<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.brside.com/</loc></url>
<url><loc>https://www.brside.com/es</loc></url>
<url><loc>https://www.brside.com/it</loc></url>
<url><loc>https://www.brside.com/de</loc></url>
<url><loc>https://www.brside.com/fr</loc></url>
<url><loc>https://www.brside.com/security-awareness-training</loc></url>
<url><loc>https://www.brside.com/es/security-awareness-training</loc></url>
<url><loc>https://www.brside.com/it/security-awareness-training</loc></url>
<url><loc>https://www.brside.com/de/security-awareness-training</loc></url>
<url><loc>https://www.brside.com/fr/security-awareness-training</loc></url>
<url><loc>https://www.brside.com/phishing-simulations</loc></url>
<url><loc>https://www.brside.com/es/phishing-simulations</loc></url>
<url><loc>https://www.brside.com/it/phishing-simulations</loc></url>
<url><loc>https://www.brside.com/de/phishing-simulations</loc></url>
<url><loc>https://www.brside.com/fr/phishing-simulations</loc></url>
<url><loc>https://www.brside.com/about</loc></url>
<url><loc>https://www.brside.com/es/about</loc></url>
<url><loc>https://www.brside.com/it/about</loc></url>
<url><loc>https://www.brside.com/de/about</loc></url>
<url><loc>https://www.brside.com/fr/about</loc></url>
<url><loc>https://www.brside.com/contact</loc></url>
<url><loc>https://www.brside.com/es/contact</loc></url>
<url><loc>https://www.brside.com/it/contact</loc></url>
<url><loc>https://www.brside.com/de/contact</loc></url>
<url><loc>https://www.brside.com/fr/contact</loc></url>
<url><loc>https://www.brside.com/privacy</loc></url>
<url><loc>https://www.brside.com/es/privacy</loc></url>
<url><loc>https://www.brside.com/it/privacy</loc></url>
<url><loc>https://www.brside.com/de/privacy</loc></url>
<url><loc>https://www.brside.com/fr/privacy</loc></url>
<url><loc>https://www.brside.com/terms</loc></url>
<url><loc>https://www.brside.com/es/terms</loc></url>
<url><loc>https://www.brside.com/it/terms</loc></url>
<url><loc>https://www.brside.com/de/terms</loc></url>
<url><loc>https://www.brside.com/fr/terms</loc></url>
<url><loc>https://www.brside.com/blog</loc></url>
<url><loc>https://www.brside.com/academy</loc></url>
<url><loc>https://www.brside.com/vishing</loc></url>
<url><loc>https://www.brside.com/es/vishing</loc></url>
<url><loc>https://www.brside.com/it/vishing</loc></url>
<url><loc>https://www.brside.com/de/vishing</loc></url>
<url><loc>https://www.brside.com/fr/vishing</loc></url>
<url><loc>https://www.brside.com/compare/brightside-vs-adaptive</loc></url>
<url><loc>https://www.brside.com/compare/brightside-vs-knowbe4</loc></url>
<url><loc>https://www.brside.com/compare/brightside-vs-hoxhunt</loc></url>
<url><loc>https://www.brside.com/compare/brightside-vs-sosafe</loc></url>
<url><loc>https://www.brside.com/academy/linkedin-privacy-settings-stop-spam-and-data-theft</loc></url>
<url><loc>https://www.brside.com/academy/the-fbi-has-privacy-advice-for-you-and-it-s-actually-pretty-simple</loc></url>
<url><loc>https://www.brside.com/academy/privacy-and-personal-choice-real-world-threats-to-your-personal-data</loc></url>
<url><loc>https://www.brside.com/academy/stop-memorizing-passwords</loc></url>
<url><loc>https://www.brside.com/academy/ai-privacy-concerns-explained-what-chatbots-do-with-data</loc></url>
<url><loc>https://www.brside.com/academy/social-media-security-checklist-protect-your-privacy-now</loc></url>
<url><loc>https://www.brside.com/academy/build-a-phishing-simulation-program-that-drives-real-behavior-change</loc></url>
<url><loc>https://www.brside.com/academy/smart-home-security-checklist</loc></url>
<url><loc>https://www.brside.com/academy/are-browser-extensions-spying-on-you-safety-guide</loc></url>
<url><loc>https://www.brside.com/academy/protect-your-work-account-stop-account-takeover-attempts</loc></url>
<url><loc>https://www.brside.com/academy/recognize-phishing-attacks-types-examples-defense</loc></url>
<url><loc>https://www.brside.com/academy/employee-cybersecurity-guide-10-threats-to-know</loc></url>
<url><loc>https://www.brside.com/academy/how-to-prevent-data-broker-collection-in-2026</loc></url>
<url><loc>https://www.brside.com/academy/stop-doxxing-hide-your-personal-info-online</loc></url>
<url><loc>https://www.brside.com/academy/10-quick-wins-to-protect-your-personal-data-(without-losing-your-mind)</loc></url>
<url><loc>https://www.brside.com/academy/email-alias-guide-protect-your-inbox-from-data-leaks</loc></url>
<url><loc>https://www.brside.com/academy/how-to-secure-your-money-online-a-practical-guide</loc></url>
<url><loc>https://www.brside.com/academy/is-your-chat-safe-end-to-end-encryption-explained</loc></url>
<url><loc>https://www.brside.com/academy/your-email-address-just-appeared-in-a-data-breach.-now-what</loc></url>
<url><loc>https://www.brside.com/academy/how-spammers-find-your-work-email-(and-how-to-stop-them)</loc></url>
<url><loc>https://www.brside.com/blog/what-is-deepfake-bec-how-voice-cloning-replaced-the-wire-transfer-email</loc></url>
<url><loc>https://www.brside.com/blog/best-security-awareness-training-platforms-for-2026</loc></url>
<url><loc>https://www.brside.com/blog/moving-beyond-email-top-next-gen-security-awareness-platforms</loc></url>
<url><loc>https://www.brside.com/blog/best-vishing-simulation-software-a-buyers-guide</loc></url>
<url><loc>https://www.brside.com/blog/what-to-look-for-in-ai-security-training-compare-the-top-5-platforms</loc></url>
<url><loc>https://www.brside.com/blog/inside-brightsides-ai-vishing-simulator</loc></url>
<url><loc>https://www.brside.com/blog/how-identity-breaches-and-ai-agents-are-fueling-corporate-fraud</loc></url>
<url><loc>https://www.brside.com/blog/deepfake-awareness-training-defend-your-organization</loc></url>
<url><loc>https://www.brside.com/blog/phishing-simulations-vs-ai-phishing-what-works-in-2026</loc></url>
<url><loc>https://www.brside.com/blog/ai-security-training-platforms-which-features-matter</loc></url>
<url><loc>https://www.brside.com/blog/the-2026-guide-to-phishing-smishing-and-vishing-simulations</loc></url>
<url><loc>https://www.brside.com/blog/how-vishing-attacks-bypass-okta-mfa-defense-guide-for-2026</loc></url>
<url><loc>https://www.brside.com/blog/how-to-scale-security-awareness-training-to-10-000-staff</loc></url>
<url><loc>https://www.brside.com/blog/top-10-vishing-simulation-tools-for-cisos-in-2026</loc></url>
<url><loc>https://www.brside.com/blog/10-data-privacy-tips-to-protect-your-info-online-in-2026</loc></url>
<url><loc>https://www.brside.com/blog/10-best-knowbe4-alternatives-for-security-awareness-training</loc></url>
<url><loc>https://www.brside.com/blog/the-ultimate-guide-password-manager-vs-pam-vs-sso-tools</loc></url>
<url><loc>https://www.brside.com/blog/zero-trust-email-security-for-modern-threats</loc></url>
<url><loc>https://www.brside.com/blog/brave-firefox-safari-only-two-survived-this-fingerprinting-test</loc></url>
<url><loc>https://www.brside.com/blog/whatsapp-security-settings-for-work-complete-guide</loc></url>
<url><loc>https://www.brside.com/blog/email-alias-tutorial-google-workspace-microsoft-365-setup</loc></url>
<url><loc>https://www.brside.com/blog/why-new-hires-are-prime-targets-for-whatsapp-scams</loc></url>
<url><loc>https://www.brside.com/blog/7-phishing-simulation-best-practices-guide</loc></url>
<url><loc>https://www.brside.com/blog/how-to-measure-security-awareness-training-effectiveness</loc></url>
<url><loc>https://www.brside.com/blog/most-effective-ways-to-reduce-employee-cybersecurity-risk</loc></url>
<url><loc>https://www.brside.com/blog/what-can-hackers-find-about-you-in-5-minutes-your-digital-footprint-exposed</loc></url>
<url><loc>https://www.brside.com/blog/osint-for-executives-how-hackers-use-your-digital-footprint-against-you</loc></url>
<url><loc>https://www.brside.com/blog/multi-channel-phishing-defense-vishing-deepfake-tools</loc></url>
<url><loc>https://www.brside.com/blog/train-employees-against-ai-phishing-best-practices</loc></url>
<url><loc>https://www.brside.com/blog/best-security-awareness-training-platforms-comparison</loc></url>
<url><loc>https://www.brside.com/blog/phishing-training-that-works-evidence-based-implementation</loc></url>
<url><loc>https://www.brside.com/blog/security-awareness-training-2025-tools-trends-roi</loc></url>
<url><loc>https://www.brside.com/blog/how-to-run-effective-phishing-simulations-to-prepare-your-team-for-modern-threats</loc></url>
<url><loc>https://www.brside.com/blog/what-is-osint-security-awareness-training-why-it-matters</loc></url>
<url><loc>https://www.brside.com/blog/how-security-awareness-training-stops-cyber-attacks</loc></url>
<url><loc>https://www.brside.com/blog/scale-security-training-for-large-teams-enterprise-guide</loc></url>
<url><loc>https://www.brside.com/blog/ai-phishing-attacks-why-traditional-training-fails</loc></url>
<url><loc>https://www.brside.com/blog/ai-generated-phishing-vs-human-attacks-2025-risk-analysis</loc></url>
<url><loc>https://www.brside.com/blog/security-awareness-training-statistics-2025-100-studies</loc></url>
<url><loc>https://www.brside.com/blog/spear-phishing-training-ai-defense-strategies-2025</loc></url>
<url><loc>https://www.brside.com/blog/security-awareness-program-guide-8-steps-for-2025</loc></url>
<url><loc>https://www.brside.com/blog/the-complete-guide-to-spotting-ai-generated-phishing-attacks-in-2025</loc></url>
<url><loc>https://www.brside.com/blog/8-security-awareness-training-mistakes-to-avoid-in-2025</loc></url>
<url><loc>https://www.brside.com/blog/top-10-ai-security-awareness-training-platforms</loc></url>
<url><loc>https://www.brside.com/blog/deepfake-ceo-fraud-50m-voice-cloning-threat-cfos</loc></url>
<url><loc>https://www.brside.com/blog/why-deepfake-detection-tools-fail-in-real-world-deployment</loc></url>
<url><loc>https://www.brside.com/blog/train-staff-to-spot-deepfakes-video-audio-detection</loc></url>
<url><loc>https://www.brside.com/blog/how-to-defend-against-deepfake-attacks-2025-guide</loc></url>
<url><loc>https://www.brside.com/blog/the-root-permissions-problem-why-agentic-ai-poses-unique-data-security-risks</loc></url>
<url><loc>https://www.brside.com/blog/the-dark-side-of-ai-a-brief-history</loc></url>
<url><loc>https://www.brside.com/blog/multistep-phishing-attacks-and-phishing-personalization</loc></url>
<url><loc>https://www.brside.com/blog/cybersecurity-training-for-the-modern-threat-landscape-brightside-ai</loc></url>
<url><loc>https://www.brside.com/blog/how-cybersecurity-training-should-differ-for-startups-and-large-enterprises</loc></url>
<url><loc>https://www.brside.com/blog/top-7-ai-cybersecurity-awareness-tools-(2025)-best-platforms-compared</loc></url>
<url><loc>https://www.brside.com/blog/gamification-in-cybersecurity-training-make-security-awareness-fun-effective-(2025)</loc></url>
<url><loc>https://www.brside.com/blog/why-most-cybersecurity-awareness-programs-fail-in-2025-(and-how-to-fix-them)</loc></url>
<url><loc>https://www.brside.com/blog/protect-your-remote-employees</loc></url>
<url><loc>https://www.brside.com/blog/from-phishing-to-spear-phishing</loc></url>
<url><loc>https://www.brside.com/blog/mastering-cybersecurity-how-attack-vectors-threaten-companies</loc></url>
<url><loc>https://www.brside.com/blog/the-true-cost-of-phishing-attacks</loc></url>
</urlset>