<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://rezaadineh.com/2025/09/19/closing-the-loop-from-threat-modeling-to-soc-operations/</loc><lastmod>2025-09-19T17:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2025/08/05/detection-first-siem-rule-types-dashboards-and-strategic-visibility/</loc><lastmod>2025-08-05T21:57:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2025/07/26/10-rules-of-incident-response-the-practical-way/</loc><lastmod>2025-07-26T14:47:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2025/07/11/facing-the-right-enemy-making-threat-intelligence-personal/</loc><lastmod>2025-07-11T15:23:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/contact/</loc><lastmod>2023-03-24T19:38:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rezaadineh.com/about/</loc><image:image><image:loc>https://rezaadineh.com/wp-content/uploads/2023/02/reza-adineh-instructor.jpeg</image:loc><image:title>reza-adineh-instructor</image:title></image:image><lastmod>2023-03-24T19:38:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rezaadineh.com/2023/03/19/zero-trust-architecture-and-proactive-security-monitoring/</loc><lastmod>2023-03-19T14:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/16/data-driven-detection-and-decision-making-enhancing-cybersecurity-operations/</loc><lastmod>2023-03-16T12:35:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2020/04/22/example-post-3/</loc><lastmod>2023-03-12T21:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/12/reducing-cybersecurity-risk-practically-with-soc-leveraging-nist-csf-functions/</loc><lastmod>2023-03-12T20:13:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/08/a-quick-review-on-host-based-artifact-analysis-for-threat-detection-and-forensic-investigations/</loc><lastmod>2023-03-08T10:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/07/how-to-use-sysmon-to-detect-threats/</loc><lastmod>2023-03-07T08:38:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/06/creating-an-incident-response-playbook-best-practices-and-strategies/</loc><lastmod>2023-03-06T10:17:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/03/designing-an-effective-security-operations-center-architecture-incorporating-nist-csf-5-main-functions/</loc><lastmod>2023-03-06T08:59:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/05/threat-informed-defense-tid/</loc><lastmod>2023-03-05T13:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/05/cyber-threat-alignment-for-detection-efficiency/</loc><lastmod>2023-03-04T23:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/04/integrating-threat-intelligence-and-the-pyramid-of-pain-for-effective-threat-hunting/</loc><lastmod>2023-03-04T18:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/02/a-quick-review-on-pyramid-of-pain/</loc><lastmod>2023-03-02T20:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/02/using-the-mitre-attck-matrix-for-effective-threat-hunting/</loc><lastmod>2023-03-02T18:58:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/02/a-quick-guide-on-how-to-estimate-log-retention-and-log-rotation-policies/</loc><lastmod>2023-03-02T10:03:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/03/02/a-quick-guideline-for-how-to-estimate-or-calculate-your-eps-or-required-capacity/</loc><lastmod>2023-03-02T09:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/a-quick-review-on-anatomy-of-cyber-attacks-for-beginners/</loc><lastmod>2023-02-28T19:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/22/next-generation-cyber-security-operations-centers-challenges-benefits-and-best-practices/</loc><lastmod>2023-02-28T19:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/using-threat-informed-detection-approaches-for-implementing-prevention-and-detection-solutions-in-a-soc-and-mapping-to-the-nist-csf/</loc><lastmod>2023-02-28T19:40:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/a-useful-concepts-for-siem-assessment-implementing-a-siem-cmm-siem-capability-maturity-model-concepts/</loc><lastmod>2023-02-27T22:06:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/a-quick-review-on-soar-platforms/</loc><lastmod>2023-02-27T21:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/a-quick-review-on-siem-implementation-technical-capability-and-maturity-model/</loc><lastmod>2023-02-27T21:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/28/a-quick-review-on-using-ai-for-malware-generation/</loc><lastmod>2023-02-27T21:06:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/27/siem-solutions-a-guide-to-proper-capacity-management/</loc><lastmod>2023-02-27T19:24:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/23/osint-against-threats/</loc><lastmod>2023-02-23T10:47:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/22/using-threat-intelligence-to-conduct-effective-threat-hunting/</loc><lastmod>2023-02-22T13:05:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/22/use-the-soc-cmm-as-a-baseline-for-assessment-of-the-right-siem-you-might-need-to-consider/</loc><lastmod>2023-02-22T12:37:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/22/siem-assessment-via-yes-no-approaches/</loc><lastmod>2023-02-22T11:53:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/22/a-quick-review-on-cyber-security-challenges/</loc><lastmod>2023-02-22T09:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/21/adapting-to-the-evolving-cybersecurity-landscape-strategies-for-preventing-and-detecting-threats/</loc><lastmod>2023-02-21T20:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/21/is-predefined-correlation-useful/</loc><lastmod>2023-02-21T20:05:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/21/a-quick-review-on-modern-siem-and-traditional-siem/</loc><lastmod>2023-02-21T19:57:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/20/siem-soar-and-the-hive-cortex/</loc><lastmod>2023-02-20T19:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/20/do-you-think-your-siem-is-enough/</loc><lastmod>2023-02-20T19:14:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/20/is-your-siem-working-well-enough-an-introduction-to-threat-informed-security-monitoring/</loc><lastmod>2023-02-20T18:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/19/building-a-comprehensive-security-posture-the-zero-trust-architecture/</loc><lastmod>2023-02-18T20:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/11/a-quick-review-on-sans-sec-555-course-on-siem-with-technical-analytics/</loc><lastmod>2023-02-11T19:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/11/unlocking-the-power-of-siem-for-threat-detection-and-incident-response/</loc><lastmod>2023-02-10T23:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/11/threat-modelling-for-threat-detection/</loc><lastmod>2023-02-10T23:42:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/11/a-quick-review-on-the-security-operations-center-capability-maturity-model-framework/</loc><lastmod>2023-02-10T23:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-malware-reverse-engineering/</loc><lastmod>2023-02-09T09:35:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/zero-trust-architecture/</loc><lastmod>2023-02-09T09:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-cyber-threats-trends-and-perspective/</loc><lastmod>2023-02-09T00:01:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-the-evolution-of-siem-over-the-past-decade/</loc><lastmod>2023-02-08T23:58:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-siem-deployment/</loc><lastmod>2023-02-08T23:54:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-splunk/</loc><lastmod>2023-02-08T23:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/technical-checklist-for-evaluating-a-siem/</loc><lastmod>2023-02-08T23:46:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/blog-2/</loc><image:image><image:loc>https://rezaadineh.com/wp-content/uploads/2023/02/pics.webp</image:loc><image:title>pics</image:title></image:image><lastmod>2023-02-08T23:17:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-misp-malware-information-sharing-platform-and-threat-sharing/</loc><lastmod>2023-02-08T23:09:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/how-to-build-a-complete-solution-for-security-operation-and-security-monitoring-using-best-open-source/</loc><lastmod>2023-02-08T23:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-successful-forensic-investigation-key-factors/</loc><lastmod>2023-02-08T22:51:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-incident-response-process/</loc><lastmod>2023-02-08T22:49:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-siem/</loc><lastmod>2023-02-08T22:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-failure-reasons-of-cyber-security-operation/</loc><lastmod>2023-02-08T22:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/key-success-factor-of-a-cyber-security-operation/</loc><lastmod>2023-02-08T22:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/security-operations-center-generations/</loc><lastmod>2023-02-08T22:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-usage-of-threat-intelligence-for-threat-hunting/</loc><lastmod>2023-02-08T22:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/using-of-threat-intelligence-platform-for-successful-threat-detection-and-useful-correlation-in-siem/</loc><lastmod>2023-02-08T22:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-linux-lateral-movement-tactics-and-techniques/</loc><lastmod>2023-02-08T22:24:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/review-on-windows-lateral-movement-tactics-and-techniques/</loc><lastmod>2023-02-08T22:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/mapping-nist-csf-to-incident-response-process/</loc><lastmod>2023-02-08T22:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/threat-intelligence/</loc><lastmod>2023-02-08T22:15:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-the-mitre-attck-matrixa-quick-review-on/</loc><lastmod>2023-02-08T22:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-quick-review-on-nist-csf/</loc><lastmod>2023-02-08T22:08:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/a-technical-checklist-for-evaluating-a-next-gen-cloud-based-siem/</loc><lastmod>2023-02-08T21:36:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com/2023/02/09/technical-proposal-for-buying-a-security-information-and-event-management-siem-product-as-a-service/</loc><lastmod>2023-02-08T21:22:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rezaadineh.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-09-19T17:47:54+00:00</lastmod></url></urlset>
