<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://bluecoreresearch.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-03-31 11:17:14 GMT -->
	<url>
		<loc>https://bluecoreresearch.com/</loc>
		<lastmod>2024-08-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/ai-search/</loc>
		<lastmod>2025-07-13</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog-articles/</loc>
		<lastmod>2025-07-13</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/unsubscribe/</loc>
		<lastmod>2025-05-07</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/privacy-policy/</loc>
		<lastmod>2025-05-07</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/contact/</loc>
		<lastmod>2025-05-07</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/solutions/</loc>
		<lastmod>2024-08-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/anti-breach/</loc>
		<lastmod>2024-08-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/company/</loc>
		<lastmod>2024-08-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/partners/</loc>
		<lastmod>2024-08-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/best-database-activity-control-solutions/</loc>
		<lastmod>2026-03-30</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/static-data-masking-build-or-buy/</loc>
		<lastmod>2026-03-18</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-complete-guide-to-diy-static-data-masking/</loc>
		<lastmod>2026-03-13</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/application-or-database-activity-control-how-do-they-compare/</loc>
		<lastmod>2026-02-24</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-security-technology-dont-stay-behind-the-curve/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/finding-sensitive-data-for-free-using-ai/</loc>
		<lastmod>2026-02-12</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/masking-poll/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-security-spending-guidelines/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-activity-control-the-state-of-the-market/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-evaluation-checklist/</loc>
		<lastmod>2026-03-31</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/cybersecurity-budgets-and-what-they-mean/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-security-whose-job-is-it/</loc>
		<lastmod>2026-02-11</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/data-masking-anonymization-obfuscation-and-privacy-methods-and-examples/</loc>
		<lastmod>2025-09-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-state-of-database-security-an-interview-with-blue-core-research-cto/</loc>
		<lastmod>2025-09-17</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-mystery-of-the-missing-sparkle-bits/</loc>
		<lastmod>2025-09-14</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/think-twice-is-database-security-really-a-luxury-you-cant-afford/</loc>
		<lastmod>2025-08-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/solving-data-theft-and-privacy-protection/</loc>
		<lastmod>2025-08-18</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/why-the-not-that-sensitive-argument-crumbles-under-scrutiny/</loc>
		<lastmod>2025-08-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-silent-majority-why-database-threats-must-become-center-stage/</loc>
		<lastmod>2025-08-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-illusion-of-the-wall-why-your-data-fortress-is-a-sandcastle/</loc>
		<lastmod>2025-08-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/what-you-are-doing-is-not-working/</loc>
		<lastmod>2025-06-25</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/introduction-to-databases-for-security-professionals/</loc>
		<lastmod>2025-06-25</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/tracking-data-changes-and-compliance-requirements-for-financial-institutions/</loc>
		<lastmod>2025-07-02</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/your-neglected-databases-are-a-ticking-time-bomb/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/the-enemy-within-why-the-trusted-can-be-your-biggest-nightmare/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-security-from-threats-to-solutions/</loc>
		<lastmod>2025-08-26</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/beyond-the-black-box-your-database-security-matters-more-than-you-think/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/beyond-the-application-walls-why-database-security-demands-your-belief-and-action/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/pci-dss-in-sql-server-and-oracle-databases/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/reactive-forensics-and-auditing-follow-sherlock-holmes/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/what-is-the-difference-between-auditing-and-monitoring/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/how-to-audit-an-oracle-database/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/how-to-audit-a-sql-server-database/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/choosing-the-data-masking-solution-thats-right-for-you/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-auditing-and-ids-comprehensive-guide-to-data-protection/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/budgeting-for-a-secured-future/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/webinar-successful-data-masking-problems-and-solutions/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/data-masking-performance/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/from-a-hackers-perspective/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/email-security-effectiveness-and-risks/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/perimeter-vs-data-centric-guide/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/potential-risks-in-endpoint-security/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/story-of-a-cyberattack/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/risk-control-matrix/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/ids-ips/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/data-centric-security-designing-modern-security/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/2024-webinar/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/data-masking-common-questions/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-visibility-poll-results/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/anomaly-analysis/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/proactive-forensics/</loc>
		<lastmod>2025-06-05</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/fitted-security/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/sql-injection-attack-detection/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/wordpress-attack-detection/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/risk-calculator/</loc>
		<lastmod>2024-09-17</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-security-self-assessment/</loc>
		<lastmod>2024-09-17</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/costa-rica-hack/</loc>
		<lastmod>2025-05-21</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/sql-injection/</loc>
		<lastmod>2025-06-25</lastmod>
	</url>
	<url>
		<loc>https://bluecoreresearch.com/blog/database-auditing-requirements/</loc>
		<lastmod>2024-09-17</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
