<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.legionsecurity.ai</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/about</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/privacy</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/contact</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/trust-center</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/resources</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/search</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/learning-mode</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/guided-mode</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/autonomous-mode</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/demo-thank-you</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/partners</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/anthropic-ai-espionage-attack</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/automated-evidence-gathering</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/breach-reality-for-soc</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/engineering-dna-at-legion</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/f5-breach-guide-for-soc-teams</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/how-to-benchmark-agentic-ai-in-the-soc-a-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/introducing-ai-investigator</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/mythos</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/security-analysis-ai-protocols</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/solving-soc-talent-management-problem</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/top-cybersecurity-certifications</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/white-house-cyber-strategy-2026</loc>
    </url>
    <url>
        <loc>https://www.legionsecurity.ai/blog-posts/your-ai-soc-should-automate-how-your-team-actually-works</loc>
    </url>
</urlset>