<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//wickr.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://wickr.com/blog/</loc>
		<lastmod>2021-06-25T03:06:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/the-cybersecurity-202-security-pros-defend-dncs-handling-of-hacking-false-alarm/</loc>
		<lastmod>2019-10-28T06:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/washingtonPost_newsLogo.png</image:loc>
			<image:title><![CDATA[washingtonPost newsLogo]]></image:title>
			<image:caption><![CDATA[washingtonPost newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-continuing-business-of-keeping-promises/</loc>
		<lastmod>2019-10-28T06:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/keepingPromises_blog.png</image:loc>
			<image:title><![CDATA[keepingPromises blog]]></image:title>
			<image:caption><![CDATA[keepingPromises blog]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/a-look-at-the-new-york-times-privacy-project/</loc>
		<lastmod>2019-10-28T06:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/privacy-project.jpg</image:loc>
			<image:title><![CDATA[privacy project]]></image:title>
			<image:caption><![CDATA[privacy project]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/introducing-the-wickr-yes-machine/</loc>
		<lastmod>2019-10-28T06:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/11/github001.jpg</image:loc>
			<image:title><![CDATA[github001]]></image:title>
			<image:caption><![CDATA[github001]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-named-a-leader-in-secure-communications/</loc>
		<lastmod>2019-10-28T06:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/11/wickr_press.png</image:loc>
			<image:title><![CDATA[wickr press]]></image:title>
			<image:caption><![CDATA[wickr press]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/11/2018Q4_Secure-Communications_142697.png</image:loc>
			<image:title><![CDATA[2018Q4 Secure Communications 142697]]></image:title>
			<image:caption><![CDATA[2018Q4 Secure Communications 142697]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-psiphon-launch-open-access/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/wickrAndPsiphon.png</image:loc>
			<image:title><![CDATA[wickrAndPsiphon]]></image:title>
			<image:caption><![CDATA[wickrAndPsiphon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/wickrPsiphon_image.png</image:loc>
			<image:title><![CDATA[wickrPsiphon image]]></image:title>
			<image:caption><![CDATA[wickrPsiphon image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-adds-new-censorship-circumvention-feature-to-its-encrypted-app/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Dark-Reading-Logo.jpg</image:loc>
			<image:title><![CDATA[Dark Reading Logo]]></image:title>
			<image:caption><![CDATA[Dark Reading Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-teams-up-with-psiphon-to-ensure-your-packets-arrive-safely-no-matter-where-you-are/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/02/techcrunch_logo.jpg</image:loc>
			<image:title><![CDATA[techcrunch logo]]></image:title>
			<image:caption><![CDATA[techcrunch logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-may-have-a-workaround-for-russias-crackdown-on-encrypted-chat/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/07/CNET_newsLogo.png</image:loc>
			<image:title><![CDATA[CNET newsLogo]]></image:title>
			<image:caption><![CDATA[CNET newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-has-a-new-plan-for-dodging-internet-blocks/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/TheVerge_NewsLogo.png</image:loc>
			<image:title><![CDATA[TheVerge NewsLogo]]></image:title>
			<image:caption><![CDATA[TheVerge NewsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/traveling-to-china-for-work-punch-through-the-great-firewall-and-securely-connect-with-your-home-office/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/CSO_newsLogo.png</image:loc>
			<image:title><![CDATA[CSO newsLogo]]></image:title>
			<image:caption><![CDATA[CSO newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-partners-with-psiphon-to-improve-network-availability/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/securityWeek_newsLogo.png</image:loc>
			<image:title><![CDATA[securityWeek newsLogo]]></image:title>
			<image:caption><![CDATA[securityWeek newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-gets-slicker-with-fresh-network-tricker-privacy-protecting-domain-fronting-alternative-emerges/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/theRegister_newsLogo.png</image:loc>
			<image:title><![CDATA[theRegister newsLogo]]></image:title>
			<image:caption><![CDATA[theRegister newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/teams-enterprises-can-now-sign-on-with-a-single-click-on-wickr-pro/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Dark-Reading-Logo.jpg</image:loc>
			<image:title><![CDATA[Dark Reading Logo]]></image:title>
			<image:caption><![CDATA[Dark Reading Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/beyond-eavesdropping-adversarial-models-for-secure-messaging/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/messages.jpg</image:loc>
			<image:title><![CDATA[messages]]></image:title>
			<image:caption><![CDATA[messages]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/messages.jpg</image:loc>
			<image:caption><![CDATA[messages icon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/lawmakers-should-accept-reality-that-digital-communication-can-never-be-too-secure/</loc>
		<lastmod>2019-10-28T06:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/01/The-Hill-Logo.jpg</image:loc>
			<image:title><![CDATA[The Hill Logo]]></image:title>
			<image:caption><![CDATA[The Hill Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/email-security-tools-try-to-keep-up-with-threats/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Dark-Reading-Logo.jpg</image:loc>
			<image:title><![CDATA[Dark Reading Logo]]></image:title>
			<image:caption><![CDATA[Dark Reading Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-just-made-it-easier-to-keep-snoops-out-of-your-next-conference-call-2/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/gizmodo-logo.jpg</image:loc>
			<image:title><![CDATA[gizmodo logo]]></image:title>
			<image:caption><![CDATA[gizmodo logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/more_security_vendors_putting_skin_in_the_game/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Dark-Reading-Logo.jpg</image:loc>
			<image:title><![CDATA[Dark Reading Logo]]></image:title>
			<image:caption><![CDATA[Dark Reading Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/facebook-working-as-it-was-intended-wickr-ceo-says-time-for-new-data-protection-models/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/Bloomberg-Logo.jpg</image:loc>
			<image:title><![CDATA[Bloomberg Logo]]></image:title>
			<image:caption><![CDATA[Bloomberg Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/extending_privacy_to_voice_across_the_entire_wickr_platform/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/video_blog.png</image:loc>
			<image:title><![CDATA[video blog]]></image:title>
			<image:caption><![CDATA[video blog]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/video_blog_center_image.png</image:loc>
			<image:caption><![CDATA[video blog center image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/dnc-launches-tech-marketplace-for-democratic-candidates/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/02/techcrunch_logo.jpg</image:loc>
			<image:title><![CDATA[techcrunch logo]]></image:title>
			<image:caption><![CDATA[techcrunch logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/today-critical-industrial-vulnerability-uncovered/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Politico-News-Logo.jpg</image:loc>
			<image:title><![CDATA[Politico News Logo]]></image:title>
			<image:caption><![CDATA[Politico News Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-problem-with-facebooks-new-privacy-experiences/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/salon-news-logo2.jpg</image:loc>
			<image:title><![CDATA[salon news logo2]]></image:title>
			<image:caption><![CDATA[salon news logo2]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-untrusted-server-the-real-world-impact-of-a-wickr-server-compromise/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/untrusted_server-icon.jpg</image:loc>
			<image:title><![CDATA[untrusted server icon]]></image:title>
			<image:caption><![CDATA[untrusted server icon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/untrusted_server-icon.jpg</image:loc>
			<image:caption><![CDATA[untrusted server icon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/introducing-screenshot-detection/</loc>
		<lastmod>2019-10-28T06:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/screenDetection.jpg</image:loc>
			<image:title><![CDATA[screenDetection]]></image:title>
			<image:caption><![CDATA[screenDetection]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/screenDetection.jpg</image:loc>
			<image:caption><![CDATA[screen Detection image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr_announces_encrypted_screen_sharing/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/02/screenSharing.png</image:loc>
			<image:title><![CDATA[screenSharing]]></image:title>
			<image:caption><![CDATA[screenSharing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secret_message_apps_on_the_rise_in_2018/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/cnnTech-logo.jpg</image:loc>
			<image:title><![CDATA[cnnTech logo]]></image:title>
			<image:caption><![CDATA[cnnTech logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-introduces-end-to-end-encryption-for-screen-sharing/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/12/iapp-logo.jpg</image:loc>
			<image:title><![CDATA[iapp logo]]></image:title>
			<image:caption><![CDATA[iapp logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/congressional-emails-could-be-the-next-target-for-hacks-time-to-bolster-defenses/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/01/The-Hill-Logo.jpg</image:loc>
			<image:title><![CDATA[The Hill Logo]]></image:title>
			<image:caption><![CDATA[The Hill Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/encouraging_responsible_use_of_encryption/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2016/12/why_wickr.png</image:loc>
			<image:title><![CDATA[why wickr]]></image:title>
			<image:caption><![CDATA[why wickr]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/PrivacyBundle-Image-uai-1032x786-1-e1526322723726.png</image:loc>
			<image:caption><![CDATA[Privacy Bundle Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/attacks_ongroup_messaging/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/12/attacksongroupmessaging.png</image:loc>
			<image:title><![CDATA[attacksongroupmessaging]]></image:title>
			<image:caption><![CDATA[attacksongroupmessaging]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/12/attacksongroupmessaging.png</image:loc>
			<image:caption><![CDATA[attacks on group messaging image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/exposure-of-your-sensitive-data-isnt-a-bug-its-a-feature/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/02/techcrunch_logo.jpg</image:loc>
			<image:title><![CDATA[techcrunch logo]]></image:title>
			<image:caption><![CDATA[techcrunch logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/encryption-and-data-minimization-are-the-future/</loc>
		<lastmod>2019-10-28T06:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/Bloomberg-Logo.jpg</image:loc>
			<image:title><![CDATA[Bloomberg Logo]]></image:title>
			<image:caption><![CDATA[Bloomberg Logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/contact-discovery-id-policy-and-anonymity/</loc>
		<lastmod>2019-10-28T06:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/contact_discovery.jpg</image:loc>
			<image:title><![CDATA[contact discovery]]></image:title>
			<image:caption><![CDATA[contact discovery]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/contact_discovery.jpg</image:loc>
			<image:caption><![CDATA[contact discovery image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-data-should-not-live-beyond-its-useful-life/</loc>
		<lastmod>2019-10-28T06:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/DataBeyondItsLife.jpg</image:loc>
			<image:title><![CDATA[DataBeyondItsLife]]></image:title>
			<image:caption><![CDATA[DataBeyondItsLife]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/this-app-wants-to-be-your-encrypted-self-destructing-slack/</loc>
		<lastmod>2019-10-28T06:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2016/12/wired-logo.jpg</image:loc>
			<image:title><![CDATA[wired logo]]></image:title>
			<image:caption><![CDATA[wired logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/encrypted-chat-app-wickr-opens-code-for-public-review/</loc>
		<lastmod>2019-10-28T06:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/02/techcrunch_logo.jpg</image:loc>
			<image:title><![CDATA[techcrunch logo]]></image:title>
			<image:caption><![CDATA[techcrunch logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secure-conference-calling-is-finally-here/</loc>
		<lastmod>2019-10-28T06:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/secure_calling.jpg</image:loc>
			<image:title><![CDATA[secure calling]]></image:title>
			<image:caption><![CDATA[secure calling]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/nonprofit-to-bring-low-to-no-cost-cybersecurity-services-to-federal-campaigns/</loc>
		<lastmod>2019-11-01T15:21:30+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/11/defending-digital-campaigns.jpg</image:loc>
			<image:title><![CDATA[defending-digital-campaigns]]></image:title>
			<image:caption><![CDATA[defending digital campaigns]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-ways-to-find-the-best-encrypted-messaging-solution-for-your-business/</loc>
		<lastmod>2019-11-01T20:43:52+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/business-messaging.jpg</image:loc>
			<image:title><![CDATA[business messaging]]></image:title>
			<image:caption><![CDATA[business messaging]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/a-guide-to-data-encryption-best-practices/</loc>
		<lastmod>2019-11-01T20:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/Data-Encryption-Best-Practices.jpg</image:loc>
			<image:title><![CDATA[Data Encryption Best Practices]]></image:title>
			<image:caption><![CDATA[Data Encryption Best Practices]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/a-traveling-executives-guide-to-cybersecurity/</loc>
		<lastmod>2019-11-10T18:17:51+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/exec-comm-infographic.png</image:loc>
			<image:title><![CDATA[exec comm infographic]]></image:title>
			<image:caption><![CDATA[exec comm infographic]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/Executive-Comm-Infographic.png</image:loc>
			<image:title><![CDATA[Executive Comm Infographic]]></image:title>
			<image:caption><![CDATA[Executive Comm Infographic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/feeling-our-way-the-darkest-corner-of-shadow-it/</loc>
		<lastmod>2019-11-23T00:53:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/10/shadow-it.jpg</image:loc>
			<image:title><![CDATA[shadow-it]]></image:title>
			<image:caption><![CDATA[Shadow IT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-cybersecurity-stats-to-know-for-2020/</loc>
		<lastmod>2019-11-23T23:47:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/11/10-Cybersecurity-Stats-to-Know-for-2020.jpg</image:loc>
			<image:title><![CDATA[10 Cybersecurity Stats to Know for 2020]]></image:title>
			<image:caption><![CDATA[10 Cybersecurity Stats to Know for 2020]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/11/10-Cybersecurity-Stats-to-Know-for-2020.png</image:loc>
			<image:caption><![CDATA[10 Cybersecurity Stats to Know for 2020]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-benefits-of-using-wickr-for-secure-data-sharing/</loc>
		<lastmod>2019-12-12T18:07:59+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/12/secure-data.jpg</image:loc>
			<image:title><![CDATA[Secure Data]]></image:title>
			<image:caption><![CDATA[Secure Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-the-new-california-privacy-laws-and-wickr-work-together/</loc>
		<lastmod>2020-01-16T15:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/ccpa.jpg</image:loc>
			<image:title><![CDATA[ccpa]]></image:title>
			<image:caption><![CDATA[CCPA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/happy-new-year-from-wickr/</loc>
		<lastmod>2020-01-17T17:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/wickr-2020.jpg</image:loc>
			<image:title><![CDATA[wickr-2020]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-checks-the-fips-box/</loc>
		<lastmod>2020-01-31T14:44:57+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/federal-messaging.jpg</image:loc>
			<image:title><![CDATA[federal-messaging]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-messaging-layer-security-protocol/</loc>
		<lastmod>2020-02-07T16:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/mls.jpg</image:loc>
			<image:title><![CDATA[mls]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/joel-alwen-speaks-at-real-world-crypto-2020/</loc>
		<lastmod>2020-02-10T23:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/lerner-hall.jpg</image:loc>
			<image:title><![CDATA[lerner-hall]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/mobile-security-threats-to-be-aware-of-and-avoid/</loc>
		<lastmod>2020-02-13T18:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/mobile-security-threats-thumbnail.png</image:loc>
			<image:title><![CDATA[mobile-security-threats-thumbnail]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/mobile-security-threats.png</image:loc>
			<image:caption><![CDATA[Mobile Security Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-a-love-story/</loc>
		<lastmod>2020-02-14T22:37:32+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/wickr-love.jpg</image:loc>
			<image:title><![CDATA[wickr-love]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/single-sign-on-for-teams-and-enterprises/</loc>
		<lastmod>2020-02-25T16:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/06/SSO_blog_image.jpg</image:loc>
			<image:title><![CDATA[SSO blog image]]></image:title>
			<image:caption><![CDATA[SSO blog image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/06/hand-1.png</image:loc>
			<image:title><![CDATA[SSO]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-security-teams-are-leveraging-wickr-to-ensure-data-encryption/</loc>
		<lastmod>2020-02-25T16:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/08/ir-team.jpg</image:loc>
			<image:title><![CDATA[ir team]]></image:title>
			<image:caption><![CDATA[ir team]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/after-google-and-amazon-drop-anti-censorship-support-wickr-steps-in/</loc>
		<lastmod>2020-02-25T16:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/08/motherboard_newsLogo.png</image:loc>
			<image:title><![CDATA[motherboard newsLogo]]></image:title>
			<image:caption><![CDATA[motherboard newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-state-of-cyber-affairs-the-case-for-universal-encryption/</loc>
		<lastmod>2020-02-25T16:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/StateofCyber.jpg</image:loc>
			<image:title><![CDATA[StateofCyber]]></image:title>
			<image:caption><![CDATA[StateofCyber]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/StateofCyber.jpg</image:loc>
			<image:caption><![CDATA[State of Cyber Affairs Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/russian-hack-targeting-senator-makes-me-want-to-break-up-with-email/</loc>
		<lastmod>2020-02-25T16:15:33+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/07/CNET_newsLogo.png</image:loc>
			<image:title><![CDATA[CNET newsLogo]]></image:title>
			<image:caption><![CDATA[CNET newsLogo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-private-chat-apps-and-how-they-compare-with-each-other/</loc>
		<lastmod>2020-02-25T16:16:17+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/macObserver_new_logo.jpg</image:loc>
			<image:title><![CDATA[macObserver new logo]]></image:title>
			<image:caption><![CDATA[macObserver new logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/can-the-growth-of-secure-communications-products-continue/</loc>
		<lastmod>2020-02-25T16:16:33+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/06/cyberscoop_logo.png</image:loc>
			<image:title><![CDATA[cyberscoop logo]]></image:title>
			<image:caption><![CDATA[cyberscoop logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/critical-pgp-gpg-s-mime-vulnerabilities-require-immediate-action/</loc>
		<lastmod>2020-02-25T16:16:57+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/sc_media_logo.jpg</image:loc>
			<image:title><![CDATA[sc media news logo]]></image:title>
			<image:caption><![CDATA[sc media logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/republican-and-democratic-groups-in-talks-with-encrypted-messaging-company/</loc>
		<lastmod>2020-02-25T16:17:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/07/buzzfeed-logo.jpg</image:loc>
			<image:title><![CDATA[buzzfeed logo]]></image:title>
			<image:caption><![CDATA[buzzfeed logo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-pro-available-on-aws-marketplace/</loc>
		<lastmod>2020-03-04T20:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/aws-wickr.png</image:loc>
			<image:title><![CDATA[aws-wickr]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-reasons-why-wickr-is-the-best-encrypted-messaging-app-for-teams/</loc>
		<lastmod>2020-03-15T18:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/08/encrypted-messaging.jpg</image:loc>
			<image:title><![CDATA[encrypted messaging]]></image:title>
			<image:caption><![CDATA[encrypted messaging]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the_business_of_keeping_promises/</loc>
		<lastmod>2020-04-06T18:45:16+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/newsImage_sq.png</image:loc>
			<image:title><![CDATA[newsImage sq]]></image:title>
			<image:caption><![CDATA[newsImage sq]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/going-above-beyond-one-of-wickrs-unfair-advantages/</loc>
		<lastmod>2020-04-08T16:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/support.jpg</image:loc>
			<image:title><![CDATA[support]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-hold-safe-and-secure-virtual-meetings/</loc>
		<lastmod>2020-04-13T16:22:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/virtual-meetings.jpg</image:loc>
			<image:title><![CDATA[virtual-meetings]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/digital-privacy-a-fundamental-human-right-and-a-win-for-businesses/</loc>
		<lastmod>2020-04-16T17:46:52+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/digital-privacy.jpg</image:loc>
			<image:title><![CDATA[digital-privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secure-communication-platform-for-air-force/</loc>
		<lastmod>2020-04-29T15:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/afwerx.png</image:loc>
			<image:title><![CDATA[afwerx]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-manage-a-remote-team-efficiently-and-securely/</loc>
		<lastmod>2020-05-04T14:43:02+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/remote-working.jpg</image:loc>
			<image:title><![CDATA[remote-working]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/your-privacy-off-by-default/</loc>
		<lastmod>2020-05-05T20:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/privacyOff.jpg</image:loc>
			<image:title><![CDATA[privacyOff]]></image:title>
			<image:caption><![CDATA[privacyOff]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/privacyOff.jpg</image:loc>
			<image:caption><![CDATA[privacy off by default image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/not-all-end-to-end-encryption-is-created-equal/</loc>
		<lastmod>2020-05-07T21:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/e2e-encryption.jpg</image:loc>
			<image:title><![CDATA[e2e-encryption]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/end-to-end-encryption-is-finally-getting-the-love-it-deserves/</loc>
		<lastmod>2020-05-13T19:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/end-to-end-encryption.jpg</image:loc>
			<image:title><![CDATA[end-to-end-encryption]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-broadcast-bot/</loc>
		<lastmod>2020-05-15T22:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/Wickr-RAM.jpg</image:loc>
			<image:title><![CDATA[Wickr-RAM]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/joel-wallenstrom-featured-on-techstrong-tv/</loc>
		<lastmod>2020-06-04T18:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/TechStrong.png</image:loc>
			<image:title><![CDATA[TechStrong]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-enterprise-end-user-features/</loc>
		<lastmod>2020-06-04T18:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/enterprise.jpg</image:loc>
			<image:title><![CDATA[enterprise]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-get-set-up-securely-with-video-conferencing/</loc>
		<lastmod>2020-06-04T18:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/video-conferencing.jpg</image:loc>
			<image:title><![CDATA[video-conferencing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-screensharing/</loc>
		<lastmod>2020-06-04T18:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/wickr-screenshare.jpg</image:loc>
			<image:title><![CDATA[wickr-screenshare]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-admin-controls/</loc>
		<lastmod>2020-06-04T18:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/wickr-admin-controls.jpg</image:loc>
			<image:title><![CDATA[wickr-admin-controls]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-53/</loc>
		<lastmod>2020-06-04T18:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/wickr-product.jpg</image:loc>
			<image:title><![CDATA[wickr-product]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-star-messages-for-follow-up/</loc>
		<lastmod>2020-06-04T18:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/messages.jpg</image:loc>
			<image:title><![CDATA[messages]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-52/</loc>
		<lastmod>2020-06-04T18:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/5-52-update.jpg</image:loc>
			<image:title><![CDATA[5-52-update]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-know-how-creating-a-new-room-conversation/</loc>
		<lastmod>2020-06-04T18:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/wickr-rooms.jpg</image:loc>
			<image:title><![CDATA[wickr-rooms]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://support.wickr.com/hc/article_attachments/360046041914/create_Room_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/user-feedback-the-wickr-pro-features-you-say-are-your-favorites/</loc>
		<lastmod>2020-06-04T18:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/wickr-pro-features.jpg</image:loc>
			<image:title><![CDATA[wickr-pro-features]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-roundup-answering-the-most-commonly-asked-questions/</loc>
		<lastmod>2020-06-04T18:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/faq.jpg</image:loc>
			<image:title><![CDATA[faq]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-know-how-getting-started-with-wickr-pro/</loc>
		<lastmod>2020-06-04T18:15:46+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/wickr-file-pinning-1.jpg</image:loc>
			<image:title><![CDATA[wickr file pinning 1]]></image:title>
			<image:caption><![CDATA[wickr file pinning 1]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-51/</loc>
		<lastmod>2020-06-04T18:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/wickr-update.jpg</image:loc>
			<image:title><![CDATA[wickr-update]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-know-how-wickr-pro-overview/</loc>
		<lastmod>2020-06-04T18:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/wickr-pro.jpg</image:loc>
			<image:title><![CDATA[Wickr Pro]]></image:title>
			<image:caption><![CDATA[Wickr Pro]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-49/</loc>
		<lastmod>2020-06-04T18:16:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/wickr-5-49.jpg</image:loc>
			<image:title><![CDATA[wickr-5-49]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-recalling-messages/</loc>
		<lastmod>2020-06-04T18:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/recall-message.jpg</image:loc>
			<image:title><![CDATA[recall-message]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-46/</loc>
		<lastmod>2020-06-04T18:16:31+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/wickr-update.jpg</image:loc>
			<image:title><![CDATA[wickr-update]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-34/</loc>
		<lastmod>2020-06-04T18:17:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/wickr-5-34.jpg</image:loc>
			<image:title><![CDATA[wickr 5 34]]></image:title>
			<image:caption><![CDATA[wickr 5 34]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-28/</loc>
		<lastmod>2020-06-04T18:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/08/wickr-5-28.jpg</image:loc>
			<image:title><![CDATA[wickr 5 28]]></image:title>
			<image:caption><![CDATA[wickr 5 28]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-26/</loc>
		<lastmod>2020-06-04T18:17:24+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/wickr-sso.jpg</image:loc>
			<image:title><![CDATA[wickr sso]]></image:title>
			<image:caption><![CDATA[wickr sso]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-20/</loc>
		<lastmod>2020-06-04T18:17:30+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/wickr-file-pinning-1.jpg</image:loc>
			<image:title><![CDATA[wickr file pinning 1]]></image:title>
			<image:caption><![CDATA[wickr file pinning 1]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-18/</loc>
		<lastmod>2020-06-04T18:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/update5.18.png</image:loc>
			<image:title><![CDATA[update5.18]]></image:title>
			<image:caption><![CDATA[update5.18]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/location-share.gif</image:loc>
			<image:title><![CDATA[location share]]></image:title>
			<image:caption><![CDATA[location share]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/quick-response.png</image:loc>
			<image:title><![CDATA[quick response]]></image:title>
			<image:caption><![CDATA[quick response]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/out-of-network.png</image:loc>
			<image:title><![CDATA[out of network]]></image:title>
			<image:caption><![CDATA[out of network]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/end-to-end-encryption-vs-client-to-server-encryption/</loc>
		<lastmod>2020-06-04T22:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/data-security.jpg</image:loc>
			<image:title><![CDATA[data-security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/E2E_vs_C2S.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/enterprise-data-encryption-best-practices/</loc>
		<lastmod>2020-06-04T22:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/enterprise-data-encryption.jpg</image:loc>
			<image:title><![CDATA[enterprise-data-encryption]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/maturation-of-encrypted-communication/</loc>
		<lastmod>2020-06-04T22:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/DoD.jpg</image:loc>
			<image:title><![CDATA[DoD]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/infographic-how-enterprises-can-improve-data-encryption/</loc>
		<lastmod>2020-06-04T22:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Data-Encryption.png</image:loc>
			<image:title><![CDATA[Data Encryption]]></image:title>
			<image:caption><![CDATA[Data Encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/How-Enterprises-Can-Improve-Data-Encryption-01.png</image:loc>
			<image:title><![CDATA[ 01]]></image:title>
			<image:caption><![CDATA[ 01]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/7-mistakes-to-avoid-when-looking-for-the-best-encrypted-messaging-app/</loc>
		<lastmod>2020-06-04T22:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/08/messaging-app.jpg</image:loc>
			<image:title><![CDATA[messaging app]]></image:title>
			<image:caption><![CDATA[messaging app]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-key-strategies-to-adopting-the-best-encrypted-messaging-app/</loc>
		<lastmod>2020-06-04T22:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/08/best-encrypted-messaging-app.jpg</image:loc>
			<image:title><![CDATA[best encrypted messaging app]]></image:title>
			<image:caption><![CDATA[best encrypted messaging app]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-choose-the-best-encrypted-messaging-app/</loc>
		<lastmod>2020-06-04T22:41:05+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/encrypted-messaging-app.jpg</image:loc>
			<image:title><![CDATA[encrypted messaging app]]></image:title>
			<image:caption><![CDATA[encrypted messaging app]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/backdooring-the-debate-on-backdoors-the-earn-it-act-is-introduced/</loc>
		<lastmod>2020-06-04T22:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/earn-it-act.jpeg</image:loc>
			<image:title><![CDATA[EARN-IT Act]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/transparency-in-the-earn-it-act/</loc>
		<lastmod>2020-06-04T22:49:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/earn-it-act.jpg</image:loc>
			<image:title><![CDATA[earn-it act]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/can-vs-should-real-world-equivalents-in-the-debate-on-encryption-backdoors/</loc>
		<lastmod>2020-06-04T22:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/backdoor.jpg</image:loc>
			<image:title><![CDATA[backdoor]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/covid-19-tracing-apps-and-measuring-the-impact-of-government-overreach/</loc>
		<lastmod>2020-06-04T22:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/contact-tracing.jpg</image:loc>
			<image:title><![CDATA[contact-tracing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-your-business-cant-ignore-security/</loc>
		<lastmod>2020-06-04T22:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/business-security.jpg</image:loc>
			<image:title><![CDATA[business-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-market-forces-behind-facebooks-pursuit-of-privacy-and-trust/</loc>
		<lastmod>2020-06-04T22:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/03/cyber-security-3400657.jpg</image:loc>
			<image:title><![CDATA[cyber security 3400657]]></image:title>
			<image:caption><![CDATA[cyber security 3400657]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/privacy_is_inevitable_thoughts_on_the_uber_waymo_trial/</loc>
		<lastmod>2020-06-04T23:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/privacy.png</image:loc>
			<image:title><![CDATA[privacy]]></image:title>
			<image:caption><![CDATA[privacy]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/privacy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/lessons-to-learn-from-the-public-frenzy-over-whatsapps-security/</loc>
		<lastmod>2020-06-04T23:08:09+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/whatsapp-image.jpg</image:loc>
			<image:title><![CDATA[whatsapp image]]></image:title>
			<image:caption><![CDATA[whatsapp image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/whatsapp-image.jpg</image:loc>
			<image:caption><![CDATA[whatsapp image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/comparing-the-wickr-messaging-protocol-to-the-double-ratchet-protocols/</loc>
		<lastmod>2020-06-05T21:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/protocols.jpg</image:loc>
			<image:title><![CDATA[protocols]]></image:title>
			<image:caption><![CDATA[protocols]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/better-post-compromise-security-for-mls/</loc>
		<lastmod>2020-06-05T21:31:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/post-compromise-security.jpg</image:loc>
			<image:title><![CDATA[post-compromise-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/cryptographic-research-at-wickr/</loc>
		<lastmod>2020-06-05T21:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/Wickr-Cryptographic-Research.jpg</image:loc>
			<image:title><![CDATA[Wickr Cryptographic Research]]></image:title>
			<image:caption><![CDATA[Wickr Cryptographic Research]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/managing-cryptographic-keys/</loc>
		<lastmod>2020-06-05T21:38:01+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/cryptographic-keys.jpg</image:loc>
			<image:title><![CDATA[cryptographic keys]]></image:title>
			<image:caption><![CDATA[cryptographic keys]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secure-messaging-protocols-part-1-a-brief-history/</loc>
		<lastmod>2020-06-05T21:44:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/Secure-Messaging-Protocols.jpg</image:loc>
			<image:title><![CDATA[Secure Messaging Protocols]]></image:title>
			<image:caption><![CDATA[Secure Messaging Protocols]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secure-messaging-protocols-part-2-the-bleeding-edge/</loc>
		<lastmod>2020-06-05T21:49:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/secure-messaging-protocol-1.jpg</image:loc>
			<image:title><![CDATA[secure messaging protocol 1]]></image:title>
			<image:caption><![CDATA[secure messaging protocol 1]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/new-attacks-on-openssls-elliptic-curve-crypto/</loc>
		<lastmod>2020-06-05T21:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/05/Elliptic-Curve-Crypto.jpg</image:loc>
			<image:title><![CDATA[Elliptic Curve Crypto]]></image:title>
			<image:caption><![CDATA[Elliptic Curve Crypto]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/on-password-protection/</loc>
		<lastmod>2020-06-05T21:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/password_protection-icon.jpg</image:loc>
			<image:title><![CDATA[password protection icon]]></image:title>
			<image:caption><![CDATA[password protection icon]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/password_protection-icon.jpg</image:loc>
			<image:caption><![CDATA[password protection icon]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickrs-messaging-protocol/</loc>
		<lastmod>2020-06-05T22:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/messaging-protocol-wp.jpg</image:loc>
			<image:title><![CDATA[messaging protocol wp]]></image:title>
			<image:caption><![CDATA[messaging protocol wp]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Screen-Shot-2018-05-14-at-12.23.10-PM.png</image:loc>
			<image:title><![CDATA[Wickr Messaging Protocol Title Image]]></image:title>
			<image:caption><![CDATA[Wickr Messaging Protocol Title Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/NEWPROTOCOLBlackcentered.jpg</image:loc>
			<image:caption><![CDATA[NEW+PROTOCOL+Black+centered]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-bit-security-of-cryptographic-primitives-2/</loc>
		<lastmod>2020-06-05T22:02:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/06/bits.jpg</image:loc>
			<image:title><![CDATA[bit security]]></image:title>
			<image:caption><![CDATA[Bit Security Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/06/1wCj54AJnEXt7x1bZTVqA3Q.png</image:loc>
			<image:title><![CDATA[Algorithm]]></image:title>
			<image:caption><![CDATA[Algorithm Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2017/06/1gTWjpKwGfbfeN1HridK1gQ.png</image:loc>
			<image:title><![CDATA[wickr phone image]]></image:title>
			<image:caption><![CDATA[wickr phone image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickrs-core-crypto-goes-public/</loc>
		<lastmod>2020-06-05T22:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/crypto.jpg</image:loc>
			<image:title><![CDATA[crypto]]></image:title>
			<image:caption><![CDATA[crypto]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/better-contact-discovery/</loc>
		<lastmod>2020-06-05T22:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/contact-discovery.jpg</image:loc>
			<image:title><![CDATA[contact discovery]]></image:title>
			<image:caption><![CDATA[contact discovery]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Screen-Shot-2019-09-24-at-6.27.39-PM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2019 09 24 at 6.27.39 PM]]></image:title>
			<image:caption><![CDATA[Screen Shot 2019 09 24 at 6.27.39 PM]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Screen-Shot-2019-09-24-at-6.28.49-PM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2019 09 24 at 6.28.49 PM]]></image:title>
			<image:caption><![CDATA[Screen Shot 2019 09 24 at 6.28.49 PM]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Screen-Shot-2019-09-24-at-6.29.13-PM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2019 09 24 at 6.29.13 PM]]></image:title>
			<image:caption><![CDATA[Screen Shot 2019 09 24 at 6.29.13 PM]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Screen-Shot-2019-09-24-at-6.29.29-PM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2019 09 24 at 6.29.29 PM]]></image:title>
			<image:caption><![CDATA[Screen Shot 2019 09 24 at 6.29.29 PM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/significance-of-strong-encryption-standards/</loc>
		<lastmod>2020-06-05T22:16:05+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/encryption.jpg</image:loc>
			<image:title><![CDATA[encryption]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/encryption.jpg</image:loc>
			<image:caption><![CDATA[encryption image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/having-a-proactive-cybersecurity-plan-in-a-5g-world/</loc>
		<lastmod>2020-06-06T18:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/5G-security.jpg</image:loc>
			<image:title><![CDATA[5G-security]]></image:title>
			<image:caption><![CDATA[5G Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-5g-will-impact-your-cybersecurity-strategy/</loc>
		<lastmod>2020-06-06T18:51:36+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/10/5g-security.jpg</image:loc>
			<image:title><![CDATA[5g-security]]></image:title>
			<image:caption><![CDATA[5G Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-zero-trust-security-strategy-in-a-5g-world/</loc>
		<lastmod>2020-06-06T18:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/5g-zero-trust.jpg</image:loc>
			<image:title><![CDATA[5g zero trust]]></image:title>
			<image:caption><![CDATA[5g zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/electron-vulnerability-the-quest-for-cool/</loc>
		<lastmod>2020-06-06T18:57:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/technology-image.jpg</image:loc>
			<image:title><![CDATA[technology image]]></image:title>
			<image:caption><![CDATA[technology image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/technology-image.jpg</image:loc>
			<image:caption><![CDATA[technology image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/email_is_closed_for_business/</loc>
		<lastmod>2020-06-06T19:02:01+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/BEC300.png</image:loc>
			<image:title><![CDATA[BEC300]]></image:title>
			<image:caption><![CDATA[BEC300]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/03/BEC.png</image:loc>
			<image:caption><![CDATA[BEC Article Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/managed-secure-messaging/</loc>
		<lastmod>2020-06-06T19:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/Managed-Secure-Messaging-1.jpg</image:loc>
			<image:title><![CDATA[Managed Secure Messaging 1]]></image:title>
			<image:caption><![CDATA[Managed Secure Messaging 1]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-enterprises-should-encourage-ephemeral-communication/</loc>
		<lastmod>2020-06-06T19:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/enterprise-communications.jpg</image:loc>
			<image:title><![CDATA[enterprise-communications]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/top-4-benefits-of-ephemeral-messaging-for-security-professionals/</loc>
		<lastmod>2020-06-06T19:16:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/ephemeral-messaging.jpg</image:loc>
			<image:title><![CDATA[ephemeral-messaging]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/e-discovering-the-use-of-ephemeral-messaging/</loc>
		<lastmod>2020-06-06T19:20:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/secure-ediscover.jpg</image:loc>
			<image:title><![CDATA[secure ediscover]]></image:title>
			<image:caption><![CDATA[secure ediscover]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/facebook-founder-says-the-world-needs-wickr/</loc>
		<lastmod>2020-06-06T19:25:37+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/03/wickr-blog-2.jpg</image:loc>
			<image:title><![CDATA[wickr blog 2]]></image:title>
			<image:caption><![CDATA[wickr blog 2]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/top-predictions-in-cybersecurity-for-2020/</loc>
		<lastmod>2020-06-06T19:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/Top-5-Cybersecurity-Predictions-img.png</image:loc>
			<image:title><![CDATA[Top-5-Cybersecurity-Predictions-img]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/Top-5-Cybersecurity-Predictions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/ripping-off-the-email-band-aid-with-more-secure-communication/</loc>
		<lastmod>2020-06-06T19:31:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/email.jpg</image:loc>
			<image:title><![CDATA[email]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/that-moment-you-realize/</loc>
		<lastmod>2020-06-06T19:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/breach.jpg</image:loc>
			<image:title><![CDATA[breach]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/be-prepared-cyber-blackout/</loc>
		<lastmod>2020-06-06T19:43:01+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/09/disaster_blackout.png</image:loc>
			<image:title><![CDATA[disaster blackout]]></image:title>
			<image:caption><![CDATA[disaster blackout]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/09/disaster_blackout.png</image:loc>
			<image:title><![CDATA[disaster blackout]]></image:title>
			<image:caption><![CDATA[disaster blackout]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/deciphering-the-misleading-year-zero-headlines/</loc>
		<lastmod>2020-06-06T19:45:40+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/misleading_zero_image.jpg</image:loc>
			<image:title><![CDATA[misleading zero image]]></image:title>
			<image:caption><![CDATA[misleading zero image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/misleading_zero_image.jpg</image:loc>
			<image:caption><![CDATA[misleading zero image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/infographic-5-of-the-most-important-data-breach-statistics-you-need-to-know/</loc>
		<lastmod>2020-06-06T19:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/Wickr-Data-Breach-Header.png</image:loc>
			<image:title><![CDATA[Wickr-Data-Breach-Header]]></image:title>
			<image:caption><![CDATA[Wickr-Data-Breach-Header]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/10/Wickr-Data-Breach-Infographic.png</image:loc>
			<image:caption><![CDATA[Wickr-Data-Breach-Infographic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-steps-to-proper-enterprise-data-protection/</loc>
		<lastmod>2020-06-06T19:50:19+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/enterprise-security.jpg</image:loc>
			<image:title><![CDATA[enterprise security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-tips-for-how-to-keep-your-personal-and-company-data-safe-from-breaches/</loc>
		<lastmod>2020-06-06T19:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/corporate-data-breach.jpg</image:loc>
			<image:title><![CDATA[corporate data breach]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/key-strategies-to-help-security-teams-with-cyber-threat-management/</loc>
		<lastmod>2020-06-06T19:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/cyber-threats.jpg</image:loc>
			<image:title><![CDATA[cyber-threats]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-most-important-features-to-have-for-secure-communication/</loc>
		<lastmod>2020-06-06T20:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/10/secure-comm.jpg</image:loc>
			<image:title><![CDATA[secure-comm]]></image:title>
			<image:caption><![CDATA[secure-comm]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/your-go-to-checklist-for-secure-data-sharing/</loc>
		<lastmod>2020-06-06T20:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/10/secure-data-sharing.jpg</image:loc>
			<image:title><![CDATA[secure-data-sharing]]></image:title>
			<image:caption><![CDATA[secure-data-sharing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/3-key-ways-enterprises-can-enhance-secure-data-sharing/</loc>
		<lastmod>2020-06-06T20:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/09/enterprise-communication.jpg</image:loc>
			<image:title><![CDATA[enterprise communication]]></image:title>
			<image:caption><![CDATA[enterprise communication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/lessons-we-learned-from-a-recent-attack/</loc>
		<lastmod>2020-06-06T20:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/07/telegram-bots-attack.jpg</image:loc>
			<image:title><![CDATA[telegram bots attack]]></image:title>
			<image:caption><![CDATA[telegram bots attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/benefits-of-investing-in-data-security/</loc>
		<lastmod>2020-06-06T20:13:15+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/data-security.jpg</image:loc>
			<image:title><![CDATA[data-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/top-5-cybersecurity-risks-with-remote-work/</loc>
		<lastmod>2020-06-06T22:53:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/remote-work-security.jpg</image:loc>
			<image:title><![CDATA[remote-work-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-cybersecurity-tips-for-working-remotely/</loc>
		<lastmod>2020-06-06T22:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/04/work-from-home.jpg</image:loc>
			<image:title><![CDATA[work-from-home]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-stay-safe-and-secure-while-teaching-remotely/</loc>
		<lastmod>2020-06-06T22:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/e-learning.jpg</image:loc>
			<image:title><![CDATA[e-learning]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-surge-for-telemedicine-during-covid-19/</loc>
		<lastmod>2020-06-06T22:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/telemedicine.jpg</image:loc>
			<image:title><![CDATA[telemedicine]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/infusing-security-into-the-new-normal-communication-and-collaboration-in-a-distributed-workforce/</loc>
		<lastmod>2020-06-06T23:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/covid.jpg</image:loc>
			<image:title><![CDATA[covid]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/remote-work-has-never-been-more-important/</loc>
		<lastmod>2020-06-06T23:04:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/Remote-Work-1.jpg</image:loc>
			<image:title><![CDATA[Remote Work]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/remote.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/work-from-home-tips.png</image:loc>
			<image:caption><![CDATA[5 Quick Tips for Secure &amp; Productive Remote Work]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/what-the-intersection-between-remote-work-and-zero-trust-means/</loc>
		<lastmod>2020-06-06T23:06:35+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/zero-trust-home-office.jpg</image:loc>
			<image:title><![CDATA[zero-trust-home-office]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/to-build-in-or-bolt-on-that-is-the-question/</loc>
		<lastmod>2020-06-06T23:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/03/network.jpg</image:loc>
			<image:title><![CDATA[network]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/enterprise-level-security-with-saas-simplicity/</loc>
		<lastmod>2020-06-06T23:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/04/BlogPost_Image.png</image:loc>
			<image:title><![CDATA[BlogPost Image]]></image:title>
			<image:caption><![CDATA[BlogPost Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/security-lessons-from-top-cyber-incident-responders-at-ir17/</loc>
		<lastmod>2020-06-06T23:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/ir17-image.jpg</image:loc>
			<image:title><![CDATA[ir17 image]]></image:title>
			<image:caption><![CDATA[ir17 image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/ir17-group-image.jpg</image:loc>
			<image:caption><![CDATA[IR17 Group Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/land-expand-find-kryptonite-the-impact-of-real-zero-trust-solutions/</loc>
		<lastmod>2020-06-06T23:13:05+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/hacker.jpg</image:loc>
			<image:title><![CDATA[hacker]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/zero-trust-apps-are-the-future/</loc>
		<lastmod>2020-06-06T23:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/06/zero-trust-apps.jpg</image:loc>
			<image:title><![CDATA[zero trust apps]]></image:title>
			<image:caption><![CDATA[zero trust apps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/zero-trust-how-about-trust-with-secure-administrative-controls/</loc>
		<lastmod>2020-06-06T23:21:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/04/zero-trust.jpg</image:loc>
			<image:title><![CDATA[zero trust]]></image:title>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/04/secure-communication.png</image:loc>
			<image:title><![CDATA[secure communication]]></image:title>
			<image:caption><![CDATA[secure communication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/need-to-keep-your-communications-secure-the-right-solution-may-be-in-the-cloud/</loc>
		<lastmod>2020-06-06T23:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/cloud-security.jpg</image:loc>
			<image:title><![CDATA[cloud security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-disappointed-man-in-the-middle/</loc>
		<lastmod>2020-06-06T23:26:33+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/ssl.jpg</image:loc>
			<image:title><![CDATA[ssl]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-new-dwell-time-in-cybersecurity/</loc>
		<lastmod>2020-06-06T23:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/02/dwell-time.jpg</image:loc>
			<image:title><![CDATA[dwell-time]]></image:title>
			<image:caption><![CDATA[dwell time]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-start-join-a-call/</loc>
		<lastmod>2020-06-08T04:16:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/video-conferecing.jpg</image:loc>
			<image:title><![CDATA[video conferecing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-adding-contacts/</loc>
		<lastmod>2020-06-12T18:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/adding-contacts.jpg</image:loc>
			<image:title><![CDATA[adding contacts]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/making-ephemerality-and-encryption-a-new-norm/</loc>
		<lastmod>2020-06-13T22:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/encryptionNorm.jpg</image:loc>
			<image:title><![CDATA[encryptionNorm]]></image:title>
			<image:caption><![CDATA[encryptionNorm]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/ephemeral-messaging-balancing-the-benefits-and-risks/</loc>
		<lastmod>2020-06-17T15:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/shutterstock_744399862.jpg</image:loc>
			<image:title><![CDATA[Ephemeral]]></image:title>
			<image:caption><![CDATA[Ephemeral]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-wickr-open-access/</loc>
		<lastmod>2020-06-18T20:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/wickr-ram.png</image:loc>
			<image:title><![CDATA[wickr-ram]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-location-sharing/</loc>
		<lastmod>2020-06-19T18:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/location.jpg</image:loc>
			<image:title><![CDATA[location]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/3-ways-enterprises-can-enhance-secure-data-sharing/</loc>
		<lastmod>2020-06-25T16:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/Screen-Shot-2020-06-25-at-10.12.39-AM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2020-06-25 at 10.12.39 AM]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/secure-data-sharing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-wickr-video-conferencing-is-fully-encrypted-and-secure-for-teams/</loc>
		<lastmod>2020-06-25T23:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/video-conferencing-solution.jpg</image:loc>
			<image:title><![CDATA[video-conferencing-solution]]></image:title>
			<image:caption><![CDATA[video conferencing solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-save-a-file/</loc>
		<lastmod>2020-06-26T19:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/file-saving.jpg</image:loc>
			<image:title><![CDATA[file-saving]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/keep-your-data-safe-from-breaches-infographic/</loc>
		<lastmod>2020-07-01T14:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/Screen-Shot-2020-07-01-at-8.25.16-AM.png</image:loc>
			<image:title><![CDATA[Screen Shot 2020-07-01 at 8.25.16 AM]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/data-safety.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/election-cybersecurity-its-more-important-than-ever/</loc>
		<lastmod>2020-07-07T03:37:16+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/election-security.jpg</image:loc>
			<image:title><![CDATA[election-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/winning-world-war-5g/</loc>
		<lastmod>2020-07-07T23:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/5g.jpg</image:loc>
			<image:title><![CDATA[5g]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-file-sharing/</loc>
		<lastmod>2020-07-10T00:46:27+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/file-share.jpg</image:loc>
			<image:title><![CDATA[file-share]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-expiration-timers/</loc>
		<lastmod>2020-07-11T15:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/burn-on-read.jpg</image:loc>
			<image:title><![CDATA[burn-on-read]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-top-5-causes-of-data-breaches/</loc>
		<lastmod>2020-07-15T00:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/data-breach.jpg</image:loc>
			<image:title><![CDATA[data-breach]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/The-Top-5-Causes-of-Data-Breaches.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-encrypted-voice-memos/</loc>
		<lastmod>2020-07-17T20:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/voice-memos.jpg</image:loc>
			<image:title><![CDATA[voice-memos]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-reasons-why-wickr-pro-is-the-new-email/</loc>
		<lastmod>2020-07-23T14:51:50+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/new-email.jpg</image:loc>
			<image:title><![CDATA[new-email]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/10-Reasons-Why-Wickr-Pro-is-the-New-Email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-secure-shredder/</loc>
		<lastmod>2020-07-24T23:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/data-shredder.jpg</image:loc>
			<image:title><![CDATA[data-shredder]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/ShredderControls.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/Screen-Shot-2020-07-24-at-5.03.33-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/7-considerations-for-secure-communication-within-your-company/</loc>
		<lastmod>2020-07-27T17:30:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2019/12/corporate-security.jpg</image:loc>
			<image:title><![CDATA[corporate-security]]></image:title>
			<image:caption><![CDATA[corporate-security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-cyber-hygiene-is-more-important-than-ever/</loc>
		<lastmod>2020-07-30T22:29:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/07/cyber-hygeine.jpg</image:loc>
			<image:title><![CDATA[cyber-hygeine]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/are-third-party-tools-putting-your-organization-at-risk/</loc>
		<lastmod>2020-08-02T23:19:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/third-party.jpg</image:loc>
			<image:title><![CDATA[third party]]></image:title>
			<image:caption><![CDATA[third party blog image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/third-party.jpg</image:loc>
			<image:title><![CDATA[third party]]></image:title>
			<image:caption><![CDATA[third party blog image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-enterprise-enables-transparent-record-keeping-strong-data-protection-and-ephemerality/</loc>
		<lastmod>2020-08-02T23:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/dataCollaboration.png</image:loc>
			<image:title><![CDATA[dataCollaboration]]></image:title>
			<image:caption><![CDATA[dataCollaboration]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/dataCollaboration.png</image:loc>
			<image:caption><![CDATA[Blog Data Collaboration Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-messenger-launches-on-mac-windows-and-linux/</loc>
		<lastmod>2020-08-05T19:14:57+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/desktop-version.jpg</image:loc>
			<image:title><![CDATA[desktop version]]></image:title>
			<image:caption><![CDATA[desktop version]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-named-secure-messaging-app-of-the-oslo-freedom-forum/</loc>
		<lastmod>2020-08-05T19:15:46+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Awarded.jpg</image:loc>
			<image:title><![CDATA[Awarded]]></image:title>
			<image:caption><![CDATA[Awarded]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-raises-30m-series-b-led-by-jim-breyer/</loc>
		<lastmod>2020-08-05T19:18:16+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/FundB.jpg</image:loc>
			<image:title><![CDATA[FundB]]></image:title>
			<image:caption><![CDATA[FundB]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/adopting-ephemeral-technology-in-the-workplace/</loc>
		<lastmod>2020-08-05T19:20:31+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/01/federal-messaging.jpg</image:loc>
			<image:title><![CDATA[federal-messaging]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/data-to-have-and-not-to-hold/</loc>
		<lastmod>2020-08-05T19:21:03+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Federation.jpg</image:loc>
			<image:title><![CDATA[Federation]]></image:title>
			<image:caption><![CDATA[Federation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-lawyers-should-be-using-end-to-end-encryption-to-protect-client-communications/</loc>
		<lastmod>2020-08-05T19:22:04+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Federation.jpg</image:loc>
			<image:title><![CDATA[Federation]]></image:title>
			<image:caption><![CDATA[Federation]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/Risk_image.jpg</image:loc>
			<image:caption><![CDATA[Risk Assessment Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/new-strategies-in-protecting-client-communications/</loc>
		<lastmod>2020-08-05T19:22:40+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/client-communications.jpg</image:loc>
			<image:title><![CDATA[client communications]]></image:title>
			<image:caption><![CDATA[client communications]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/client-communications.jpg</image:loc>
			<image:caption><![CDATA[Client Communications Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/hacking-the-2020-election/</loc>
		<lastmod>2020-08-07T14:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/election-security.jpg</image:loc>
			<image:title><![CDATA[election security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/Hacking_the_2020_Election.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickrs_secure_collaboration_channels/</loc>
		<lastmod>2020-08-10T18:28:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/Blog_Wickrs-Secure-Collaboration-Channels-e1525176490453.png</image:loc>
			<image:title><![CDATA[Blog Wickrs Secure Collaboration Channels e1525176490453]]></image:title>
			<image:caption><![CDATA[Blog Wickrs Secure Collaboration Channels e1525176490453]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/Blog_Wickrs-Secure-Collaboration-Channels-e1525176490453.png</image:loc>
			<image:caption><![CDATA[Blog_Wickrs-Secure-Collaboration-Channels]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/04/Videoscreen.jpg</image:loc>
			<image:caption><![CDATA[Blog Article Image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-federation-controls/</loc>
		<lastmod>2020-08-10T18:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/federation.jpg</image:loc>
			<image:title><![CDATA[federation]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://support.wickr.com/hc/article_attachments/360025204773/Screen_Shot_2019-01-31_at_4.35.30_PM.png</image:loc>
			<image:caption><![CDATA[Screen_Shot_2019-01-31_at_4.35.30_PM.png]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://support.wickr.com/hc/article_attachments/360025204793/Screen_Shot_2019-01-31_at_4.12.11_PM.png</image:loc>
			<image:caption><![CDATA[Screen_Shot_2019-01-31_at_4.12.11_PM.png]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://support.wickr.com/hc/article_attachments/360025204833/Screen_Shot_2019-01-31_at_4.11.49_PM.png</image:loc>
			<image:caption><![CDATA[Screen_Shot_2019-01-31_at_4.11.49_PM.png]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://support.wickr.com/hc/article_attachments/360025204933/Screen_Shot_2019-01-31_at_4.43.57_PM.png</image:loc>
			<image:caption><![CDATA[Screen_Shot_2019-01-31_at_4.43.57_PM.png]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/zero-in-common/</loc>
		<lastmod>2020-08-10T19:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/zero-trust.jpg</image:loc>
			<image:title><![CDATA[zero-trust]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/9-reasons-privacy-should-be-important-to-enterprises/</loc>
		<lastmod>2020-08-12T14:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/enterprise-privacy.jpg</image:loc>
			<image:title><![CDATA[enterprise-privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/pharma-biotech-hacking/</loc>
		<lastmod>2020-08-14T02:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/pharma.jpg</image:loc>
			<image:title><![CDATA[pharma]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/Pharma_Biotech_Hacking_Infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-message-reactions/</loc>
		<lastmod>2020-08-17T02:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/emoji-reactions.jpg</image:loc>
			<image:title><![CDATA[emoji-reactions]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-microphone-camera-settings/</loc>
		<lastmod>2020-08-24T03:03:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/wickr-pro-conferencing.png</image:loc>
			<image:title><![CDATA[wickr-pro-conferencing]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-59/</loc>
		<lastmod>2020-08-25T17:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/the-right-to-end-privacy/</loc>
		<lastmod>2020-08-28T02:54:57+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/end-of-privacy.jpg</image:loc>
			<image:title><![CDATA[end-of-privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-message-searching/</loc>
		<lastmod>2020-09-03T18:51:40+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-file-saving.png</image:loc>
			<image:title><![CDATA[wickr-pro-file-saving]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-message-voting/</loc>
		<lastmod>2020-09-05T02:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/message-voting.jpg</image:loc>
			<image:title><![CDATA[message-voting]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/4-steps-to-developing-a-cyber-risk-management-plan/</loc>
		<lastmod>2020-09-13T15:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/cyber-risk-plan.jpg</image:loc>
			<image:title><![CDATA[cyber risk plan]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/top-10-reasons-users-upgrade-from-wickr-me-to-wickr-pro/</loc>
		<lastmod>2020-09-24T02:51:26+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-expiration.png</image:loc>
			<image:title><![CDATA[wickr-pro-expiration]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-conferencing-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-file-saving-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-memo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-getting-started-with-wickr-pro/</loc>
		<lastmod>2020-09-25T22:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/start-wickr-pro.jpg</image:loc>
			<image:title><![CDATA[start-wickr-pro]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-burn-on-read-and-expiration-timers/</loc>
		<lastmod>2020-10-01T17:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/burn-on-read.jpg</image:loc>
			<image:title><![CDATA[burn-on-read]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-feature-keyboard-shortcuts/</loc>
		<lastmod>2020-10-06T19:58:28+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/keyboard-shortcuts.jpg</image:loc>
			<image:title><![CDATA[keyboard-shortcuts]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/maritime-industry-cybersecurity-risks/</loc>
		<lastmod>2020-10-08T21:55:38+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/maritime-security.jpg</image:loc>
			<image:title><![CDATA[maritime-security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/Maritime-Industry-Cybersecurity-Risks.png</image:loc>
			<image:caption><![CDATA[Maritime Industry Cybersecurity Risks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/election-2020-5-threats-still-imminent/</loc>
		<lastmod>2020-10-12T19:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/ballot.jpg</image:loc>
			<image:title><![CDATA[ballot]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-feature-mentions-message-replies-and-locked-messages/</loc>
		<lastmod>2020-10-14T00:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/business-mentions.jpg</image:loc>
			<image:title><![CDATA[business-mentions]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-how-to-basic-security-group-configuration/</loc>
		<lastmod>2020-10-19T15:20:46+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/admin-controls.jpg</image:loc>
			<image:title><![CDATA[admin-controls]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-new-warning-label/</loc>
		<lastmod>2020-10-20T19:39:41+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/warning-label.jpg</image:loc>
			<image:title><![CDATA[warning-label]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/becybersmart-with-wickr/</loc>
		<lastmod>2020-10-21T20:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/becybersmart.jpg</image:loc>
			<image:title><![CDATA[becybersmart]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-ways-to-master-wickr-while-working-from-home/</loc>
		<lastmod>2020-10-22T02:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/master-wickr-pro.png</image:loc>
			<image:title><![CDATA[master-wickr-pro]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/06/master-wickr-pro-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/business-email-compromise-why-enterprises-are-ditching-their-inbox/</loc>
		<lastmod>2020-10-27T23:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/bec.jpg</image:loc>
			<image:title><![CDATA[bec]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/hacking-united-states-defense-contractors/</loc>
		<lastmod>2020-10-31T04:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/defense-contractor.jpg</image:loc>
			<image:title><![CDATA[defense-contractor]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/10/Hacking_United_States_Defense_Contractors_Infographic_-_Outlined.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/top-10-reasons-users-upgrade-from-wickr-me-to-wickr-pro-2/</loc>
		<lastmod>2020-11-05T06:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-messaging.png</image:loc>
			<image:title><![CDATA[wickr-pro-messaging]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/upgrade-to-wickr-pro.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-future-of-secure-remote-work-5-data-points-that-might-surprise-you/</loc>
		<lastmod>2020-11-06T17:40:20+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/remote-work-data.jpg</image:loc>
			<image:title><![CDATA[remote-work-data]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-60/</loc>
		<lastmod>2020-11-06T21:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-62/</loc>
		<lastmod>2020-11-06T21:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-63/</loc>
		<lastmod>2020-11-06T21:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/wickr-product-update-version-5-66/</loc>
		<lastmod>2020-11-17T02:25:29+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/wickr-5-66.jpg</image:loc>
			<image:title><![CDATA[wickr-5-66]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-top-5-cybersecurity-threats-to-defense-contractors/</loc>
		<lastmod>2020-11-20T00:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/defense-contractor.jpg</image:loc>
			<image:title><![CDATA[defense contractor]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-key-elements-of-data-encryption-best-practices/</loc>
		<lastmod>2020-11-25T22:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/enterprise-data.jpg</image:loc>
			<image:title><![CDATA[enterprise-data]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-data-encryption-best-practices/</loc>
		<lastmod>2020-12-01T23:28:27+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/data-encryption.jpg</image:loc>
			<image:title><![CDATA[data-encryption]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/5-Data-Encryption-Best-Practices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-businesses-can-be-more-proactive-with-data-security-and-compliance/</loc>
		<lastmod>2020-12-03T19:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/business-security.jpg</image:loc>
			<image:title><![CDATA[business-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-security-of-cryptocurrency-cryptojacking-statistics/</loc>
		<lastmod>2020-12-09T04:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/cryptocurrency.jpg</image:loc>
			<image:title><![CDATA[cryptocurrency]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/The-Security-of-Cryptocurrency-Cryptojacking-Statistics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-awarded-us-air-force-contract/</loc>
		<lastmod>2020-12-09T18:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/DoD.jpg</image:loc>
			<image:title><![CDATA[DoD.jpg]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/bridging-the-gap-between-cybersecurity-technology-and-government-bureaucracy/</loc>
		<lastmod>2020-12-18T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/gov-cybersecurity.jpg</image:loc>
			<image:title><![CDATA[gov-cybersecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-ceo-on-possible-data-stolen-in-the-solarwinds-attack/</loc>
		<lastmod>2020-12-23T21:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/05/FoxNews.png</image:loc>
			<image:title><![CDATA[FoxNews]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/data-encryption-101-best-practices/</loc>
		<lastmod>2020-12-23T22:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/data-encryption-101.jpg</image:loc>
			<image:title><![CDATA[data-encryption-101]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-new-battleground-cybersecurity-and-the-department-of-defense/</loc>
		<lastmod>2020-12-30T01:59:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/12/department-of-defense.jpg</image:loc>
			<image:title><![CDATA[department-of-defense]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/cloud-security-10-ways-to-better-protect-data-in-the-cloud/</loc>
		<lastmod>2020-12-30T16:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/cloud-security.jpg</image:loc>
			<image:title><![CDATA[cloud-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-ways-to-better-protect-data-in-the-cloud/</loc>
		<lastmod>2021-01-02T15:32:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/cloud-data-infographic.jpg</image:loc>
			<image:title><![CDATA[cloud-data-infographic]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/10_Ways_to_Better_Protect_Data_in_the_Cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-security-compliance-trends-to-watch-for-in-2021/</loc>
		<lastmod>2021-01-04T04:32:03+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/cyber-trends.jpg</image:loc>
			<image:title><![CDATA[cyber-trends]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-66/</loc>
		<lastmod>2021-01-08T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-68/</loc>
		<lastmod>2021-01-08T17:03:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/key-lessons-from-the-solarwinds-cyber-attack-and-how-to-be-prepared/</loc>
		<lastmod>2021-01-09T04:07:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/solarwinds.jpg</image:loc>
			<image:title><![CDATA[solarwinds]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-secure-communication-methods-every-enterprise-should-have/</loc>
		<lastmod>2021-01-14T17:18:51+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/enterprise-communication.jpg</image:loc>
			<image:title><![CDATA[enterprise-communication]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-top-5-cybersecurity-threats-to-defense-contractors-2/</loc>
		<lastmod>2021-01-16T00:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/defense-contractor.jpg</image:loc>
			<image:title><![CDATA[defense-contractor]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/The_Top_5_Cybersecurity_Threats_to_Defense_Contractors_Infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-end-to-end-encryption-is-a-must-have-for-a-proactive-cybersecurity-practice/</loc>
		<lastmod>2021-01-22T03:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/e2ee.jpg</image:loc>
			<image:title><![CDATA[e2ee]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/7-steps-to-take-during-a-cyber-attack/</loc>
		<lastmod>2021-01-28T17:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/cyber-attack.jpg</image:loc>
			<image:title><![CDATA[Cyber Attack]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/10-data-breach-statistics-for-2021/</loc>
		<lastmod>2021-02-01T04:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/data-breach-stats-2021.jpg</image:loc>
			<image:title><![CDATA[Data Breach Stats 2021]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/10-Data-Breach-Statistics-for-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-is-the-most-secure-communications-solution-and-heres-why/</loc>
		<lastmod>2021-02-05T03:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/01/capable.png</image:loc>
			<image:title><![CDATA[capable]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickrs-enterprise-platform-available-to-global-legal-community-through-the-reynen-court-marketplace/</loc>
		<lastmod>2021-02-10T01:55:53+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/Reynen-Court-Wickr.png</image:loc>
			<image:title><![CDATA[Reynen-Court-Wickr]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/4-ways-to-protect-against-business-email-compromise/</loc>
		<lastmod>2021-02-11T03:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/business-email-compromise-infographic.jpg</image:loc>
			<image:title><![CDATA[Business Email Compromise]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/4_Ways_to_Protect_Against_Business_Email_Compromise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/7-key-points-to-include-in-your-companys-cybersecurity-training/</loc>
		<lastmod>2021-02-11T18:19:33+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/cybersecurity-training.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity Training]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-future-of-cybersecurity-depends-on-stem-education/</loc>
		<lastmod>2021-02-19T01:50:27+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/stem-cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity STEM]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/product-update-5-70/</loc>
		<lastmod>2021-02-22T05:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://wickr.com/create-a-cyber-risk-management-plan-in-4-steps/</loc>
		<lastmod>2021-02-25T05:18:10+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/cyber-risk.jpg</image:loc>
			<image:title><![CDATA[Cyber Risk]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/Create-a-Cyber-Risk-Management-Plan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/leveraging-a-whole-of-society-approach-to-strategic-cyber-risk-in-the-age-of-great-power-competition/</loc>
		<lastmod>2021-02-26T15:55:43+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/cyber-risk-defense.jpg</image:loc>
			<image:title><![CDATA[Cyber Risk Defense]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/lets-be-besties-ephemeral-messaging-and-legal-compliance/</loc>
		<lastmod>2021-02-26T19:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/02/legal-compliance.jpg</image:loc>
			<image:title><![CDATA[Legal Compliance]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/control-and-compliance-how-to-define-your-security-posture/</loc>
		<lastmod>2021-03-04T19:23:45+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/control-compliance.jpg</image:loc>
			<image:title><![CDATA[Two,Businesspeople,Man,And,Woman,Working,On,The,Project,To]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/a-guide-to-threat-intelligence-best-practices/</loc>
		<lastmod>2021-03-12T02:50:55+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/threat-intelligence.jpg</image:loc>
			<image:title><![CDATA[Threat Intelligence]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-ways-enterprises-should-communicate-and-collaborate-securely-with-wickr/</loc>
		<lastmod>2021-03-18T19:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/enterprise-collaboration.jpeg</image:loc>
			<image:title><![CDATA[enterprise collaboration]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-secure-communication-methods-every-enterprise-should-have-infographic/</loc>
		<lastmod>2021-03-25T03:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/enterprise-communication.jpeg</image:loc>
			<image:title><![CDATA[enterprise-communication]]></image:title>
			<image:caption><![CDATA[Secure Enterprise Communication]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/5-Secure-Communication-Methods.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-take-on-a-more-proactive-approach-with-data-security/</loc>
		<lastmod>2021-03-26T17:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/data-security.jpeg</image:loc>
			<image:title><![CDATA[data-security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/9-reasons-privacy-should-be-important-to-enterprises-infographic/</loc>
		<lastmod>2021-03-30T16:31:49+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/9-Reasons-Privacy-Should-Be-Important.jpg</image:loc>
			<image:title><![CDATA[Digital,City,And,Technology,Innovation]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/03/9-Reasons-Privacy-Should-Be-Important.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-now-supported-in-german-and-spanish/</loc>
		<lastmod>2021-04-01T16:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/wickr-german-spanish.jpeg</image:loc>
			<image:title><![CDATA[Wickr in German and Spanish]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-build-a-secure-collaboration-framework-for-your-team/</loc>
		<lastmod>2021-04-06T17:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/secure-framework.jpeg</image:loc>
			<image:title><![CDATA[Secure Collaboration]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-define-your-security-posture-infographic/</loc>
		<lastmod>2021-04-11T16:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/security-posture.jpeg</image:loc>
			<image:title><![CDATA[Security Posture]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Define-Your-Security-Posture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/reduce-your-email-footprint-and-keep-your-communications-secure/</loc>
		<lastmod>2021-04-14T15:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/email-footprint.jpeg</image:loc>
			<image:title><![CDATA[Email Footprint]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-ways-enterprises-should-communicate-and-collaborate-securely-with-wickr-infographic/</loc>
		<lastmod>2021-04-21T20:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/09/wickr-pro-memo.png</image:loc>
			<image:title><![CDATA[wickr-pro-memo]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/5_Ways_Enterprises_Should_Communicate_and_Collaborate_Securely_with_Wickr_Infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/upgraded-dashboard-and-pinning/</loc>
		<lastmod>2021-04-22T15:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/wickr-dashboard-update.jpeg</image:loc>
			<image:title><![CDATA[Wickr Update 5.77]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/Picture12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-communications-best-practices-to-adopt-now/</loc>
		<lastmod>2021-04-28T03:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/business-communication.jpeg</image:loc>
			<image:title><![CDATA[Business Communication]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/is-data-privacy-the-new-strategic-priority-for-businesses/</loc>
		<lastmod>2021-04-29T23:30:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/04/data-privacy-business.jpeg</image:loc>
			<image:title><![CDATA[Data Privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/what-lawyers-are-up-against-in-protecting-client-information/</loc>
		<lastmod>2021-05-04T18:20:02+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/lawyers_blog_image.jpg</image:loc>
			<image:title><![CDATA[lawyers blog image]]></image:title>
			<image:caption><![CDATA[lawyers blog image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/05/lawyers_blog_image.jpg</image:loc>
			<image:caption><![CDATA[lawyers blog image]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/3-signs-of-a-cyber-attack-and-the-first-3-steps-to-take/</loc>
		<lastmod>2021-05-04T18:25:26+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/11/cyber-attack.jpg</image:loc>
			<image:title><![CDATA[cyber-attack]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/wickr-and-psiphons-secure-open-access-now-global/</loc>
		<lastmod>2021-05-05T16:03:29+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/10/wickrpsiphon_feature.png</image:loc>
			<image:title><![CDATA[wickrpsiphon feature]]></image:title>
			<image:caption><![CDATA[wickrpsiphon feature]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2018/10/wickrpsiphon8.png</image:loc>
			<image:title><![CDATA[wickrpsiphon8]]></image:title>
			<image:caption><![CDATA[wickrpsiphon8]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/7-secure-communication-features-every-organization-should-have/</loc>
		<lastmod>2021-05-07T17:25:22+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/communications.jpeg</image:loc>
			<image:title><![CDATA[Business,District,And,Wireless,Technologies]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/5-strategies-to-reduce-cybersecurity-risk/</loc>
		<lastmod>2021-05-12T05:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/cybersecurity-risk.jpeg</image:loc>
			<image:title><![CDATA[Cybersecurity Risk]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/5_Strategies_to_Reduce_Cybersecurity_Risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/an-overview-of-what-to-expect-from-bidens-cybersecurity-policy-changes/</loc>
		<lastmod>2021-05-14T04:26:25+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/biden.jpeg</image:loc>
			<image:title><![CDATA[White House]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-growing-need-for-a-secure-collaboration-platform-for-enterprises/</loc>
		<lastmod>2021-05-21T16:58:56+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/business-call.jpeg</image:loc>
			<image:title><![CDATA[Business Call]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/25-data-security-statistics-enterprises-should-be-aware-of/</loc>
		<lastmod>2021-05-25T14:45:44+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2020/08/data-security.jpg</image:loc>
			<image:title><![CDATA[Data Analysis for Business and Finance Concept]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/15-data-security-statistics-every-enterprise-should-know/</loc>
		<lastmod>2021-05-25T23:18:28+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/cyber-data.jpeg</image:loc>
			<image:title><![CDATA[Cyber data]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/15_Data_Security_Statistics_Every_Enterprise_Should_Know.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/the-biggest-cybersecurity-threats-to-be-aware-of/</loc>
		<lastmod>2021-05-27T18:20:58+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/05/cyber-threats.jpeg</image:loc>
			<image:title><![CDATA[Cyber Threats]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/how-to-be-prepared-for-a-cyber-attack/</loc>
		<lastmod>2021-06-04T17:19:52+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/cyber-attack.jpeg</image:loc>
			<image:title><![CDATA[Cyber Attack]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/secure-collaboration-for-the-federal-government/</loc>
		<lastmod>2021-06-04T19:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/federal-government.jpeg</image:loc>
			<image:title><![CDATA[Federal Government]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/6-reasons-why-email-is-inherently-insecure/</loc>
		<lastmod>2021-06-09T02:31:42+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/insecure-email.jpeg</image:loc>
			<image:title><![CDATA[Insecure Email]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/6-Reasons-Why-Email-is-Insecure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/key-steps-to-achieving-robust-threat-intelligence/</loc>
		<lastmod>2021-06-10T19:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/threat-analysis.jpeg</image:loc>
			<image:title><![CDATA[Threat Analysis]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/why-end-to-end-encryption-is-a-must-have-for-enterprises/</loc>
		<lastmod>2021-06-17T18:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/e2e-encryption.jpeg</image:loc>
			<image:title><![CDATA[Encryption]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://wickr.com/best-practices-for-cybersecurity-compliance/</loc>
		<lastmod>2021-06-25T03:06:39+00:00</lastmod>
		<image:image>
			<image:loc>https://wickr.com/wp-content/uploads/2021/06/cybersecurity-compliance.jpeg</image:loc>
			<image:title><![CDATA[Cybersecurity Compliance]]></image:title>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->