<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://explore.bowbridge.net/blog/navigating-the-cybersecurity-labyrinth-xml-files-in-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-XML.jpg</image:loc><image:caption>attackvectorsXML</image:caption><image:title>attackvectorsXML</image:title></image:image><lastmod>2024-05-07</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-pdf-files-can-endanger-your-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/pdf-file-danger-1800.webp</image:loc><image:caption>pdffiledanger1800</image:caption><image:title>pdffiledanger1800</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-companies-at-risk-cyberattacks</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cyber-attack-risk.webp</image:loc><image:caption>cyberattackrisk</image:caption><image:title>cyberattackrisk</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018/cybersecurity-fail-how-not-to-be-the-next-equifax1-0-0-0</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-2.png</image:loc><image:caption>bowbridgebanner2</image:caption><image:title>bowbridgebanner2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-professionals-file-uploads</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-security-uploads.webp</image:loc><image:caption>SAPsecurityuploads</image:caption><image:title>SAPsecurityuploads</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/protecting-supplier-communication-with-bowbridge</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Phoenix-contact-cs.webp</image:loc><image:caption>Phoenixcontactcs</image:caption><image:title>Phoenixcontactcs</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-automation-right-for-your-enterprise</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-automation2.webp</image:loc><image:caption>cybersecurityautomation2</image:caption><image:title>cybersecurityautomation2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-for-sap-managers-injection-attacks</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/injection-attacks.webp</image:loc><image:caption>injectionattacks</image:caption><image:title>injectionattacks</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-addresses-e-recruiting-vulnerability</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-Erecruiting-vulnerable-1800.webp</image:loc><image:caption>SAPErecruitingvulnerable1800</image:caption><image:title>SAPErecruitingvulnerable1800</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-sap-rise-customers-need-to-take-malware-protection-seriously</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Blog_20250604.jog.jpg</image:loc><image:caption>Blog20250604jog</image:caption><image:title>Blog20250604jog</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2025-06-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/bowbridge-sap-cybersecurity-trends-for-2019</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/2019-cybersecurity-predictions.webp</image:loc><image:caption>2019cybersecuritypredictions</image:caption><image:title>2019cybersecuritypredictions</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/news/bowbridge-software-releases-anti-virus-for-sap-solutions-v4.0-on-linux</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/news-header.jpg</image:loc><image:caption>newsheader</image:caption><image:title>newsheader</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/featured-images/bb-Featured-AV-Release-News-01.png</image:loc><image:caption>bbFeaturedAVReleaseNews01</image:caption><image:title>bbFeaturedAVReleaseNews01</image:title></image:image><lastmod>2023-11-13</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-redirections-threaten-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/redirections.webp</image:loc><image:caption>redirections</image:caption><image:title>redirections</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/2017-sap-security-notes</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/security-notes-chart.png</image:loc><image:caption>securitynoteschart</image:caption><image:title>securitynoteschart</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cyber-trends-1800.webp</image:loc><image:caption>cybertrends1800</image:caption><image:title>cybertrends1800</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/new-sap-security-notes-on-crm-and-srm-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/CRM-security.webp</image:loc><image:caption>CRMsecurity</image:caption><image:title>CRMsecurity</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/prevent-cross-site-scripting-attack-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cross-site-scripting-attacks.webp</image:loc><image:caption>crosssitescriptingattacks</image:caption><image:title>crosssitescriptingattacks</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018/cybersecurity-fail-how-not-to-be-the-next-equifax1-0-0-0-1</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-7.png</image:loc><image:caption>bowbridgebanner7</image:caption><image:title>bowbridgebanner7</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-sap-security-notes-still-leave-you-vulnerable</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-e-recruiting-vulnerability.webp</image:loc><image:caption>SAPerecruitingvulnerability</image:caption><image:title>SAPerecruitingvulnerability</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/fiori-cybersecurity-for-sap-managers</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/fiori-security-for-managers.webp</image:loc><image:caption>fiorisecurityformanagers</image:caption><image:title>fiorisecurityformanagers</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-and-your-staff</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-and-staff.webp</image:loc><image:caption>cybersecurityandstaff</image:caption><image:title>cybersecurityandstaff</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-city-of-essen-protected-their-sap-system</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/city-of-essen-post.webp</image:loc><image:caption>cityofessenpost</image:caption><image:title>cityofessenpost</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/best-sap-anti-virus-software-bowbridge-trend-micro-clamsap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/ANTI-VIRUS-SOFTWARE-01.webp</image:loc><image:caption>ANTIVIRUSSOFTWARE01</image:caption><image:title>ANTIVIRUSSOFTWARE01</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/penetration-testing-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/penetration-testing.webp</image:loc><image:caption>penetrationtesting</image:caption><image:title>penetrationtesting</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/12-virus-protection-best-practices-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2021/figure2.jpg</image:loc><image:caption>figure2</image:caption><image:title>figure2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/virus-protection-best-practices.webp</image:loc><image:caption>virusprotectionbestpractices</image:caption><image:title>virusprotectionbestpractices</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2021/figure1-secure-operations-map.jpg</image:loc><image:caption>figure1secureoperationsmap</image:caption><image:title>figure1secureoperationsmap</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/ensuring-sap-file-format-integrity-mime-type-checks</loc><video:video><video:thumbnail_loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/videos/activate_MIME-type-check.mov/medium.jpg</video:thumbnail_loc><video:title>activate_MIME-type-check</video:title><video:description>activate_MIME-type-check</video:description><video:content_loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/videos/activate_MIME-type-check.mov</video:content_loc><video:duration>159</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/CUST_PARAMETER_list.png</image:loc><image:caption>CUSTPARAMETERlist</image:caption><image:title>CUSTPARAMETERlist</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/MIME-types.webp</image:loc><image:caption>MIMEtypes</image:caption><image:title>MIMEtypes</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/Activate-MIME-Type-integrity-check.png</image:loc><image:caption>ActivateMIMETypeintegritycheck</image:caption><image:title>ActivateMIMETypeintegritycheck</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/Blocking_message.png</image:loc><image:caption>Blockingmessage</image:caption><image:title>Blockingmessage</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/Evaluate_profile_parameter.png</image:loc><image:caption>Evaluateprofileparameter</image:caption><image:title>Evaluateprofileparameter</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/mime_ext_map.png</image:loc><image:caption>mimeextmap</image:caption><image:title>mimeextmap</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/CUST_CHECK_MIME_TYPE.png</image:loc><image:caption>CUSTCHECKMIMETYPE</image:caption><image:title>CUSTCHECKMIMETYPE</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/notepad-exe_to_notpad-pdf.png</image:loc><image:caption>notepadexetonotpadpdf</image:caption><image:title>notepadexetonotpadpdf</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/remote-work-sap-cybersecurity-threat</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/remote-workforce-threats.webp</image:loc><image:caption>remoteworkforcethreats</image:caption><image:title>remoteworkforcethreats</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-and-data-breaches-what-to-do</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/data-theft-and-sap.webp</image:loc><image:caption>datatheftandsap</image:caption><image:title>datatheftandsap</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/best-sap-cybersecurity-courses-roundup</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/best-cybersecurity-courses.webp</image:loc><image:caption>bestcybersecuritycourses</image:caption><image:title>bestcybersecuritycourses</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/migrating-cloud-sap-security-issues</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/migrating-to-the-cloud.webp</image:loc><image:caption>migratingtothecloud</image:caption><image:title>migratingtothecloud</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2021/roadmap-icon.png</image:loc><image:caption>roadmapicon</image:caption><image:title>roadmapicon</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-for-sap-managers-dos-attacks</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/DOS-attack.webp</image:loc><image:caption>DOSattack</image:caption><image:title>DOSattack</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/web-facing-sap-applications-security-compliance</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/security-for-SAP.webp</image:loc><image:caption>securityforSAP</image:caption><image:title>securityforSAP</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/gdpr-cybersecurity-lessons-learned</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/gdpr-and-cybersecurity.webp</image:loc><image:caption>gdprandcybersecurity</image:caption><image:title>gdprandcybersecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/gdpr-tweet.jpg</image:loc><image:caption>gdprtweet</image:caption><image:title>gdprtweet</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/unstructured-data-and-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/unstructured-data.webp</image:loc><image:caption>unstructureddata</image:caption><image:title>unstructureddata</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/data-integrity-and-the-subtle-cyber-sabotage-you-might-miss</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/data-sabotage.webp</image:loc><image:caption>datasabotage</image:caption><image:title>datasabotage</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-challenges-facing-it-leaders</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cyber-challenges-dominos.webp</image:loc><image:caption>cyberchallengesdominos</image:caption><image:title>cyberchallengesdominos</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cisos-and-sap-cybersecurity-is-your-anti-virus-enough</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/CISO-and-SAP-cybersecurity.webp</image:loc><image:caption>CISOandSAPcybersecurity</image:caption><image:title>CISOandSAPcybersecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/five-lessons-from-the-2019-onapsis-idc-survey</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/IDC-survey-lessons.webp</image:loc><image:caption>IDCsurveylessons</image:caption><image:title>IDCsurveylessons</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cost-sap-cybersecurity-data-breach</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/figure3-cost-cybercrime-country.png</image:loc><image:caption>figure3costcybercrimecountry</image:caption><image:title>figure3costcybercrimecountry</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/figure3-cost-cybercrime-industry.png</image:loc><image:caption>figure3costcybercrimeindustry</image:caption><image:title>figure3costcybercrimeindustry</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/data-breach-cost-01.webp</image:loc><image:caption>databreachcost01</image:caption><image:title>databreachcost01</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cyberattacks-critical-infrastructure-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/critical-infrastructure.webp</image:loc><image:caption>criticalinfrastructure</image:caption><image:title>criticalinfrastructure</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-ecommerce-fraud</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/ecommerce-fraud.webp</image:loc><image:caption>ecommercefraud</image:caption><image:title>ecommercefraud</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/secure-your-system-when-migrating-sap-to-the-cloud</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/migrating-SAP-to-cloud.webp</image:loc><image:caption>migratingSAPtocloud</image:caption><image:title>migratingSAPtocloud</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/online-learning-cybersecurity-threat</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/online-learning-cyber-threats.webp</image:loc><image:caption>onlinelearningcyberthreats</image:caption><image:title>onlinelearningcyberthreats</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-notes-whats-new</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/security-notes-on-SAP.webp</image:loc><image:caption>securitynotesonSAP</image:caption><image:title>securitynotesonSAP</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/our-takeaways-from-the-cybersecurity-insiders-report</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/53-percent-resources.png</image:loc><image:caption>53percentresources</image:caption><image:title>53percentresources</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/31-percent-malware-img.png</image:loc><image:caption>31percentmalwareimg</image:caption><image:title>31percentmalwareimg</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/37-percent-lack-skills-img.png</image:loc><image:caption>37percentlackskillsimg</image:caption><image:title>37percentlackskillsimg</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/41-percent-web-apps-img.png</image:loc><image:caption>41percentwebappsimg</image:caption><image:title>41percentwebappsimg</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/CI-App-report-banner.webp</image:loc><image:caption>CIAppreportbanner</image:caption><image:title>CIAppreportbanner</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/the-internet-of-things-whats-the-risk-to-sap-systems</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/ioT.webp</image:loc><image:caption>ioT</image:caption><image:title>ioT</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-ai-is-accelerating-ransomware-and-phishing-threats-to-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/AI-Cybersecurity.jpg</image:loc><image:caption>AICybersecurity</image:caption><image:title>AICybersecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2023-08-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-2.png</image:loc><image:caption>bowbridgebanner2</image:caption><image:title>bowbridgebanner2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/bowbridge-banner.png</image:loc><image:caption>bowbridgebanner</image:caption><image:title>bowbridgebanner</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner.png</image:loc><image:caption>bowbridgebanner</image:caption><image:title>bowbridgebanner</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-7.png</image:loc><image:caption>bowbridgebanner7</image:caption><image:title>bowbridgebanner7</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/equifax-malware.jpg</image:loc><image:caption>equifaxmalware</image:caption><image:title>equifaxmalware</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-6.png</image:loc><image:caption>bowbridgebanner6</image:caption><image:title>bowbridgebanner6</image:title></image:image><lastmod>2018-02-06</lastmod></url><url><loc>https://explore.bowbridge.net/blog/understand-saps-file-transfer-security-gap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2022/SAP-service-pack-update.jpg</image:loc><image:caption>SAPservicepackupdate</image:caption><image:title>SAPservicepackupdate</image:title></image:image><lastmod>2022-12-15</lastmod></url><url><loc>https://explore.bowbridge.net/blog/7-ways-improve-sap-s4hana-security-virus-scanning</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/virus-scanning.jpg</image:loc><image:caption>virusscanning</image:caption><image:title>virusscanning</image:title></image:image><lastmod>2023-02-28</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-schools-k12-higher-education-risk</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/SAP-Cyebersecurity-in-Schools.jpg</image:loc><image:caption>SAPCyebersecurityinSchools</image:caption><image:title>SAPCyebersecurityinSchools</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/cybersecurity-in-schools.jpg</image:loc><image:caption>cybersecurityinschools</image:caption><image:title>cybersecurityinschools</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/SAP-security-K-12.jpg</image:loc><image:caption>SAPsecurityK12</image:caption><image:title>SAPsecurityK12</image:title></image:image><lastmod>2024-08-26</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-due-diligence-for-mergers-and-acquisitions</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/merger-due-dilligence.webp</image:loc><image:caption>mergerduedilligence</image:caption><image:title>mergerduedilligence</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-skills-shortage-the-biggest-threat-to-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-pros-talent-shortage.webp</image:loc><image:caption>cybersecurityprostalentshortage</image:caption><image:title>cybersecurityprostalentshortage</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/ai-biometric-security-and-the-threat-to-fiori</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/AI-and-FIORI.webp</image:loc><image:caption>AIandFIORI</image:caption><image:title>AIandFIORI</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-stats-and-what-they-mean-for-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2019/cisco-cybersecurity-stat.png</image:loc><image:caption>ciscocybersecuritystat</image:caption><image:title>ciscocybersecuritystat</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2019/mcafee-report.png</image:loc><image:caption>mcafeereport</image:caption><image:title>mcafeereport</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-stats.webp</image:loc><image:caption>cybersecuritystats</image:caption><image:title>cybersecuritystats</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2019/accenture-cost-of-cybercrime.png</image:loc><image:caption>accenturecostofcybercrime</image:caption><image:title>accenturecostofcybercrime</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/navigating-advanced-cybersecurity-risks-pdf-files-in-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-PDF.jpg</image:loc><image:caption>attackvectorsPDF</image:caption><image:title>attackvectorsPDF</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2024-04-23</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-sap-e-recruiting-are-you-protected</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-SAP-E-Recruiting.webp</image:loc><image:caption>cybersecuritySAPERecruiting</image:caption><image:title>cybersecuritySAPERecruiting</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/State-of-SAP-E-Recruiting-infographic.png</image:loc><image:caption>StateofSAPERecruitinginfographic</image:caption><image:title>StateofSAPERecruitinginfographic</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/top-file-based-threats-to-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/top-file-based-threats.webp</image:loc><image:caption>topfilebasedthreats</image:caption><image:title>topfilebasedthreats</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/critical-sap-vulnerabilities-2020</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-vulnerabilities-2020.webp</image:loc><image:caption>SAPvulnerabilities2020</image:caption><image:title>SAPvulnerabilities2020</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-beginners-file-uploads</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-security-beginners.webp</image:loc><image:caption>SAPsecuritybeginners</image:caption><image:title>SAPsecuritybeginners</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-for-sap-managers-directory-traversal-attacks</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/directory-traversals.webp</image:loc><image:caption>directorytraversals</image:caption><image:title>directorytraversals</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/SAPCAR-Windows-absolute-path.png</image:loc><image:caption>SAPCARWindowsabsolutepath</image:caption><image:title>SAPCARWindowsabsolutepath</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/VirusTotal-Analysis%20of%20EICAR%20in%20SAR.png</image:loc><image:caption>VirusTotalAnalysisofEICARinSAR</image:caption><image:title>VirusTotalAnalysisofEICARinSAR</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/malicious-file-uploads</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/hidden-threat-wolf.webp</image:loc><image:caption>hiddenthreatwolf</image:caption><image:title>hiddenthreatwolf</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/your-sap-system-has-been-hacked-now-what</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/compromised-system.webp</image:loc><image:caption>compromisedsystem</image:caption><image:title>compromisedsystem</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-notes-update-january-2020</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-security-notes-2020.webp</image:loc><image:caption>SAPsecuritynotes2020</image:caption><image:title>SAPsecuritynotes2020</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/smart-new-way-accurately-assess-sap-security-maturity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/assess-security-maturity.webp</image:loc><image:caption>assesssecuritymaturity</image:caption><image:title>assesssecuritymaturity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018/cybersecurity-fail-how-not-to-be-the-next-equifax1-0</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/equifax-malware.jpg</image:loc><image:caption>equifaxmalware</image:caption><image:title>equifaxmalware</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cyberattack-how-to-respond</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/respond-to-cyberattack.webp</image:loc><image:caption>respondtocyberattack</image:caption><image:title>respondtocyberattack</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2023-01-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/major-european-university-secures-sap-systems-with-bowbridge</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/university-of-amsterdam.jpg</image:loc><image:caption>universityofamsterdam</image:caption><image:title>universityofamsterdam</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2024-05-04</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-erp-alternatives-consider-security</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-ERP-alternatives.webp</image:loc><image:caption>SAPERPalternatives</image:caption><image:title>SAPERPalternatives</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-solutions-retail-industry</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/SAP-security-retail-hero-grocery.jpg</image:loc><image:caption>SAPsecurityretailherogrocery</image:caption><image:title>SAPsecurityretailherogrocery</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2023-02-13</lastmod></url><url><loc>https://explore.bowbridge.net/blog/ms-office-macros-a-new-threat-to-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/ms-office-macros.webp</image:loc><image:caption>msofficemacros</image:caption><image:title>msofficemacros</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-you-should-have-cloud-security-for-sap-file-transfers</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cloud-security-SAP-file-transfers.jpg</image:loc><image:caption>cloudsecuritySAPfiletransfers</image:caption><image:title>cloudsecuritySAPfiletransfers</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2025-02-27</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-threat-profile-energy-oil-and-gas</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/energy-oil-gas-cybersecurity.webp</image:loc><image:caption>energyoilgascybersecurity</image:caption><image:title>energyoilgascybersecurity</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/the-c-suite-sap-cybersecuritys-big-barrier</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/c-suite-cybersecurity-barrier-1800.webp</image:loc><image:caption>csuitecybersecuritybarrier1800</image:caption><image:title>csuitecybersecuritybarrier1800</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018/cybersecurity-fail-how-not-to-be-the-next-equifax1-0-0</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner.png</image:loc><image:caption>bowbridgebanner</image:caption><image:title>bowbridgebanner</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/improve-sap-security-being-proactive</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/proactive-SAP-security.webp</image:loc><image:caption>proactiveSAPsecurity</image:caption><image:title>proactiveSAPsecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/ransomware-sap-e-recruiting-and-why-hr-is-under-cyberattack</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/HR-cybersecurity-target.webp</image:loc><image:caption>HRcybersecuritytarget</image:caption><image:title>HRcybersecuritytarget</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/beyond-phishing-smishing-vishing-cybersecurity-threats</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/beyond-phishing-threats.webp</image:loc><image:caption>beyondphishingthreats</image:caption><image:title>beyondphishingthreats</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/new-sap-vulnerabilities-all-about-recon</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-vulnerabilities.webp</image:loc><image:caption>SAPvulnerabilities</image:caption><image:title>SAPvulnerabilities</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/marriott-data-hack-sap-cybersecurity-lessons</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/marriott-data-hack-lessons.webp</image:loc><image:caption>marriottdatahacklessons</image:caption><image:title>marriottdatahacklessons</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cybersecurity-lessons-from-14-years-in-business</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/sap-cybersecurity-lessons.webp</image:loc><image:caption>sapcybersecuritylessons</image:caption><image:title>sapcybersecuritylessons</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/10-ways-protect-your-business-against-ransomware-attacks</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/protect-business-ransomware.png</image:loc><image:caption>protectbusinessransomware</image:caption><image:title>protectbusinessransomware</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2024-04-17</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-anti-virus-programs-dont-protect-sap-systems</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/anti-virus-protection.webp</image:loc><image:caption>antivirusprotection</image:caption><image:title>antivirusprotection</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/secure-together-2024-highlights-bowbridge</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/rotterdam-netherlands.jpg</image:loc><image:caption>rotterdamnetherlands</image:caption><image:title>rotterdamnetherlands</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/secure-event-1.jpg</image:loc><image:caption>secureevent1</image:caption><image:title>secureevent1</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/Joerg-social-post.png</image:loc><image:caption>Joergsocialpost</image:caption><image:title>Joergsocialpost</image:title></image:image><lastmod>2024-09-04</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-much-could-sap-cybersecurity-breaches-cost-your-company</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cost.webp</image:loc><image:caption>cost</image:caption><image:title>cost</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/why-active-content-can-threaten-sap-with-xss-attack</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bad-cup-of-java.webp</image:loc><image:caption>badcupofjava</image:caption><image:title>badcupofjava</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-in-cloud-checklist</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/SAP-in-the-cloud.webp</image:loc><image:caption>SAPinthecloud</image:caption><image:title>SAPinthecloud</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/securing-sap-in-the-cloud-bowbridge-anti-virus-cloud</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/Cloud-Security-SAP.jpg</image:loc><image:caption>CloudSecuritySAP</image:caption><image:title>CloudSecuritySAP</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2024-12-12</lastmod></url><url><loc>https://explore.bowbridge.net/blog/biometric-security-and-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/biometrics-and-SAP.webp</image:loc><image:caption>biometricsandSAP</image:caption><image:title>biometricsandSAP</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/can-your-sap-application-spread-malware</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/Locky-Twitter.gif</image:loc><image:caption>LockyTwitter</image:caption><image:title>LockyTwitter</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/facebook-malware-dislike-1800.webp</image:loc><image:caption>facebookmalwaredislike1800</image:caption><image:title>facebookmalwaredislike1800</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/supply-chain-cybersecurity-and-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/supply-chain-security.webp</image:loc><image:caption>supplychainsecurity</image:caption><image:title>supplychainsecurity</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/new-malware-threats-sap-e-recruiting-systems</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/new-malware-threats.webp</image:loc><image:caption>newmalwarethreats</image:caption><image:title>newmalwarethreats</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-fiori-and-virus-scanning</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/FIORI-and-virus-scanning.webp</image:loc><image:caption>FIORIandvirusscanning</image:caption><image:title>FIORIandvirusscanning</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/macro-malware-and-secure-documents-what-you-need-to-know</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/macro-malware-header.webp</image:loc><image:caption>macromalwareheader</image:caption><image:title>macromalwareheader</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/Macro-Malware-3.jpg</image:loc><image:caption>MacroMalware3</image:caption><image:title>MacroMalware3</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/Macro-Malware-2.jpg</image:loc><image:caption>MacroMalware2</image:caption><image:title>MacroMalware2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/Macro-Malware-1.jpg</image:loc><image:caption>MacroMalware1</image:caption><image:title>MacroMalware1</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/bridging-the-gap-between-sap-security-and-sap-cybersecurity</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bridging-the-cybersecurity-gap.webp</image:loc><image:caption>bridgingthecybersecuritygap</image:caption><image:title>bridgingthecybersecuritygap</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/news/bowbridge-anti-virus-for-sap-solutions-achieves-sap-certification</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/SAPCertified.png</image:loc><image:caption>SAPCertified</image:caption><image:title>SAPCertified</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/news-header.jpg</image:loc><image:caption>newsheader</image:caption><image:title>newsheader</image:title></image:image><lastmod>2018-02-14</lastmod></url><url><loc>https://explore.bowbridge.net/blog/where-cybercrime-against-sap-is-bought-and-sold</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybercrime-1800-1.webp</image:loc><image:caption>cybercrime18001</image:caption><image:title>cybercrime18001</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cyber-insecurity-ranks-eighth-wef-global-risks-report</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/global-security.jpg</image:loc><image:caption>globalsecurity</image:caption><image:title>globalsecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/global-security-risk-ranking.png</image:loc><image:caption>globalsecurityriskranking</image:caption><image:title>globalsecurityriskranking</image:title></image:image><lastmod>2023-04-25</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-security-vulnerability-profile-government</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Government-SAP-vulnerabilities.webp</image:loc><image:caption>GovernmentSAPvulnerabilities</image:caption><image:title>GovernmentSAPvulnerabilities</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://explore.bowbridge.net/blog/no-malware-protection-guarantee-even-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/malware-protection.webp</image:loc><image:caption>malwareprotection</image:caption><image:title>malwareprotection</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2023-01-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/5-ways-small-teams-can-protect-sap-systems</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/small-infosec-teams.webp</image:loc><image:caption>smallinfosecteams</image:caption><image:title>smallinfosecteams</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/government-sap-cybersecurity-2020</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/govt-cybersecurity2.webp</image:loc><image:caption>govtcybersecurity2</image:caption><image:title>govtcybersecurity2</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/navigating-advanced-cybersecurity-risks-the-perils-of-microsoft-office-files-in-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-office.jpg</image:loc><image:caption>attackvectorsoffice</image:caption><image:title>attackvectorsoffice</image:title></image:image><lastmod>2024-04-30</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-tech-trends-that-could-impact-sap</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/security-trends-1800.webp</image:loc><image:caption>securitytrends1800</image:caption><image:title>securitytrends1800</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/news</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/news-header.jpg</image:loc><image:caption>newsheader</image:caption><image:title>newsheader</image:title></image:image><lastmod>2018-02-14</lastmod></url><url><loc>https://explore.bowbridge.net/blog2018/cybersecurity-fail-how-not-to-be-the-next-equifax1-0-0-0-0</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-6.png</image:loc><image:caption>bowbridgebanner6</image:caption><image:title>bowbridgebanner6</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://explore.bowbridge.net/blog/9-ways-to-build-a-cybersecurity-culture</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cybersecurity-culture.webp</image:loc><image:caption>cybersecurityculture</image:caption><image:title>cybersecurityculture</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Blog_20250604.jog.jpg</image:loc><image:caption>Blog20250604jog</image:caption><image:title>Blog20250604jog</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/Cloud-Based-Security.jpg</image:loc><image:caption>CloudBasedSecurity</image:caption><image:title>CloudBasedSecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/rotterdam-netherlands.jpg</image:loc><image:caption>rotterdamnetherlands</image:caption><image:title>rotterdamnetherlands</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/SAP-Cyebersecurity-in-Schools.jpg</image:loc><image:caption>SAPCyebersecurityinSchools</image:caption><image:title>SAPCyebersecurityinSchools</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-PDF.jpg</image:loc><image:caption>attackvectorsPDF</image:caption><image:title>attackvectorsPDF</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/bowbridge-banner.png</image:loc><image:caption>bowbridgebanner</image:caption><image:title>bowbridgebanner</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-XML.jpg</image:loc><image:caption>attackvectorsXML</image:caption><image:title>attackvectorsXML</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cloud-security-SAP-file-transfers.jpg</image:loc><image:caption>cloudsecuritySAPfiletransfers</image:caption><image:title>cloudsecuritySAPfiletransfers</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/Cloud-Security-SAP.jpg</image:loc><image:caption>CloudSecuritySAP</image:caption><image:title>CloudSecuritySAP</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/bowbridge-banner-1.png</image:loc><image:caption>bowbridgebanner1</image:caption><image:title>bowbridgebanner1</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/attack-vectors-office.jpg</image:loc><image:caption>attackvectorsoffice</image:caption><image:title>attackvectorsoffice</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/bowbridge-to-present-at-sapinsider-events</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Cybersecurity-for-SAP-Customers-2017-1800.webp</image:loc><image:caption>CybersecurityforSAPCustomers20171800</image:caption><image:title>CybersecurityforSAPCustomers20171800</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2017/EmailBannerAd_Bowbridge-Cybersecurity2017.jpg</image:loc><image:caption>EmailBannerAdBowbridgeCybersecurity2017</image:caption><image:title>EmailBannerAdBowbridgeCybersecurity2017</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-16</lastmod></url><url><loc>https://explore.bowbridge.net/blog/microsoft-office-vulnerabilities-put-sap-at-risk</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/macros-malware-1800.webp</image:loc><image:caption>macrosmalware1800</image:caption><image:title>macrosmalware1800</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/malware-detection-sap-applications</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/malware-detection-SAP.webp</image:loc><image:caption>malwaredetectionSAP</image:caption><image:title>malwaredetectionSAP</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/news/bowbridge-software-recognized-among-20-most-promising-sap-solution-providers-2016-by-cioreview</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/news-header.jpg</image:loc><image:caption>newsheader</image:caption><image:title>newsheader</image:title></image:image><lastmod>2018-02-14</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-fail-how-not-to-be-the-next-equifax</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cyber-fail.webp</image:loc><image:caption>cyberfail</image:caption><image:title>cyberfail</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/top-5-takeaways-from-the-onapsis-digital-shadows-report</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/Onapsis-report-banner.webp</image:loc><image:caption>Onapsisreportbanner</image:caption><image:title>Onapsisreportbanner</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2018/SAP-vulnerability-graph.png</image:loc><image:caption>SAPvulnerabilitygraph</image:caption><image:title>SAPvulnerabilitygraph</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://explore.bowbridge.net/blog/how-superior-cloud-based-sap-security-helps-prevent-cloud-repatriation</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2024/Cloud-Based-Security.jpg</image:loc><image:caption>CloudBasedSecurity</image:caption><image:title>CloudBasedSecurity</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2024-11-12</lastmod></url><url><loc>https://explore.bowbridge.net/blog/cybersecurity-for-sap-managers-cross-site-scripting-xss</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/reflected-xss.png</image:loc><image:caption>reflectedxss</image:caption><image:title>reflectedxss</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/stored-xss.png</image:loc><image:caption>storedxss</image:caption><image:title>storedxss</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cross-site-scripting-xss.webp</image:loc><image:caption>crosssitescriptingxss</image:caption><image:title>crosssitescriptingxss</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/sap-cyberattacks-how-prepared</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/sap-netweaver-google-search.gif</image:loc><image:caption>sapnetweavergooglesearch</image:caption><image:title>sapnetweavergooglesearch</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2020/SAP-app-server-google-search.gif</image:loc><image:caption>SAPappservergooglesearch</image:caption><image:title>SAPappservergooglesearch</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/cyber-attack-preparation.webp</image:loc><image:caption>cyberattackpreparation</image:caption><image:title>cyberattackpreparation</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/can-employers-be-held-liable-for-sap-cybersecurity-breaches</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/employer-liability.webp</image:loc><image:caption>employerliability</image:caption><image:title>employerliability</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://explore.bowbridge.net/blog/improve-sap-fiori-security</loc><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/logos/bowbridge_logo.svg</image:loc><image:caption>bowbridgelogo</image:caption><image:title>bowbridgelogo</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-2023/christopher-nagy.jpg</image:loc><image:caption>christophernagy</image:caption><image:title>christophernagy</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/blog-images-2021/SAP-fiori-chart.png</image:loc><image:caption>SAPfiorichart</image:caption><image:title>SAPfiorichart</image:title></image:image><image:image><image:loc>https://2773339.fs1.hubspotusercontent-na1.net/hubfs/2773339/improve-sap-fiori-security.webp</image:loc><image:caption>improvesapfiorisecurity</image:caption><image:title>improvesapfiorisecurity</image:title></image:image><lastmod>2023-06-14</lastmod></url></urlset>