<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le mai 20, 2026 à 6:44 pm par All in One SEO Pro v4.9.6.2 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.synetis.com/default-sitemap.xsl?sitemap=post"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xhtml="http://www.w3.org/1999/xhtml"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/]]></loc>
		<lastmod><![CDATA[2026-03-10T12:23:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<xhtml:link rel="alternate" hreflang="en" href="https://www.synetis.com/en/blog/" />
		<xhtml:link rel="alternate" hreflang="fr" href="https://www.synetis.com/blog/" />
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/reconnaitre-hameconnage.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/attaque-apt.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/auditer-configuration-ad.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/federation-identite.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/6620126.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/ecran-d-ordinateur-portable-avec-informations-techniques.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/au-coeur-de-la-gestion-des-acces-experience-de-cedric-manager-access-management/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:38:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/DERVAL-Cedric-2-.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/carriere-cybermenaces-actuellesdecouvrez-adrien-analyste-cert/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:30:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/parole-expert-cert.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lintegration-chez-synetis-une-immersion-a-travers-evenements-et-rencontres/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:29:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/integration-synetis-immersion.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-coulisses-de-la-cybersecurite-temoignage-dun-enterprise-account-manager/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:29:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/coulisses-cyber-temoignage-eam.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/happy-trainees-mon-stage-chez-synetis/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:26:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/happy-trainees-stage-synetis.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-pauline-touche-de-feminite-dans-la-cyber/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:25:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Pauline-feminite-cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-le-quotidien-dun-consultant-grc-gouvernance-risques-et-conformite/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:25:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/quotidien-consultant-grc.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-le-quotidien-dun-analyste-cert-ransomware-intrusion-protection-des-si/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:24:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/quotidien-analyste-cert.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-ghizlane-consultante-grc-une-passionnee-de-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:23:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Ghizlane-passionne-cybersecurite.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Synetis_trimestrielle_Juin2022.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-idir-tech-leader-pam-challenges-et-bonne-ambiance/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:22:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Idir-tech-leader-pam.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/coulisses-dun-stage-passionnant-temoignage-edouard/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:22:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/stage-temoignage-edouard.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/vision-a-long-terme-et-excellence-operationnelle-rencontre-avec-frederic-le-landais-directeur-des-operations-de-synetis/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:13:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Frederic.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/DSC02423.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/de-lintegration-a-la-mission-mon-experience-chez-synetis/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:12:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/photo_collab_temoignage_Hugo.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-anne-marie-et-sa-fonction-clef-dans-la-cyber/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:11:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/DE-MACEDO-Anne-Marie.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-corentin-consultant-grc/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:08:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/BARRAUX-Corentin-2-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Barcelone_Synetis_2018.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-la-gestion-de-projets-a-travers-les-yeux-dhakim/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:06:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Hakim-AMIEL-BANAHA-1-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-levolution-de-synetis-a-travers-damien/]]></loc>
		<lastmod><![CDATA[2026-05-19T11:01:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/photo_collab_Damien.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-comprendre-le-ciam/]]></loc>
		<lastmod><![CDATA[2026-05-19T10:57:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/REY-Patrice.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-liga-naura-plus-de-secret-pour-vous/]]></loc>
		<lastmod><![CDATA[2026-05-19T10:54:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Mael-ASTIER-1-.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/rencontre-avec-ludovic-responsable-it-complice-du-rssi/]]></loc>
		<lastmod><![CDATA[2026-05-19T10:50:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Ludovic-Malle.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-recrute-son-nouveau-directeur-commercial-damien-frey/]]></loc>
		<lastmod><![CDATA[2026-05-19T10:48:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Damien-Frey-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Damien-FREY_VF.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-cert-en-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-17T12:14:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/cert-cybersecurite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/premiers-pas-protection-exfiltration-de-donnees/]]></loc>
		<lastmod><![CDATA[2026-05-16T20:47:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Protection-exfiltration-donnees.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ia-et-detection-cyber-perspectives-operationnelles-soc/]]></loc>
		<lastmod><![CDATA[2026-05-11T11:29:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/IA-detection-cyber-SOC.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/optimiser-budget-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-11T10:00:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/freepik_wang_18_02_2022_21.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/notions-de-cryptologie-et-algorithme-de-chiffrement/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:54:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/01/notions-de-cryptologie.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/passgan-cracking-de-mots-de-passe-via-machine-learning/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:52:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/PassGAN.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-titre-de-mon-article/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:49:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/shadow-it.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-quun-soc/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:43:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/digital-eye-futuristic-ai-technology-concept.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-numerique-les-fondamentaux-pour-renforcer-votre-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:43:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/image-human-eye-process-scanning-mixed-media.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cartographiez-les-risques-la-boussole-de-securite-de-votre-chatbot/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:43:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/Cartographie-risques-chatbot.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/a-lere-du-cloud-la-securite-au-coeur-de-la-sante/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:42:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cloud-securite-sante.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://v2.synetis.com/wp-content/uploads/2025/08/securite-sante-schema_2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://v2.synetis.com/wp-content/uploads/2025/08/securite-sante_cas3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/amsi-antivirus/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:39:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/amsi-antivirus-protections.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/au-coeur-des-cybermenaces-temoignage-danthony-manager-audit/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:37:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cybermenaces-temoignage-anthony.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/audit-securite-active-directory/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:37:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/audit-securite-ad.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/10/568d603128b33c4d6fbaa62f.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/beef-the-browser-exploitation-framework-project/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:37:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/beef-browser-exploitation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/biometrie-auditive-nouveau-facteur-dauthentification/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:36:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/biometrie-auditive-facteur-authentification.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/03/0701-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/03/0701-02.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-ce-quune-attaque-par-bruteforce/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:36:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/abstract-cybersecurity-concept-design.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/bypass-csrf-token-referer-protection-avec-une-xss/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:36:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/bypass-csrf-token.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/05/CSRF_bypass_scenario.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-fonctionne-un-pentest/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:35:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/comment-fonctionne-un-pentest.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-reconnaitre-et-contrer-une-campagne-de-phishing/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:35:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reconnaire-et-contrer-phishing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-se-proteger-ransomware/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:35:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ransomwares-danger-et-conseils.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/11/ransomware_effets.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cryptanalyse-statistique/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:34:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cryptanalyse-statistique-mot-de-passe.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/franceconnect-futur-de-lidentite-numerique-francais/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:31:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/france-connect-futur-identite-numerique.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gestion-des-identites-et-des-acces-comprendre-le-ciam-un-accelerateur-au-service-du-business/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:30:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/gestion-identites-et-des-acces-comprendre-CIAM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/illustrations-attaques-sur-le-wifi/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:30:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/illustration-attaque-wifi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-securite-dun-sih-un-enjeu-majeur/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:28:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/securite-SIH.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-ce-que-le-smishing/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:27:38+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/smishing.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-principe-des-audits-de-systemes-industriels/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:26:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/audit-systemes-industriels.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-femmes-en-cybersecurite-brisons-les-stereotypes/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:26:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/femmes-cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-nouveautes-de-signgo-5-2-dilex/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:25:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Signgo-ILEX.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/11/authent-hors-bande-SnG.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/limportance-de-la-cyber-hygiene-en-entreprise-5-conseils-pour-une-securite-informatique-renforcee/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:25:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cyber-hygiene-entreprise.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2024-01-05-15_51_43-Cybersecurite-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/limportance-des-audits-de-securite-pour-une-entreprise/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:25:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/importance-audit-securite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lintrusion-physique-un-risque-pour-la-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:21:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/intrusion-physique-risque-cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/reussir-la-mise-en-conformite-de-ses-systemes-dinformations-dimportance-vitale-siiv/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:19:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/mise-conformite-SIIV.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://v2.synetis.com/wp-content/uploads/2025/08/Mesures-LPM.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://v2.synetis.com/wp-content/uploads/2025/08/Cycle-homologation-LPM.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ordinateurs-quantiques-et-cryptologie/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:19:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ordinateur-quantique-cryptologie.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-david-tech-lead-auditor/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:18:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Parole-expert-audit-pentest.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-tests-dintrusion-ingenierie-sociale-red-teaming-decouvrez-arzhel-expert-en-securite-offensive/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:18:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Parole-expert-securite-offensive.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/plongez-au-coeur-de-la-cti-avec-noemie/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:18:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Au-coeur-de-la-CTI.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-ce-quun-scan-de-vulnerabilite-et-pourquoi-est-il-important-pour-votre-entreprise/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:17:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Scan-de-vulnerabilite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/privexchange-lescalade-de-privilege-ad-via-exchange-web-services/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:17:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Priv-exchange.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/01/privexchange-drawing.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/protection-des-oiv-de-nouveaux-arretes-dans-le-cadre-de-la-loi-lpm/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:17:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/protection-OIV.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/realiser-un-audit-wifi/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:11:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/realiser-audit-wifi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/retour-sur-un-pentest-hardware-reussi/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:10:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/pentest-harware-reussi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/risques-associes-aux-delegations-kerberos/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:10:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/risques-kerberos.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/safer-internet-day-renforcez-votre-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:10:04+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/safer-internet-day.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/saml-raider-lextension-saml-pour-burp/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:09:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Saml-raider.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/02/Burp-Suite-Pro.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/02/message_editor.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/02/certificate_management.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/se-premunir-contre-les-attaques-ransomwares/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:05:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/attaques-ransomwares.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/scheme_Proocess_ransomware-01.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/secnumcloud-et-iso-iec-27001-quelle-norme-pour-la-securite-du-cloud/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:05:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/norme-securite-cloud.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-le-wps-de-plus-en-plus-friable/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:04:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/WPS.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/09/Logo-WPSR-J-10063-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/09/WPS-8bitsPIN.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/09/WPS-checksum.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/security-txt-un-nouveau-standard-pour-alerter-de-maniere-responsable/]]></loc>
		<lastmod><![CDATA[2026-05-06T09:04:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cyberespace-numerique-avec-particules-et-connexions-reseau-de-donnees-numeriques.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/09/security.txt.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/09/security.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/techniques-pour-de-nouveaux-mots-de-passe/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:58:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Password.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/test-dintrusion-redteam-bugbounty-comment-sy-retrouver/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:57:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/interface-futuriste-avec-des-points-de-controle.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/tests-dintrusion-lapproche-red-team/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:57:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/un-clavier-avec-la-lettre-m-dessus.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/tout-ce-que-vous-avez-toujours-voulu-savoir-a-propos-dun-audit-de-securite-informatique/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:56:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/un-ordinateur-avec-une-interface-futuriste.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/using-ad-lds-to-create-new-views-of-active-directory-data/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:51:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/une-representation-numerique-des-dossiers-sur-un-clavier-d-ordinateur-portable-symbolisant-la-gestion-des-donnees.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cyberattaques-jusquou-ou-quand-votre-organisation-peut-elle-se-cacher/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:51:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/there-is-red-black-image-computer-shield.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-federation-didentites/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:51:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/federation-identite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/prevenir-les-attaques-apt/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:50:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/attaque-apt.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/reconnaitre-et-contrer-lhameconnage-avant-quil-ne-soit-trop-tard/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:36:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/reconnaitre-hameconnage.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/mttd-mttr-et-equation-de-la-performance-en-detection-au-sein-dun-soc/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:36:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/MTTD-MTTR.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/schema-2-soc-synetis.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/SOC_SYNETIS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/leak-me-im-famous/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:35:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/12/leak-me-im-famous.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/telechargement.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cybersecurite-le-point-sur-les-tendances-qui-ont-marque-2025/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:34:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/12/Tendances-cyber-2025-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/keynectis-opentrust-lance-son-nouveau-cms/]]></loc>
		<lastmod><![CDATA[2026-05-06T08:34:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/12/cms-gestion-identite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/de-la-gestion-de-projet-a-la-direction-dequipe-rencontre-avec-remi-habraken-practice-manager-securite-operationnelle-chez-synetis/]]></loc>
		<lastmod><![CDATA[2026-05-04T08:48:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/DSC_6214.webp]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/de-lalternance-au-cdi-rencontre-avec-titouan-le-berre-analyste-soc-au-sein-de-synetis/]]></loc>
		<lastmod><![CDATA[2026-04-29T14:54:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Titouan-Le-Berre-e1776952357585.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Titouan-Le-Berre-e1776672945891.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/audit-flash-iam-pourquoi-quelques-jours-danalyse-valent-mieux-que-des-annees-de-certitudes-retour-dexperience/]]></loc>
		<lastmod><![CDATA[2026-04-29T09:48:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Audit-flash-IAM.webp]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lhumain-au-coeur-de-la-strategie-rencontre-avec-aline-roy-drh-de-synetis/]]></loc>
		<lastmod><![CDATA[2026-04-22T09:10:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Aline-Roy.webp]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Aline-Roy-1024x683.webp]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-honeypots-au-service-dactive-directory/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:41:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/digital-interface-with-multiple-files-folders-computer-screen.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/red-team-blue-team-renforcer-sa-cyberdefense/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:40:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/futuristic-digital-grid-with-red-blue-glowing-network-connections-abstract-technology-mesh.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-25eme-edition-des-assises-de-la-cybersecurite/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:39:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/Assises-2025-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Eric-Derouet-CEO-synetis.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-threat-hunting-un-investissement-strategique-pour-la-resilience-de-votre-entreprise/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:35:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/threat-hunting.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lillusion-de-la-securite-ca-narrive-quaux-autres/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:27:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/Illusion-securite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/de-linertie-a-lagilite-comment-le-renseignement-sur-les-menaces-cti-renforce-la-resilience-de-lindustrie-europeenne/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:25:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/Renseignement-sur-les-menaces.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/tld-et-cybersecurite-pourquoi-votre-pare-feu-devrait-bloquer-certains-domaines-de-premier-niveau/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:24:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/ai-powered-device-concept.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/de-la-gestion-statique-a-lacces-juste-a-temps-jit-le-futur-dynamique-du-pam/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:23:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/Just-in-time.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/groupes-cybercriminels-en-2025-cartographie-dune-menace-industrielle/]]></loc>
		<lastmod><![CDATA[2026-04-22T08:21:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2026/03/c57e98a5-9591-489f-8299-014f3c1951c7.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-conseil-superieur-du-notariat-csn-deploie-id-not-lidentite-numerique-notariale/]]></loc>
		<lastmod><![CDATA[2025-12-15T17:07:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/CSN-ID.not_.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/10/csn_400x300pix-300x200.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/openldap-changer-le-moteur-de-backend-pour-mdb/]]></loc>
		<lastmod><![CDATA[2025-12-15T17:01:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OpenLDAP.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-securite-operationnelle-composante-essentielle-de-la-cybersecurite-de-votre-entreprise/]]></loc>
		<lastmod><![CDATA[2025-12-15T16:50:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Securite-operationnelle-blog.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-faille-heartbleed/]]></loc>
		<lastmod><![CDATA[2025-12-15T16:37:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/faille-heartbleed.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/bd-480x1024.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comprendre-levolution-de-la-directive-nis1-a-nis2/]]></loc>
		<lastmod><![CDATA[2025-12-15T16:18:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/evolution-nis-1-nis-2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2024-01-24-18_26_56-NIS2-Directive-_-Prepare-Your-Organization-Now.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pourquoi-faire-de-la-segregation-of-duties-sod/]]></loc>
		<lastmod><![CDATA[2025-12-15T16:08:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Segregation-of-duty.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/02/index.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-passwords-manager-mobiles-nombreuses-faiblesses-de-securite/]]></loc>
		<lastmod><![CDATA[2025-12-15T15:56:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/passwords-manager.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/07/password-150x150.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/reglement-dora-guide-complet-pour-se-preparer/]]></loc>
		<lastmod><![CDATA[2025-12-15T15:27:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reglement-dora-guide-complet.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Illustration-DORA-1024x585.webp]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Illustration-DORA-2-1024x585.webp]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/chiffrement-des-postes-attention-aux-mises-a-jour-windows/]]></loc>
		<lastmod><![CDATA[2025-12-15T15:24:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/chiffrement-postes-windows.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/simulation-adversaire-avec-caldera/]]></loc>
		<lastmod><![CDATA[2025-12-15T15:11:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/simulation-adversaire-Caldera.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pca-et-pra-les-piliers-de-votre-continuite-dactivite/]]></loc>
		<lastmod><![CDATA[2025-12-15T14:31:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/PCA-PRA.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/processus-smsi-superflux-ou-indispensables/]]></loc>
		<lastmod><![CDATA[2025-12-15T14:25:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/07/processus-smsi-superflux-indispensables.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/processus-SMSI.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/schema_processus_PDCA.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/tableau-docs-obligatoires.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/presentation-de-brainwave-identity-grc/]]></loc>
		<lastmod><![CDATA[2025-12-15T14:22:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Brainwave-identity-GRC.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2012/12/logo_brainwave_transparence.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/primx-zonecentral-logiciel-de-chiffrement-des-donnees-in-place/]]></loc>
		<lastmod><![CDATA[2025-12-15T14:04:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/primx-zone-centrale.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Primx_Logo_Zone_Central_baseline_large-1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/aes128-vs-aes256-quelles-differences/]]></loc>
		<lastmod><![CDATA[2025-12-15T13:48:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/aes128-vs-aes256.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/qualification-pris-definition-et-importance/]]></loc>
		<lastmod><![CDATA[2025-12-15T13:46:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/qualification-PRIS.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2024-02-12-14_47_39-Article-blog-PRIS-rev02.docx-Google-Docs.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/wallix-wab-access-manager-le-1er-portail-web-dacces-unifie-de-gestion-des-comptes-a-privileges/]]></loc>
		<lastmod><![CDATA[2025-12-15T13:39:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/interaction-avec-l-interface-numerique.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/centrify-et-la-solution-cloud-de-sso-basee-sur-active-directory/]]></loc>
		<lastmod><![CDATA[2025-12-15T12:13:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/centrify-solution-cloud-sso.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/05/Centrify.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/05/Centrify_compatibility-300x148.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/trame-ethernet-definition-et-securisation/]]></loc>
		<lastmod><![CDATA[2025-12-15T12:09:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/trame-ethernet.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Illustration-Trame-Ethernet.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/attaques_auxiliaires/]]></loc>
		<lastmod><![CDATA[2025-12-15T11:12:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/attaques-par-canaux-auxiliaires.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/04/bruit-electromagnetique.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/oauth2-et-oidc-deux-petites-histoires/]]></loc>
		<lastmod><![CDATA[2025-12-15T11:02:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OAuth2-et-OIDC.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/methodologie-dosint-orientee-reseaux-sociaux/]]></loc>
		<lastmod><![CDATA[2025-12-15T10:49:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/methodologie-osint-reseaux-sociaux.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/etablir-un-reverse-shell-en-une-ligne/]]></loc>
		<lastmod><![CDATA[2025-12-15T10:03:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reverse-shell-une-ligne.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2012/12/Terminal.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-du-cloud-conseils-et-bonnes-pratiques-pour-maitriser-ses-donnes/]]></loc>
		<lastmod><![CDATA[2025-11-26T10:43:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Securite-Cloud.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/zoom-sur-les-attaques-par-captcha/]]></loc>
		<lastmod><![CDATA[2025-10-06T09:55:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/05/zoom-attaques-captcha.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Attaque-par-captcha.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/un-exemple-dune-attaque-par-captcha.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/rancongiciels-une-menace-en-pleine-expansion/]]></loc>
		<lastmod><![CDATA[2025-10-06T09:12:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/07/RAW3FCF.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/auditer-la-configuration-de-son-active-directory/]]></loc>
		<lastmod><![CDATA[2025-10-06T09:04:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/10/auditer-configuration-ad.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pourquoi-auditer-la-configuration-de-son-annuaire-active-directory/]]></loc>
		<lastmod><![CDATA[2025-10-06T08:49:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Audit-AD.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/1er-partenaire-primx/]]></loc>
		<lastmod><![CDATA[2025-10-05T23:02:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/synetis-premier-partenaire-primx.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/primx-logo-make-encryption-happen.webp]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/4-etapes-essentielles-pour-securiser-votre-active-directory/]]></loc>
		<lastmod><![CDATA[2025-10-05T23:01:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/etapes-securiser-AD.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/5-idees-recues-sur-la-gouvernance-risques-et-conformite-grc/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:59:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/idees-recues-grc.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/active-directory-on-peut-desormais-interdire-une-liste-de-500-mots-de-passe-les-plus-courants/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:56:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/AD-Liste-500-mots-de-passe.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/authentication-methods-password-protection-300x185.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/BPL1-300x233.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/adfs-3-0-and-openam-to-federate-not-compatible-saml-applications/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:50:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/adfs3.0-open-AM.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/11/schema_OpenADFS_federation-300x209.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/11/diagramme-300x153.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/aes-et-le-secure-file-transfer/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:47:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/AES-secure-file-transfer.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/07/article-saad-1024x654.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/assureurs-et-maitrise-des-risques/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:43:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/assureurs-maitrise-risques.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/processus-ACPR.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Fonctionnement_SI-ACPR.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/securiser_le_SI_ACPR.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/attaque_mobile/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:40:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/applications-mobile-vecteur-attaque.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/04/blog-1024x566.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/attaques-de-soft-token-mitigations/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:35:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/attaque-soft-taken.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa-apps-2-500-300x229.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/pingid-300x106.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/au-coeur-dun-projet-iga-recit-dune-collaboratrice/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:24:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/projet-iga-recit-collaboratrice.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/authentification-forte-soft-token/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:16:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/authentification-forte-soft-token.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/07/activ-soft-token-app_0-150x150.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/authentification-totp/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:14:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/authentification-totp.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/01/free-otp-176x300.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/benefices-cyber-threat-intelligence-organisations/]]></loc>
		<lastmod><![CDATA[2025-10-05T22:02:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/benefices-cti-organisations.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/tableau-cti-768x368.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/biometrie-la-fin-du-badge-et-du-mot-de-passe/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:55:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/biometrie-fin-du-badge.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/06/biometrics-market-share.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/06/biometrics-by-app.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/06/tableau-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/06/illustration-300x284.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/blockchain-et-iot-un-duo-gagnant/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:54:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/blockchain-iot.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/05/BTCEUR-graphic.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/byod-ou-cope-un-dilemme-pour-la-dsi/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:53:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/byod-ou-cope-dsi.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/centre-de-services-identite-numerique-decouvrez-le-quotidien-daline/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:40:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/centre-de-service-in-aline.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/champion-de-la-croissance-francaise-2023/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:33:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Synetis-champion-croissance-francaise.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Champion_croissance_2023-1024x624.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/choisir-un-prestataire-de-reponses-a-incidents-cert-guide-pour-les-dsi-et-rssi/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:30:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/choisir-prestaire-cert-guide.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Checklist_CERT.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ciso-rssi-4-axes-majeurs-de-reussite-dune-roadmap/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:26:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ciso-rssi-roadmap.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/sche%CC%81ma-transfonuum-01.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Top-15-cyber-threats3--1024x727.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/une-collaboration-renforcee-pour-une-meilleure-securisation-des-si/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:21:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/collaboration-securisation-si.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/synetis-yubico-blanc-3-1024x683.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cl0p-fait-son-grand-retour-le-groupe-de-ransomware-exploite-de-nouvelles-failles/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:19:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cl0p-retour-groupe-ransomware.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-deployer-un-service-de-securite-manage/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:18:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/deployer-service-de-securite-manage.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-gerer-les-comptes-a-privileges-dans-votre-organisation/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:16:49+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/gerer-comptes-privileges-organisation.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-lia-optimise-t-elle-la-defense-des-equipes-du-soc-contre-le-ransomware/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:08:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ia-defense-soc.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-sont-protegees-les-communications-de-nos-institutions-gouvernementales/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:05:20+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/proteger-communications-gouvernement.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comptes-partages-comment-les-gerer/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:02:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/comptes-partages-gerer.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/mozilla-http-response-splitting-et-xss-vulnerabilites/]]></loc>
		<lastmod><![CDATA[2025-10-05T21:00:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Mozilla-http-response.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/coupes-budgetaires-sous-trump-quels-sont-les-impacts-pour-les-cves/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:53:10+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/coupe-budgetaire-trump.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cve-2020-11997-decouverte-dune-vulnerabilite-sur-apache-guacamole/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:49:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/vulnerabilite-apache.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/couche-applicative-guacamole-768x838.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-29-a%CC%80-13.01.39-768x690.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-29-a%CC%80-13.04.50-768x646.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cyber-hygiene-les-bons-gestes-a-retenir-conseils/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:47:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cyber-hygienne-bons-gestes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cyber-resilience-entre-mythe-et-pragmatisme/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:45:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cyber-resilience-mythes-pragmatisme.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/01/aspects_NIST.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/01/modele_cyber_resilient-1024x573.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cyberark-se-proteger-des-attaques-sur-les-domaines-ad-et-kerberos/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:31:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cyberArk-proteger-attaques-ad.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cybercriminalite-en-france-les-enseignements-du-panocrim-par-le-clusif/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:26:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cybercriminalite-france.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/cybersecurite-quels-sont-les-dispositifs-mis-en-place-au-sein-dun-soc-manage/]]></loc>
		<lastmod><![CDATA[2025-10-02T15:08:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/cybersecurite-dispositifs-soc-manage.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-11-27-16_10_42-Security-Center-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-11-27-16_13_27-Security-Center-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-11-27-16_23_23-Data-Security-Room-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/dans-les-coulisses-du-challenge-ctf-stranger-case/]]></loc>
		<lastmod><![CDATA[2025-10-02T14:56:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/coulisses-challenge-ctf.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Stranger-Case_FB.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-les-enjeux-rse-de-synetis-avec-louise/]]></loc>
		<lastmod><![CDATA[2025-10-02T14:18:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Enjeux-rse-Louise.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-levolution-de-bastien-consultant-secop/]]></loc>
		<lastmod><![CDATA[2025-10-02T14:17:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/evolution-bastien-consultant-secop.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/decouvrez-notre-summer-academy-et-lexperience-de-nicolas/]]></loc>
		<lastmod><![CDATA[2025-10-02T13:56:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Summer-academy-nicolas.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/developpement-du-teletravail-democratisation-des-vpn/]]></loc>
		<lastmod><![CDATA[2025-10-02T13:53:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Teletravail-VPN.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-11-a%CC%80-11.19.22-1024x622.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-11-a%CC%80-11.21.43-1024x504.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-11-a%CC%80-11.25.16.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/directive-nis-2-guide-complet-pour-reussir-sa-mise-en-conformite/]]></loc>
		<lastmod><![CDATA[2025-10-02T13:47:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Directive-NIS2-guide-complet.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Infographie-NIS2-614x1024.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/custom-event-handlers-in-oim-11g-from-oim-dev-guide/]]></loc>
		<lastmod><![CDATA[2025-10-02T13:39:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/custom-event-handlers.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/etat-des-lieux-les-solutions-dauthentification-forte-2fa/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:21:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Etat-des-lieux-solutions-2FA.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2FAsms-300x217.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa-apps-2-500-300x229.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/pingid-300x106.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa-twitter-500-300x131.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/2fa-proper-3-500-300x85.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/sound-proof-300x202.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/federation-des-identites-principes-et-dangers/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:18:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Federation-identites-principes-dangers.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/fido-nouveau-standard-authentification/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:13:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Fido-nouveau-standard-authentification-cyber.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/fido1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/fim-devient-microsoft-identity-manager/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:09:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/FIM-Microsoft-identity-Manager.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gerer-une-politique-de-mots-de-passe-avec-openldap/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:04:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/gerer-politique-mot-de-passe-OpenLDAP.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/openldap.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gestion-des-acces-privilegies-pam-2/]]></loc>
		<lastmod><![CDATA[2025-10-01T15:02:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Gestion-acces-privilegies-PAM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gestion-mots-de-passe/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:46:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Gestion-mots-de-passe-backend.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/12/Terahash-cluster-of-448x.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/grc-du-droit-a-la-cybersecurite-il-ny-a-quun-pas/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:44:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/GRC-droit-cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/phishing-le-guide-de-survie-by-synetis/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:39:18+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Phishing-guide-cyber.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-google.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-Googie-1024x305.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-2022-05-31-a%CC%80-14.29.22-1024x635.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-2022-05-31-a%CC%80-14.31.43-1024x720.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-2022-05-31-a%CC%80-14.33.25-1024x130.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/hsts-le-protocole-https-strict-standardise/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:31:05+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/HSTS-protocole-HTTPS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/iam-vs-idaas-etat-des-lieux-de-la-gestion-des-identites-dans-le-cloud/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:28:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/IAM-vs-IDaaS-etat-des-lieux.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/03/IDaaS.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ilex-la-federation-didentite-une-technologie-fiable-et-eprouvee/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:26:34+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Ilex-federation-identite.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2012/09/tn_ilex2.gif]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ilex-les-nouveautes-de-meibo-6/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:22:01+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ILEX-nouveautes-Meibo-6.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/11/rest-150x150.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/11/supervision.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ilex-les-nouveautes-de-signgo-6-0/]]></loc>
		<lastmod><![CDATA[2025-10-01T14:05:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ILEX-Sign-Go-6.0.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/05/sng_admin-300x233.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/05/sng-rescue-169x300.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/05/sng-update-300x205.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-importer-des-passwords-haches-dune-base-sql-vers-un-ldap/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:57:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/importer-password-haches-SQL-LDAP.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ingenierie-sociale-le-piege-le-plus-insidieux-des-cyberattaques/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:55:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ingenierie-sociale-piege-cyberattaques.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/integrer-lauthentification-forte-dans-ses-developpements-otp/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:49:46+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/integrer-authentification-forte-otp.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/02/gauth-300x205.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/introduction-a-la-methodologie-de-lopen-source-intelligence-osint/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:46:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/intro-methodologie-osint.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/Capture-de%CC%81cran-2021-02-17-a%CC%80-11.36.47.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/Capture-de%CC%81cran-2021-02-17-a%CC%80-11.40.24.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/Capture-de%CC%81cran-2021-02-17-a%CC%80-11.45.24.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/Capture-de%CC%81cran-2021-02-17-a%CC%80-12.05.45.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-caisse-depargne-ile-de-france-et-synetis-lancent-cybersecur/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:34:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/caisse-epargne-idf-cybersecure.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-solution-de-chiffrement-zed-de-lediteur-primx-arrive-sur-smartphone/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:08:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ZED-arrive-sur-smartphone.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/11/zed__prim_x_technologies.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/la-summer-academy-un-programme-intensif-pour-booster-votre-carriere-en-cybersecurite/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:06:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Summer-academy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lanssi-publie-des-recommandations-sur-lutilisation-securisee-de-zed/]]></loc>
		<lastmod><![CDATA[2025-10-01T13:05:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ANSSI-ZED.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-protocole-bitt0rrent/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:50:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/protocole-bitt0rent.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/12/webserver-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/12/bitorrent_architecture.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2019/12/protocole_btorrent.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-rgs-une-bonne-opportunite-pour-faire-de-la-securite-au-sein-des-collectivites-locales/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:49:11+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/RGS-collectivite-locales.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-siem-2-0/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:42:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Siem-2.0.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2017/08/article-Gr%C3%A9goire-SIEM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-single-sign-on/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:40:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Single-sign-on.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-certificats-ssl/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:37:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/certificats-ssl.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/03/cert1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/04/cert2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-cles-pour-maitriser-son-projet-iga/]]></loc>
		<lastmod><![CDATA[2025-10-01T12:32:44+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Cles-maitriser-projet-iga.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-meilleures-pratiques-de-securisation-dun-ad/]]></loc>
		<lastmod><![CDATA[2025-10-01T09:25:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/meilleures-pratiques-secu-AD.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/06/ms_active_directory-300x134.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-otp-par-sms-plus-pour-les-banques-europeennes/]]></loc>
		<lastmod><![CDATA[2025-10-01T09:22:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OTP-sms-banque-euro.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Image-article-otp.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-passkeys-la-solution-qui-reconcilie-simplicite-et-securite/]]></loc>
		<lastmod><![CDATA[2025-10-01T09:18:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Passkeys-solution.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-05-12-16_00_16-Article-PassKeys-Google-Docs.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-05-12-16_03_33-Article-PassKeys-Google-Docs.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-protocoles-securises-principes-et-fonctionnements/]]></loc>
		<lastmod><![CDATA[2025-10-01T09:16:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/protocoles-securises-principe-fonctionnement.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/lintegration-de-solutions-quels-procedes/]]></loc>
		<lastmod><![CDATA[2025-10-01T09:07:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/integration-solutions-procedes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-ce-que-le-shadow-it/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:57:16+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/shadow-it.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/mdr-edr-as-a-service-ndr-xdr-comment-choisir-la-meilleure-approche-pour-votre-securite-informatique/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:56:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/meilleur-approche-securite-informatique.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/microsoft-mim-integre-un-outil-de-gestion-des-privileges-pam/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:48:27+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/MIM-gestion-privileges.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/PAMFIM-300x106.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/09/MIM-PAM-300x199.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/microsoft-et-sa-modern-authentication/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:45:32+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Microsoft-modern-autthentification.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_1-300x274.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_2-300x224.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_Oauth_1-300x171.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_Oauth_2-300x172.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_Oauth_3-300x170.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/12/ADAL_Oauth_4-300x142.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/mise-en-place-de-signature-de-code-avec-une-yubikey-dans-un-contexte-windows/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:42:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/signature-de-code-yubikey.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/exemple-dexecutable.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/interface-yubikey-manager.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/onglet-yubikey-manager.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/configuration-certificat.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/certificat-ordinateur-local.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/certificat-importe%CC%81.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/PIN-cryptographique-.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/interface-yubikey-manager-300x162.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/onglet-yubikey-manager-300x173.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/ecran-configuration-PIN-300x70.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/ecran-change-PIN-300x71.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/02/case-usage-par-defaut.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/norme-iso-270012022-changements-et-implications-pour-les-entreprises/]]></loc>
		<lastmod><![CDATA[2025-10-01T08:40:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Norme-ISO27001.2022-changements.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/nouvelle-version-du-routeur-firewall-zeroshell-2-0rc3/]]></loc>
		<lastmod><![CDATA[2025-09-30T08:27:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Zeroshell-2.0RC3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/odyone-le-coffre-fort-a-mot-de-passe-physique-et-biometrique/]]></loc>
		<lastmod><![CDATA[2025-09-30T08:19:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OdyOne-coffre-fort.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/02/bd2b04ee7c3624bfe6bb92e62d579e4e_original-300x150.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/02/4ce8fff075d6a112bfb34f29def3f438_original-241x300.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/oidc-et-la-chambre-des-secrets/]]></loc>
		<lastmod><![CDATA[2025-09-30T08:18:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OIDC-chambre-secrets.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/JOSE_Frameworks-1024x408.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Token_JWE.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/types_chiffrements.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/SD-JWT_cas_usage-1024x329.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/dechiffrement_api-Gateway.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/api-gateway.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/draft_SD-JWT-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/SD-JWT_principe-986x1024.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/SD-JWT_idee_implementation-1024x476.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/oktane-23-synetis-remporte-laward-de-lemea-workforce-identity-cloud-partner-of-the-year/]]></loc>
		<lastmod><![CDATA[2025-09-30T08:16:55+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Oktane-23.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/emea-workforce-identity-cloud-partner-of-the-year.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/oktane-1-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/oktane2-1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/oktane3.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/synetis_prix-EMEA-Okta.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/opensaml-java-validation-incomplete-de-certificat/]]></loc>
		<lastmod><![CDATA[2025-09-30T08:04:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/OpenSAML-Java.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/10/logosansShibboleth.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/10/SAML.4.17.1-IDP.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/10/SAML.4.11.1-SP.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/presentation-de-palo-alto-networks/]]></loc>
		<lastmod><![CDATA[2025-09-29T16:13:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/presentation-palo-alto-network.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pam-composante-securite-indispensable-pour-les-entreprises/]]></loc>
		<lastmod><![CDATA[2025-09-29T16:09:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/PAM-composante-securite-entreprise.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-tout-sur-lactivite-cert/]]></loc>
		<lastmod><![CDATA[2025-09-29T16:06:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/parole-expert-cert-activite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-edr-gestion-des-vulnerabilites-decouvrez-guillaume-et-son-expertise-secop/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:44:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Parole-expert-secop.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gouvernance-risques-et-conformite-cyril-vous-explique-tout/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:42:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Parole-expert-GRC-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-grc-lpm-cyberscore-ou-encore-nis-2-raphael-vous-explique-tout/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:24:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/parole-expert-GRC.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/trouver-le-mssp-de-ses-reves-5-points-a-retenir/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:13:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/mssp-points-a-retenir.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-de-lecosysteme-microsoft-bastien-vous-explique-tout/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:11:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/parole-expert-securite-systemes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/parole-dexpert-tout-savoir-sur-le-pam/]]></loc>
		<lastmod><![CDATA[2025-09-29T15:04:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Parole-expert-PAM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pci-dss-tout-ce-quil-faut-savoir-sur-la-norme-de-securite-des-paiements/]]></loc>
		<lastmod><![CDATA[2025-09-29T11:46:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/PCI-DSS.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/perfect-forward-secrecy/]]></loc>
		<lastmod><![CDATA[2025-09-29T11:45:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Perfect-Forward-Secrecy.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/phishing-et-ia-comment-synetis-protege-votre-entreprise/]]></loc>
		<lastmod><![CDATA[2025-09-29T10:38:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Phishing-IA.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-decran-2024-09-27-150057-2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/phishing-vishing-tout-ce-que-vous-devez-savoir-sur-le-social-engineering/]]></loc>
		<lastmod><![CDATA[2025-09-29T10:17:19+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Social-engineering-tout-savoir.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/les-certificats-pki/]]></loc>
		<lastmod><![CDATA[2025-09-29T10:15:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Certificats-pki.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/image.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pki-definitions-et-concepts/]]></loc>
		<lastmod><![CDATA[2025-09-29T10:03:35+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/PKI-definitions.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pourquoi-mettre-en-place-un-soc-de-cybersecurite-externalise/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:45:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/SOC-cyber-manage.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Surveillance-SOC-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/pourquoi-externaliser-la-gestion-de-votre-securite/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:40:52+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/SOC-Manage.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/presentation-de-la-solution-meibo-people-pack/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:17:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Meibo-People-Pack.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/image-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/image-2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/prestataire-pirate-protegez-votre-entreprise-en-9-etapes-cles/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:14:14+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/prestataire-pirate.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/primx-chiffrement-lultime-rempart-pour-gerer-la-confidentialite-des-donnees/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:11:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/primx-chiffrement.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2012/09/tn_primx.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/edr-manage-securisez-lintegralite-de-votre-parc-informatique/]]></loc>
		<lastmod><![CDATA[2025-09-29T09:01:30+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/EDR-manage.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/protection-de-vos-donnees-go-encrypt-est-faite-pour-vous/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:59:09+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Go-Encrypt.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/image.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-2022-06-22-a%CC%80-16.55.46-1024x259.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Capture-de%CC%81cran-2022-06-22-a%CC%80-16.58.59.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/proteger-et-chiffrer-des-scripts-bash-en-production/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:48:26+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/chiffrer-scripts-Bash.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quel-framework-choisir-nist-cybersecurity-framework-ou-iso-27001/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:46:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/framewortk-NIST-ISO.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/Nist_cybersecurity_framework-02-02.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/07/mapping_Cycle_PDCA-01-01-1.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/quest-ce-que-splunk/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:26:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Splunk.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/splunk1.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/splunk2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2014/12/splunk3.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/rancongiciels-une-menace-en-pleine-expansion-ciblant-des-secteurs-cles-2/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:18:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/rancongiciel.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/windows-server-mode-core-un-incontournable/]]></loc>
		<lastmod><![CDATA[2025-09-25T13:41:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/6620126.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-06-a%CC%80-17.41.46-1024x547.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-06-a%CC%80-17.49.51-1024x557.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/01/Capture-de%CC%81cran-2021-01-06-a%CC%80-17.54.46-768x639.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/reconstruire-votre-ad-rapidement-et-surement/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:32:37+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reconstruire-AD.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/reduction-de-la-validite-des-certificats-a-47-jours-etes-vous-prets/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:28:23+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reduction-validite-certificat-47-jours.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/https-www-synetis-com-renforcement-de-la-cybersecurite-europeenne-perspectives-et-enjeux-de-la-directive-nis-2/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:21:48+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/renforcement-cybersecurite-europeenne.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/renforcer-votre-cybersecurite-grace-a-la-cyber-threat-intelligence/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:19:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/renforcer-cybersecurite-cti.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/renforcez-votre-cybersecurite-avec-marie/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:17:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/renforcer-cybersecurite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/replication-openlad/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:14:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Replication-OpenLAD.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/outil-de-reponse-a-incident-pourquoi-choisir-sentinelone/]]></loc>
		<lastmod><![CDATA[2025-09-25T09:04:40+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/reponse-a-incident-sentinel-one.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/using-the-sailpoint-provisioning-integration-module-pim-for-unsupported-connections/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:51:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Sailpoint-PIM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/samba-4-0-apporte-le-support-dactive-directory-et-de-smb-3-0/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:39:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Samba-4.0.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securisation-de-data-center-dans-un-contexte-lpm/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:27:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/datacenter-lpm.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://synetis.originis.fr/wp-content/uploads/2019/05/diagramme1-de%CC%81coupage-LPM.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Architecture_etoile.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Architecture_bastion.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/journalisation.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securiser-efficacement-son-active-directory-ou-azure-ad/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:26:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Securite-AD-Azure-AD.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securisez-vos-infrastructures-ad-et-microsoft-avec-camille/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:23:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Securite-ad-microsoft.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/protegez-votre-active-directory-en-4-etapes-cles/]]></loc>
		<lastmod><![CDATA[2025-09-25T08:20:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Proteger-AD-4-etapes.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-informatique-pourquoi-votre-active-directory-demeure-une-cible-prioritaire/]]></loc>
		<lastmod><![CDATA[2025-09-24T14:29:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/AD-cible-prioritaire.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2024-03-04-11_09_00-Article-blog-SEO-MSSP-AD-Google-Docs.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/securite-numerique-4-raisons-de-faire-appel-a-un-cert-externe/]]></loc>
		<lastmod><![CDATA[2025-09-24T14:26:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/Cert-cyber.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-11-16-15_22_34-Cybersecurite-Team-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2023-11-16-15_24_49-Cybersecurite-Team-_-Vecteurs-et-Photos-gratuites.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/siem-une-vue-unique-sur-le-systeme-dinformation/]]></loc>
		<lastmod><![CDATA[2025-09-24T13:29:17+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/SIEM.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/signal-le-service-de-messagerie-chiffree/]]></loc>
		<lastmod><![CDATA[2025-09-24T13:15:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/unnamed-2-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/logo-signal.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/comparatif-chiffrement-1-1024x521.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/schema-man-in-the-middle.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/double-ratchet.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/ecran-de-confirmation-300x229.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/12/logo-olvid-300x147.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/signgo-cms-le-cms-dilex-international/]]></loc>
		<lastmod><![CDATA[2025-09-24T13:12:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/conception-abstraite-du-concept-de-cybersecurite.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/smsi-la-face-cachee-de-liceberg/]]></loc>
		<lastmod><![CDATA[2025-09-24T10:00:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/SMSI.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/solution-websso-openam-anciennement-opensso/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:51:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/websso.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/splunk-ou-insight-idr-quel-siem-choisir/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:24:03+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/SIEM.jpeg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/11/mapping-SIEM.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/11/architecture-SIEM.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/11/dashboard-splunk-1024x409.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2020/11/dashboard-insight-IDR-1024x456.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/ssl-tls-explication/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:20:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/08/ssl-tls.jpeg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/11/SSL-TLS1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-sso-mobile-que-peut-on-faire-partie-i-la-guerre-des-apps/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:11:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/SSO-mobile_2.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/01/aur%C3%A9lien.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/01/aur%C3%A9lien-2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/le-sso-mobile-que-peut-on-faire-partie-ii-napps-contre-attaque/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:10:07+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/SSO_mobile.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/03/article-aur%C3%A9lien-1-2.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2016/03/article-aur%C3%A9lien-2.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/surveillance-detection-et-reponse-le-role-cle-dun-ingenieur-soc/]]></loc>
		<lastmod><![CDATA[2025-09-24T09:05:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/arriere-plan-du-code-de-programmation-abstrait-pour-les-developpeurs-de-logiciels.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/swift-csp-conformite-nest-pas-securite/]]></loc>
		<lastmod><![CDATA[2025-09-22T12:01:12+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Swift-csp.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-remporte-le-statut-dadmiral-partner-sailpoint/]]></loc>
		<lastmod><![CDATA[2025-09-22T11:58:02+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Certification-Sailpoint.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/top_partner-test-2-1024x576.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-certifie-organisme-de-formation-qualiopi/]]></loc>
		<lastmod><![CDATA[2025-09-22T11:44:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Certification-qualiopi.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/certification-Qualiopi-Synetis-1-1024x425.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-est-elu-partner-excellence-award-2023/]]></loc>
		<lastmod><![CDATA[2025-09-22T11:38:29+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Partner-excellence.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-triple-laureat-du-label-expertcyber/]]></loc>
		<lastmod><![CDATA[2025-09-22T11:36:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Triple-certification.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Synetis-triple-le-label-expert-1.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-et-lesilv-unissent-leurs-forces/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:47:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/des-mains-interconnectees-avec-une-conception-de-reseau-abstrait.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Citation_Adrien-600x600.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-devoile-son-nouveau-plan-strategique-impulsion-2025/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:45:31+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/cofondateurs-synetis-mars2022-1.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/cofondateurs-synetis-mars2022-1024x593.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-obtient-la-qualification-passi/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:42:58+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/certification_passi_Synetis.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2021/10/certification_passi_Synetis.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-obtient-le-label-dexpertcyber/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:25:36+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Expert-Cyber.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-ou-pourquoi-choisir-une-societe-a-taille-humaine/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:23:42+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/aug_17.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-partenaire-dexcellence-de-varonis/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:21:39+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Partenaire-excellence-Varonis.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/ARTICLE-PRIX-VARONIS-2.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synetis-se-voit-une-nouvelle-fois-salue-pour-sa-croissance/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:03:59+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Croissance.jpeg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/Champions_Croissance_LesEchos.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/synology-injection-de-code-au-sein-des-echanges-oauth/]]></loc>
		<lastmod><![CDATA[2025-09-22T09:00:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/Injection-de-code.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/04/synology-logo.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/04/dsm-300x159.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/04/cloudsync-300x177.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2015/04/20141123-RXSS_synology_synetis_001-300x237.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/temoignage-dun-sdm-et-ops-lead-du-soc-detecter-analyser-et-proteger/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:50:54+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/SOC.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/tour-dhorizon-de-lauthentification-forte-mfa-article-misc/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:41:50+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/illustration-de-dessin-anime-de-la-technologie-blockchain.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/image.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/tout-savoir-sur-la-gestion-des-identites-et-des-acces/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:39:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/examination-des-donnees-d-empreintes-digitales.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/comment-le-typosquatting-peut-affecter-votre-entreprise/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:30:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/freepik__the-word-typosquatting-subtly-angled-on-a-cybersec__62409.jpeg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/un-csirt-quel-est-linteret/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:24:28+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/un-expert-en-cybersecurite-s-aventure-dans-le-monde-numerique-pour-se-proteger-contre-les-cyberattaques.jpg]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/wallix-wab-suite/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:11:15+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/modules-wallix.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/modules-wallix-300x180.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/Wallix-sessionList-300x63.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/Wallix-audit-300x71.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/Wallix-record-300x290.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2018/09/Wallix-WAB-300x96.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/web-sso-vs-enterprise-sso/]]></loc>
		<lastmod><![CDATA[2025-09-22T08:08:47+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/09/ecran-d-ordinateur-portable-avec-informations-techniques.jpg]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/10/websso_archi-300x278.png]]>			</image:loc>
		</image:image>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2013/10/esso_archi-300x236.png]]>			</image:loc>
		</image:image>
	</url>
	<url>
		<loc><![CDATA[https://www.synetis.com/blog/gestion-des-acces-privilegies-pam/]]></loc>
		<lastmod><![CDATA[2025-07-09T16:10:56+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc>
				<![CDATA[https://www.synetis.com/wp-content/uploads/2025/07/federation-identite-m.jpg]]>			</image:loc>
		</image:image>
	</url>
</urlset>
