<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.tanium.de/blog/cyber-threats-to-k-12-remote-learning-one-district-fights-back/</loc><lastmod>2025-06-10T17:36:27+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/as-kids-head-back-to-school-so-do-cyber-gangs-heres-how-educators-can-fight-back/</loc><lastmod>2025-06-17T15:21:50+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/client-management-solution-easier/</loc><lastmod>2025-07-23T12:31:36+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/forrester-roi-study-tanium-report-video/</loc><lastmod>2025-07-23T12:33:51+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/cisa-federal-agencies-must-urgently-patch-log4j-vulnerability/</loc><lastmod>2025-07-25T13:18:21+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/cyberattacks-on-k-12-schools-are-surging-a-veteran-cyber-defender-explains-why/</loc><lastmod>2025-07-25T14:20:14+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/patch-your-ugly-sweater-macos-ubuntu-tech-talks-32/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/go-tanium-tech-talks-episode-30-admins-secret-weapon-tanium-performance/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/tech-talks-episode-31-the-411-on-log4j-tanium-reveal/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/bare-metal-imaging-with-tanium-provision-tech-talks-34/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/love-these-new-charts-tech-talks-35/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/api-gateway-tech-talks-37/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/welcome-to-tanium-tech-talks-38/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/wake-up-the-neighborhood-tech-talks-39/</loc><lastmod>2025-07-29T15:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/as-federal-hiring-deadline-looms-chief-ai-officers-are-in-demand-heres-where-to-find-yours/</loc><lastmod>2025-07-31T14:00:04+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/forget-chatgpt-hearings-and-meta-fines-the-surgeon-general-is-big-techs-biggest-threat/</loc><lastmod>2025-07-31T17:00:05+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/converge-2022-product-vision-roadmap-nic-surpatanu/</loc><lastmod>2025-07-31T18:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/converge-2022-accenture-kris-burkhardt/</loc><lastmod>2025-07-31T18:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-to-get-out-of-technical-debt/</loc><lastmod>2025-07-31T19:00:04+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/single-endpoint-view-for-help-desks-tech-talks-129/</loc><lastmod>2025-08-02T06:00:04+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/map-lateral-movement-tanium-impact-tech-talks-123/</loc><lastmod>2025-08-05T07:00:04+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/the-moveit-breach-is-still-going-strong-heres-how-to-keep-your-data-safe/</loc><lastmod>2025-08-05T08:00:04+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/5-charts-that-explain-its-crisis-of-visibility/</loc><lastmod>2025-08-05T14:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/5-steps-to-securing-your-organizations-crown-jewels-of-data/</loc><lastmod>2025-08-05T14:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/the-eus-landmark-ai-act-will-put-the-us-in-3rd-maybe-4th-place/</loc><lastmod>2025-08-27T07:17:13+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/tanium-ready-help-federal-agencies-win-cybersecurity-sprint/</loc><lastmod>2025-08-27T11:07:06+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/a-letter-to-ceos-on-the-log4j-vulnerability/</loc><lastmod>2025-08-29T13:22:42+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/5-questions-must-answer-good-security-hygiene/</loc><lastmod>2025-08-29T13:47:21+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/just-patch-your-systems-please/</loc><lastmod>2025-08-29T13:48:19+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/three-stages-security-hygiene-measurement/</loc><lastmod>2025-08-29T13:58:37+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/operating-system-patching-scary-right-it-shouldnt-be/</loc><lastmod>2025-08-29T14:00:03+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/driving-towards-it-hygiene-2/</loc><lastmod>2025-08-29T14:00:42+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/tanium-ranks-no-10-on-fortunes-2019-list-of-the-100-best-medium-workplaces-2/</loc><lastmod>2025-08-29T14:01:12+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-the-strained-relationship-between-security-and-it-operations-is-disrupting-business/</loc><lastmod>2025-08-29T14:04:41+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/modernizing-it-operations-find-control-everything-on-your-network/</loc><lastmod>2025-08-29T14:05:43+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/with-distributed-workforce-transformation-in-overdrive-agencies-focus-on-access-and-security/</loc><lastmod>2025-09-02T07:20:52+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-to-restore-defenses-to-newly-remote-workforces/</loc><lastmod>2025-09-02T07:22:12+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/why-some-succeeded-and-some-struggled-during-the-overnight-switch-to-wfh/</loc><lastmod>2025-09-02T07:22:57+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-financial-services-can-recover-it-hygiene-post-pandemic/</loc><lastmod>2025-09-02T07:23:32+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-to-prepare-for-todays-new-security-landscape/</loc><lastmod>2025-09-02T07:25:26+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/long-term-wfh-how-to-make-it-secure-and-sustainable/</loc><lastmod>2025-09-02T07:26:01+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/ripping-off-the-endpoint-protection-bandaid/</loc><lastmod>2025-09-02T07:26:26+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/maximize-help-desk-roi-with-itsm-platform/</loc><lastmod>2025-09-02T07:26:56+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/asset-discovery-and-inventory-10-ways-tanium-makes-it-fast-complete-and-accurate/</loc><lastmod>2025-09-02T07:28:25+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/configuration-management-database-cmdb/</loc><lastmod>2025-09-02T07:33:54+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/securing-your-it-estate-with-tanium-microsoft/</loc><lastmod>2025-09-02T07:34:35+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/closing-the-digital-employee-experience-loop-with-servicenow/</loc><lastmod>2025-09-02T07:35:09+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/fazal-merchant-the-next-stage-of-the-tanium-journey-and-mine/</loc><lastmod>2025-09-02T07:36:10+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/tanium-converge-2023-global-partners-summit/</loc><lastmod>2025-09-02T07:37:32+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/day-two-tanium-converge-2024-highlights/</loc><lastmod>2025-09-02T07:40:10+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/2025-crn-tanium-women-of-the-channel/</loc><lastmod>2025-09-02T07:40:51+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/cti-roundup-katz-stealer-lumma-nailaolocker/</loc><lastmod>2025-09-02T07:41:21+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/cti-roundup-bert-ransomware-tgr-cri-0045-xworm/</loc><lastmod>2025-09-02T07:43:40+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/the-it-operations-and-security-skills-gap-what-if-we-dont-know-what-we-dont-know/</loc><lastmod>2025-09-02T07:44:44+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/nyse-with-tanium-ceo-dan-streetman-at-rsa-2023/</loc><lastmod>2025-09-16T14:59:13+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/5-tanium-community-articles-to-help-you-reduce-risk/</loc><lastmod>2025-09-17T11:58:20+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/oppenheimers-a-bomb-the-rise-of-ai-and-our-shot-at-getting-it-right/</loc><lastmod>2025-09-18T11:59:29+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/tanium-sixth-annual-month-of-giving-2023/</loc><lastmod>2025-09-18T12:07:38+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-npower-creates-pathways-to-prosperity/</loc><lastmod>2025-09-19T07:23:51+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/day-one-tanium-converge-2024-highlights/</loc><lastmod>2025-10-16T07:22:24+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/mastering-linux-patching-tech-talks-128/</loc><lastmod>2025-10-31T13:16:55+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/supply-chain-security-is-tough/</loc><lastmod>2025-11-07T07:18:17+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/telehealth-security-concerns-grow-as-use-explodes/</loc><lastmod>2025-11-20T07:14:01+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-to-quickly-scale-up-a-security-operations-center/</loc><lastmod>2025-12-24T13:25:49+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/what-is-threat-detection-and-response/</loc><lastmod>2026-01-15T13:44:59+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/what-is-converged-endpoint-management-xem/</loc><lastmod>2026-01-16T14:17:58+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/healthcare-cios-must-pair-automation-with-it-security/</loc><lastmod>2026-01-29T07:57:13+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/10-ways-tanium-makes-performance-monitoring-better/</loc><lastmod>2026-01-29T08:26:49+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/best-practices-log4j-vulnerability-and-beyond/</loc><lastmod>2026-01-29T08:34:51+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/announcing-risk-compliance-solution/</loc><lastmod>2026-02-05T14:42:06+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/what-is-patch-management/</loc><lastmod>2026-02-12T09:33:16+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/how-to-customize-tanium-for-help-desk-success-tech-talks-131/</loc><lastmod>2026-03-24T07:03:10+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/what-is-identity-and-access-management/</loc><lastmod>2026-03-24T07:47:52+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/ai-cybersecurity-guide/</loc><lastmod>2026-04-06T08:06:01+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/windows-linux-endpoint-imaging-tanium-provision/</loc><lastmod>2026-04-06T09:34:33+00:00</lastmod></url><url><loc>https://www.tanium.de/blog/the-eus-dora-rules-are-coming-heres-what-u-s-banks-and-tech-firms-need-to-know/</loc><lastmod>2026-04-10T13:25:05+00:00</lastmod></url></urlset>