<?xml version="1.0" encoding="utf-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><!-- generated-on=April 28, 2026 06:51 AM --><url>
                        <loc>https://www.manageengine.com/data-security/blog/detecting-file-security-vulnerabilities-with-file-analysis.html</loc>
                        <lastmod>2026-02-11</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/the-states-of-data-part-3-data-in-use-and-why-you-need-to-keep-an-eye-on-file-activities.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/the-states-of-data-intro-why-you-should-protect-data-at-rest-in-use-and-in-motion.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/usb-review-part-2-how-to-manage-usb-devices.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/data-classification-the-fundamental-requirement-of-successful-dlp-programs.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/data-security-threats-how-to-safeguard-your-data-from-modern-pirates-free-e-book.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/usb-review-part-1-how-are-usb-flash-drives-a-security-risk.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/access-granted-mastering-the-art-of-permissions.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/is-your-sensitive-data-overexposed.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/bring-down-data-storage-costs-by-getting-rid-of-obsolete-data-savings-estimator.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/healthcare-cybersecurity-our-6-step-plan-to-secure-healthcare-data.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/free-webinar-learn-can-protect-enterprise-ransomware.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/why-companies-need-url-filtering-for-enhanced-cloud-protection.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/cisos-guide-to-building-an-ironclad-data-loss-prevention-strategy-e-book.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/alert-aa20-302a-federal-agencies-warn-about-ransomware-attacks-targeting-hospitals.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/top-tips-5-potential-use-cases-of-6g-networks.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/dealing-with-data-glut-why-rot-data-is-an-issue-and-how-to-manage-it.html</loc>
                        <lastmod>2025-11-24</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/mastering-cloud-app-control-part-3-governing-file-transfers.html</loc>
                        <lastmod>2025-11-19</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/mastering-cloud-app-control-part-2-hardening-login-security.html</loc>
                        <lastmod>2025-11-12</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/mastering-cloud-app-control-part-1-locking-down-access.html</loc>
                        <lastmod>2025-11-03</lastmod></url><url>
                        <loc>https://www.manageengine.com/data-security/blog/the-change-healthcare-hack.html</loc>
                        <lastmod>2025-05-26</lastmod></url></urlset>