
      <image:title>Cloud Monitoring</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598227760-ALDAGU3Y44HSHXEEE7YT/Hybrid+Cloud+2.jpg</image:loc>
      <image:title>Cloud Monitoring</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598227763-04RCO9RZPJ38ZQGEQ2YI/Multi-Public+Cloud.jpg</image:loc>
      <image:title>Cloud Monitoring</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598227766-3ODD0DXWGXPU6DBZSEEZ/Cloud+Challenges+5.png</image:loc>
      <image:title>Cloud Monitoring</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598230866-27YOEHHTLA62FHPVRPR6/HAWK+Network+Defense+Fabricon_with_reflection.png</image:loc>
      <image:title>Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/technology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598210618-B7H4P390B93JOZENMQB9/HAWKio+MDR+Diagram.png</image:loc>
      <image:title>Technology</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598233595-EYSYG8EQ0MZANHDE8C1R/HAWK+Network+Defense+Fabricon_with_reflection.png</image:loc>
      <image:title>About - HAWK.io is  the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company</image:title>
      <image:caption>Our Mission: Enable security organizations of all sizes to mature their cyber practice through automation using the HAWK Technology Stack HAWK.io enables organizations of all sizes to rapidly mature their cyber practice through automation. Security organizations have longed been tasked with multiple roles when deploying legacy SIEM solutions. From procuring and managing the necessary infrastructure to ensuring all devices are properly reporting to the traditional SOC analyst functions that included incident investigations and response. Customers need a single solution to automate the entire process. HAWK.io provides all of this through our Cloud Solution allowing companies of all size to increase their time to efficiency as well as rapidly maturing their cyber practice HAWK is Headquartered in Dallas, TX and was founded and built by seasoned security executives and veterans from ISS Internet Security Systems, e-Security, Citadel Security Software and ACS.   Why the Term BDSA Big Data Security Analytics? HAWK uses the term BDSA because it defines exactly what we do. Big Data has always been a critical attribute when ingesting large amounts of machine data. Rather that using correlation rules that need to be tuned, tweaked or customized, HAWK uses a combination of machine learning and artificial intelligence as well as analytics across users, assets and applications.  By using this patented methodology HAWK delivers accurate insight into true and prioritized security incidents.  HAWK.io - Fully Automated MDR in the Cloud Incident response has been a critical barrier in allowing companies of all sizes mature their cyber practices. Too often, organizations have relied on seasoned security practitioners to make critical decisions without enough information. HAWK.io integrated technology stack includes BDSA, vTTAC for data enrichment and HAWK SOAR. HAWK MDR platform delivers automated incident investigations, artifact gathering and accurate incident response. This allows even the smallest of security teams to scale effectively.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598233598-0CWF17252608M3B6MZXQ/davidharris.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598233603-VYP54O8HEUZ6RPSWIELB/tim.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598233611-I0PIC80DO2RAP69VL3AJ/reedharrison.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598233615-F2ZBO3VL6HKD1V5JBAKT/chrisgummer.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/customers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598216867-7YVGD9EQP2SE3JOM4EE1/HAWK+Customers.jpg</image:loc>
      <image:title>Customers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598213621-GPNEL2MZSKP0JKHLYYU4/HAWK+Partners.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598236049-CUKLZZFAPY29JAYZHLFU/HAWK+Network+Defense+Fabricon.png</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/solutions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598206260-M5GPG0ILSL2NOH07WM1I/HAWK+Network+Defense+Fabricon_with_reflection.png</image:loc>
      <image:title>Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/98b0e959-e1fb-456b-8b54-6828f779e855/HAWK+CAI+-+Image+-+Transparent.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/80dd796a-4412-4327-bb7b-b4998ac02f5f/20250126-image+%284%29-topaz-sharpen-denoise.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/afc36079-a125-4f9c-9045-1bcdf6948f20/Steve+Z+headshot.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/solutions-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/1618598206260-M5GPG0ILSL2NOH07WM1I/HAWK+Network+Defense+Fabricon_with_reflection.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/home-1-1-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/7c77c31c-5632-4177-84ee-49a3afc05598/HAWK+Network+Defense+Fabricon+-+square.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/80dd796a-4412-4327-bb7b-b4998ac02f5f/20250126-image+%284%29-topaz-sharpen-denoise.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/afc36079-a125-4f9c-9045-1bcdf6948f20/Steve+Z+headshot.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.hawk.io/home-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/98b0e959-e1fb-456b-8b54-6828f779e855/HAWK+CAI+-+Image+-+Transparent.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/80dd796a-4412-4327-bb7b-b4998ac02f5f/20250126-image+%284%29-topaz-sharpen-denoise.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6079d93d8f4933733ff9cac0/afc36079-a125-4f9c-9045-1bcdf6948f20/Steve+Z+headshot.jpg</image:loc>
    </image:image>
  </url>
</urlset>

