<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 1:32 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://dialecticsecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Dialectic Security</title>
		<link><![CDATA[https://dialecticsecurity.com]]></link>
		<description><![CDATA[Dialectic Security]]></description>
		<lastBuildDate><![CDATA[Tue, 06 Jan 2026 14:05:43 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://dialecticsecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://dialecticsecurity.com/free-webinar-on-obligatory-cybersecurity-compliance-for-saudi-companies/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/free-webinar-on-obligatory-cybersecurity-compliance-for-saudi-companies/]]></link>
			<title>Free webinar on obligatory cybersecurity compliance for Saudi companies</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 14:05:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/services/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Wed, 22 Oct 2025 09:28:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/ncnicc-saudi-arabias-new-cybersecurity-baseline/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/ncnicc-saudi-arabias-new-cybersecurity-baseline/]]></link>
			<title>NCNICC: Saudi Arabia’s New Cybersecurity Baseline</title>
			<pubDate><![CDATA[Mon, 29 Dec 2025 14:04:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-2]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-2]]></link>
			<title>Header</title>
			<pubDate><![CDATA[Mon, 20 Oct 2025 10:02:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/about-us/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/about-us/]]></link>
			<title>About Us</title>
			<pubDate><![CDATA[Mon, 20 Oct 2025 09:56:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/building-a-scalable-open-source-docker-security-framework-in-a-technology-rd-organization/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/building-a-scalable-open-source-docker-security-framework-in-a-technology-rd-organization/]]></link>
			<title>Building a Scalable, Open-Source Docker Security Framework in a Technology R&amp;D Organization</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 11:56:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/]]></link>
			<title>Case Studies</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 11:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/the-story-of-nectar-01-a-home-brewed-almost-fud-malware/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/the-story-of-nectar-01-a-home-brewed-almost-fud-malware/]]></link>
			<title>The Story of Nectar-01: A Home Brewed (Almost) FUD Malware</title>
			<pubDate><![CDATA[Wed, 08 Oct 2025 12:49:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/privacy-policy/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Wed, 01 Oct 2025 11:04:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/how-we-hacked-free-iptv-and-stumbled-into-a-data-leak-goldmine/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/how-we-hacked-free-iptv-and-stumbled-into-a-data-leak-goldmine/]]></link>
			<title>How We Hacked Free IPTV (And Stumbled Into a Data Leak Goldmine)</title>
			<pubDate><![CDATA[Tue, 07 Oct 2025 10:18:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/open-source-edr-wazuh-thehive-misp/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/open-source-edr-wazuh-thehive-misp/]]></link>
			<title>Embracing Open Source for Advanced Endpoint Detection and Response: A Comprehensive EDR Solution Using Wazuh, TheHive, and MISP</title>
			<pubDate><![CDATA[Tue, 07 Oct 2025 08:59:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/blog/advanced-edr/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/blog/advanced-edr/]]></link>
			<title>Embracing Open Source for Advanced Endpoint Detection and Response: A Comprehensive EDR Solution Using Wazuh, TheHive, and MISP</title>
			<pubDate><![CDATA[Tue, 07 Oct 2025 08:51:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/contact-us/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Thu, 02 Oct 2025 08:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-megamenu-menuitem6769/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-megamenu-menuitem6769/]]></link>
			<title>dynamic-content-megamenu-menuitem6769</title>
			<pubDate><![CDATA[Wed, 01 Oct 2025 09:35:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=header]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=header]]></link>
			<title>good</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:47:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-4]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-4]]></link>
			<title>Header Layout &#8211; 4</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-4]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-4]]></link>
			<title>Footer Layout 4</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-3]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-3]]></link>
			<title>Footer Layout 3</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-e300192-7f39e29/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-e300192-7f39e29/]]></link>
			<title>dynamic-content-widget-e300192-7f39e29</title>
			<pubDate><![CDATA[Wed, 26 Feb 2025 13:12:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer]]></link>
			<title>Footer</title>
			<pubDate><![CDATA[Wed, 07 Jan 2026 20:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-2548a92-99/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-2548a92-99/]]></link>
			<title>dynamic-content-widget-2548a92-99</title>
			<pubDate><![CDATA[Thu, 20 Feb 2025 11:09:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-2]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-2]]></link>
			<title>Header Layout &#8211; 2</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-3]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=header-layout-3]]></link>
			<title>Header Layout &#8211; 3</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/behavioral-analytics-for-cyber-threats/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/behavioral-analytics-for-cyber-threats/]]></link>
			<title>Behavioral Analytics For Cyber Threats</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/adaptive-security-architecture-design/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/adaptive-security-architecture-design/]]></link>
			<title>Adaptive Security Architecture Design</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/behavioral-analytics-for-cyber-threat/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/behavioral-analytics-for-cyber-threat/]]></link>
			<title>Behavioral Analytics For Cyber Threat</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/vulnerability-management-lifecycle-project/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/vulnerability-management-lifecycle-project/]]></link>
			<title>Vulnerability Management Lifecycle Project</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/real-time-network-monitoring-systems/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/real-time-network-monitoring-systems/]]></link>
			<title>Real-Time Network Monitoring Systems</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/cybersecurity-awareness-and-training-campaigns/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/cybersecurity-awareness-and-training-campaigns/]]></link>
			<title>Cybersecurity Awareness And Training Campaigns</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/comprehensive-risk-assessment-programs/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/comprehensive-risk-assessment-programs/]]></link>
			<title>Comprehensive Risk Assessment Programs</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/proactive-threat-detection-and-response/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/proactive-threat-detection-and-response/]]></link>
			<title>Proactive Threat Detection And Response</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-e300192-d092c5d/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-e300192-d092c5d/]]></link>
			<title>dynamic-content-widget-e300192-d092c5d</title>
			<pubDate><![CDATA[Wed, 26 Feb 2025 13:12:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/projects/iot-security-enhancement-for-smart-devices/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/projects/iot-security-enhancement-for-smart-devices/]]></link>
			<title>Iot Security Enhancement For Smart Devices</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/home-slider/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/home-slider/]]></link>
			<title>Home &#8211; Slider</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/home-video/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/home-video/]]></link>
			<title>Home &#8211; Video</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/pricing-plan/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/pricing-plan/]]></link>
			<title>Pricing Plan</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/image-gallery/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/image-gallery/]]></link>
			<title>Image Gallery</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/video-gallery/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/video-gallery/]]></link>
			<title>Video Gallery</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/testimonials/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/testimonials/]]></link>
			<title>Testimonials</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 13:09:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/faqs/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/faqs/]]></link>
			<title>FAQs</title>
			<pubDate><![CDATA[Sat, 22 Feb 2025 04:33:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-2]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/?elementskit_template=footer-layout-2]]></link>
			<title>Footer Layout 2</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 22:21:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-158ac34-9087451/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/elementskit-content/dynamic-content-widget-158ac34-9087451/]]></link>
			<title>dynamic-content-widget-158ac34-9087451</title>
			<pubDate><![CDATA[Tue, 21 Jan 2025 08:44:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://dialecticsecurity.com/]]></guid>
			<link><![CDATA[https://dialecticsecurity.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 29 Dec 2025 14:55:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
