<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    <url>
        <loc>https://citadelframe.com</loc>
        <image:image>
            <image:loc>https://citadelframe.com/images/citadel-frame-logo.svg</image:loc>
            <image:title>Citadel Frame Logo</image:title>
            <image:caption>Citadel Frame cybersecurity platform logo</image:caption>
        </image:image>
        <image:image>
            <image:loc>https://citadelframe.com/images/og-default.svg</image:loc>
            <image:title>Citadel Frame — AI-Powered Cybersecurity</image:title>
            <image:caption>Citadel Frame social preview card</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/windows-security-hardening-guide-2026</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/windows-security-hardening-guide-2026</image:loc>
            <image:title>The Complete Windows Security Hardening Guide for 2026</image:title>
            <image:caption>A step-by-step guide to hardening your Windows 10 and Windows 11 systems against modern cyber threats. Covers firewall configuration, service minimization, registry hardening, and more.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/ransomware-protection-strategies</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/ransomware-protection-strategies</image:loc>
            <image:title>How to Protect Your Business from Ransomware in 2026</image:title>
            <image:caption>Ransomware attacks are evolving rapidly. Learn the latest defense strategies including honeypot traps, entropy monitoring, behavioral analysis, and automated response techniques.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/iso-27001-compliance-guide</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/iso-27001-compliance-guide</image:loc>
            <image:title>ISO 27001 Compliance: A Practical Guide for Small Businesses</image:title>
            <image:caption>ISO 27001 certification doesn&#x27;t have to be overwhelming. This guide breaks down the requirements into manageable steps and shows how automated tools can simplify the process.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/dns-firewall-explained</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/dns-firewall-explained</image:loc>
            <image:title>What is a DNS Firewall and Why You Need One</image:title>
            <image:caption>DNS firewalls block malicious domains before they can connect to your system. Learn how DNS-level protection works and why it&#x27;s your first line of defense against phishing and malware.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/south-africa-cybersecurity-landscape</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/south-africa-cybersecurity-landscape</image:loc>
            <image:title>The State of Cybersecurity in South Africa: 2026 Report</image:title>
            <image:caption>South Africa ranks among the most targeted countries for cybercrime. Explore the latest threat statistics, emerging attack vectors, and what organizations can do to protect themselves.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Blog/ai-powered-threat-detection</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/blog/ai-powered-threat-detection</image:loc>
            <image:title>How AI is Transforming Threat Detection in Endpoint Security</image:title>
            <image:caption>Artificial intelligence is revolutionizing how we detect and respond to cyber threats. From behavioral analysis to predictive defense, learn how AI-powered security works.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-built-in-av</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-built-in-av</image:loc>
            <image:title>Citadel Frame vs Built-in Windows AV</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and Built-in Windows AV</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-on-demand-scanner</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-on-demand-scanner</image:loc>
            <image:title>Citadel Frame vs On-Demand Scanner</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and On-Demand Scanner</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-legacy-suite</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-legacy-suite</image:loc>
            <image:title>Citadel Frame vs Legacy Suite</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and Legacy Suite</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-premium-av</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-premium-av</image:loc>
            <image:title>Citadel Frame vs Premium AV</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and Premium AV</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-foreign-jurisdiction-av</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-foreign-jurisdiction-av</image:loc>
            <image:title>Citadel Frame vs Foreign-Jurisdiction AV</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and Foreign-Jurisdiction AV</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Compare/vs-lightweight-av</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/compare/vs-lightweight-av</image:loc>
            <image:title>Citadel Frame vs Lightweight AV</image:title>
            <image:caption>Side-by-side comparison of Citadel Frame and Lightweight AV</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Guides/complete-windows-hardening-guide-2026</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/guide/complete-windows-hardening-guide-2026</image:loc>
            <image:title>The Complete Windows Hardening Guide for 2026</image:title>
            <image:caption>Every setting, policy, and control a modern Windows endpoint should have &#x2014; explained, prioritised, and automatable.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Guides/ransomware-protection-guide-2026</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/guide/ransomware-protection-guide-2026</image:loc>
            <image:title>How to Stop Ransomware on Windows in 2026</image:title>
            <image:caption>Defending Windows endpoints against modern ransomware requires five layers. Here they are, in priority order.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Guides/dark-web-breach-monitoring-explained</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/guide/dark-web-breach-monitoring-explained</image:loc>
            <image:title>Dark-Web Breach Monitoring, Honestly Explained</image:title>
            <image:caption>The marketing is murky. Here&#x27;s what breach monitoring actually does &#x2014; and doesn&#x27;t.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Guides/ai-in-cybersecurity-explained</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/guide/ai-in-cybersecurity-explained</image:loc>
            <image:title>AI in Cybersecurity &#x2014; What Actually Works in 2026</image:title>
            <image:caption>AI is in every security product&#x27;s marketing deck. Here&#x27;s what&#x27;s real, what&#x27;s useful, and what&#x27;s noise.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://citadelframe.com/Guides/popia-compliance-for-small-business-south-africa</loc>
        <image:image>
            <image:loc>https://citadelframe.com/og/guide/popia-compliance-for-small-business-south-africa</image:loc>
            <image:title>POPIA Compliance for Small Businesses in South Africa</image:title>
            <image:caption>POPIA isn&#x27;t optional and isn&#x27;t just for banks. This is the shortest honest path to compliance for a South African small business.</image:caption>
        </image:image>
    </url>
</urlset>
