<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://security-gen.com/</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://security-gen.com/awards</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/contact-us</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/about-us</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/leadership</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/certificates</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/news_</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/ace-breach-and-attack-simulation</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/intrusion-detection-system</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/next-generation-firewall</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/gtp-firewall</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/5g_cyber_security_lab</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/5g-security-program</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/cyber-security-solutions</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/telecom-network-security</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/fraud-risk-analysis</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/telecom-incident-investigation</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/webinar</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/conference</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/whitePapers</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheets</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/articles_</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/case_study</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/analyst_report</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/resources</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/VoLTE-Security-Offering-Solution-Overview</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/white-paper/SecurityGen-GTP-vulnerabilities-and-security</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/13-Dec-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/17-Oct-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-rocco-vendor-innovator</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-best-market-entrant</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/submit_form</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-rocco</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/24-Oct-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-vendor-innovation</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-cc-global</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-pipeline-innovation</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/award/awards-rocco-tier-one-status</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/10-Aug-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/case_studies/ACE-case-study-LGU+</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/case_studies/SecurityGen_IDS_deployment</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/privacy-policy</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/knowledgeCorner</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/cookies</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-ISO.pdf</loc>
  <lastmod>2022-06-06T12:54:20+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/news_?type=news</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/news_?type=press</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/newsCategory</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-ACE-Brochure.pdf</loc>
  <lastmod>2022-06-28T12:17:49+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/solution_brief/SecurityGen-IDS-Solution-brief</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/SecurityGen-GTP-firewall-datasheet</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/webinar?type=all</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/webinar?type=upcoming</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/webinar?type=archive</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/ekoparty-security-conference-argentina-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/cc-enterprise-summit-berlin-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/cybershield_event</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/annual-roaming-interconnect-innovation-forum</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/The_future_of_digital_economy_through_5G</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/conference_5G-cyber-resilenece</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/conference_5G_networks_a_world_of_singularities</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/white-paper/5G-some-security-practices-to-protect-the-assets</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/white-paper/5g-decoding-vulnerabilities</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/white-paper/SecurityGen-Whitepaper_How_Early_Threat_Identification_works_and_helps</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/5G_Cyber_Security_Lab</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/ACE-Breach_Attack_Simulation_platform_Datasheet</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/NGFW_Datasheet</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/SecurityGenIDS</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/datasheet/5G-security-program</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/whats-wrong-with-fast-VoLTE-deployments</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/volte-roaming-and-the-security-implications</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/ss7-Attacks-and-sim-cloning-separating-fact-from-fiction</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/signalling-network-threats-in-latam</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/Cybersecurity_perspective_on_top_mwc_2023_themes</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SecurityGen_CyberSecurity_Priorities_2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/RISKS_IN_TELECOM_SUPPLY_CHAIN_SECURITY</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SecurityGen_Telecom_network_security_assessment_legacy_versus_BAS</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/Private_5G_Networks</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/ddos-attack-prevention</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/RAN_architecture_new_opportunities_and_security_challanges</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/Securing_global_5G_growth_story_with_nfvi</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SG_Article_BTSNetwork</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SG_Article_LightBasin</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SG_Article_TelcoWorkloads</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/articles/SG_Lapsus_Article</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/resource/SG-5G-protection-use-cases</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/resource/SecurityGen-IDS-enhance-your-signalling-security</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/resource/SecurityGen-Infographic</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/VoLTE-Security-Offering-Solution-Overview.pdf</loc>
  <lastmod>2023-12-14T10:17:30+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen_GTP_vulnerabilities_and_security.pdf</loc>
  <lastmod>2023-11-06T16:11:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/ACE-case-study-LGU.pdf</loc>
  <lastmod>2022-11-23T07:24:16+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-IDS_case_study.pdf</loc>
  <lastmod>2022-08-23T07:36:26+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGenIDS.pdf</loc>
  <lastmod>2022-02-04T11:58:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/10-Oct-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/24-Apr-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/07-Feb-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/19-Jan-2023</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/05-Dec-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/26-Oct-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/24-Jun-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/26-May-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressRelease</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-IDS-Soultion-brief.pdf</loc>
  <lastmod>2023-09-29T15:43:26+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-GTP-Firewall-Datasheet.pdf</loc>
  <lastmod>2023-08-24T11:42:10+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/5G-Some-security-practices-to-protect-the-5G-assests.pdf</loc>
  <lastmod>2022-10-03T07:39:46+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/5G_decoding_vulnerabilities.pdf</loc>
  <lastmod>2022-09-22T07:00:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen%20Whitepaper%20-%20How%20Early%20Threat%20Identification%20works%20and%20helps.pdf</loc>
  <lastmod>2022-05-03T08:16:27+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/NGFW%20Datasheet.pdf</loc>
  <lastmod>2022-03-22T12:01:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/5G%20Security%20Program%20Datasheet.pdf</loc>
  <lastmod>2022-03-04T07:48:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf</loc>
  <lastmod>2023-11-28T11:11:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG_VoLTE_Roaming_Security_Article.pdf</loc>
  <lastmod>2023-09-14T10:27:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-Article-Cloning-SimCard.pdf</loc>
  <lastmod>2023-03-29T11:23:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-Signaling-Threats-in-Latam.pdf</loc>
  <lastmod>2023-03-29T11:49:58+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf</loc>
  <lastmod>2023-03-13T12:03:24+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-Cybersecurity-Priorities-2023.pdf</loc>
  <lastmod>2023-01-30T06:37:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/Security-Gen-Telecom.pdf</loc>
  <lastmod>2022-07-27T13:41:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen%20Telecom%20network%20security%20assessment%20-%20legacy%20versus%20BAS.pdf</loc>
  <lastmod>2022-05-10T10:36:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/Securing%20Private%205G%20Networks%20(1).pdf</loc>
  <lastmod>2022-03-21T10:46:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/DoS%20-%20a%20rising%20security%20concern%20-%20A%20SecurityGen%20perspective.pdf</loc>
  <lastmod>2022-02-24T12:00:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/ORAN%20Architecture%20-%20New%20opportunities%20and%20security%20challenges.pdf</loc>
  <lastmod>2022-02-24T12:00:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/Securing%20the%205G%20growth%20story%20with%20NFVi.pdf</loc>
  <lastmod>2022-03-04T09:51:29+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG_Article_BTSNetwork.pdf</loc>
  <lastmod>2022-05-10T03:28:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG_Article_LightBasin.pdf</loc>
  <lastmod>2022-05-10T03:28:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG_Article_TelcoWorkLoads.pdf</loc>
  <lastmod>2022-05-10T03:28:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG_Lapsus%20Article.pdf</loc>
  <lastmod>2022-05-10T03:28:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SG-5G-protection-use-cases.pdf</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-IDS-enhance-your-signalling-security.pdf</loc>
  <lastmod>2022-08-18T10:16:39+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/SecurityGen-Infographic.pdf</loc>
  <lastmod>2022-08-18T10:16:39+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/18-May-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://security-gen.com/pressreleases/27-Apr-2022</loc>
  <lastmod>2024-01-08T17:22:32+00:00</lastmod>
  <priority>0.41</priority>
</url>


</urlset>