<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.periphery.security</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/newsandblog</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/technology</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/technology/insights</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/technology/outpost</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/get-insights-report</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/respond-waitlist</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/team</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/balancing-cyber-security-standards-and-discretion</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/bracing-for-stricter-cyber-standards-in-dual-use-uavs</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/british-software-will-protect-ukrainian-drones-from-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/ceo-toby-wilmington-featured-on-bloomberg-to-discuss-cyber-threats-and-unmanned-systems</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/cve-2026-33155---40-bytes-to-chaos</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/cybersecurity-startup-periphery-donates-military-grade-security-to-protect-ukraines-drone-fleets</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/emerging-threat-andoryubot-exploits-ruckus-wireless-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/escalating-cyber-risks-in-connected-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/exposed-critical-vulnerabilities-in-industrial-cellular-routers-threaten-ot-networks</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/exposed-the-shocking-rise-of-cyber-attacks-on-your-favourite-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/flax-typhoon-botnet-exposes-alarming-iot-vulnerabilities-again</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/fortune-cyber-is-a-new-defense</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/how-security-demands-impact-engineering-time-solutions</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/navigating-the-expanding-attack-surface-in-a-world-of-xiot</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/nis2-directive-enhancing-security-for-enterprise-and-industrial-internet-of-things</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/part-1-what-every-manufacturer-needs-to-know-about-the-eu-cra</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/part-2-product-classification---the-hidden-complexity</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/part-3-from-legal-text-to-execution---how-to-prepare-for-the-cra-and-why-most-arent-ready</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-at-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-expands-to-san-francisco-to-secure-the-global-ai-hardware-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-joins-nvidia-inception-to-secure-the-next-generation-of-ai-hardware</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-launches-open-source-tool-for-home-edge-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-nominated-for-2025-security-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-partners-with-kt-technical-solutions-usa</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-raises-1-6-million-to-secure-the-iot-against-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/periphery-wins-start-up-of-the-year-at-leeds-digital-festival-awards</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/qomodo-is-no-more-long-live-periphery</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/securing-the-future-of-ev-charging-the-impact-and-implementation-of-iso-15118</loc>
    </url>
    <url>
        <loc>https://www.periphery.security/blog/securing-the-industrial-internet-of-things-how-embedded-iot-security-software-can-help</loc>
    </url>
</urlset>