<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyberantix.co.za/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyberantix.co.za/</loc>
		<lastmod>2026-04-07T22:52:04+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/04/Lowlight-laptop-scene-with-cool-blue-neon-illumina-1024x559.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/04/IMG_0167-1-1024x575.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-SOC-and-MDR.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-Network-Detection-and-Response.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Risk-Assessments.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Network-Traffic.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Endpoint-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Journey-To-Green.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Vulnerability-Assessment-and-Penetration-Testing.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cybersecurity-Architecture-Design-and-Review.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/04/a-modern-soc-with-two-professionals-woman-at-desk-slightly-turned-detailed-dashboards-and-analytics-on-monitor-cool-blueteal-lighting-1024x585.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/contact-us/</loc>
		<lastmod>2026-04-24T14:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyberantix.co.za/our-services/</loc>
		<lastmod>2026-04-09T11:37:30+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/2151998466-1024x682.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-SOC-and-MDR.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-Network-Detection-and-Response.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Incident-Response-Planning.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/network.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/endpoint.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/identity.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/cloud.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/operating-system.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/perimeter.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Vulnerability-Assessment-and-Penetration-Testing.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Incident-Response-Planning.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Endpoint-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/cybersecurity-strategy-roadmap/</loc>
		<lastmod>2026-04-01T21:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Extended-Security-Modules.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/vulnerability-assessment-strategy-process-development/</loc>
		<lastmod>2026-04-01T21:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-SOC-and-MDR.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-Network-Detection-and-Response.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Extended-Security-Modules.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/17990-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/siem-as-a-service-siemaas/</loc>
		<lastmod>2026-04-01T21:32:32+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/network-detection-and-response-ndr/</loc>
		<lastmod>2026-04-01T21:31:46+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Penetration-Testing.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Extended-Security-Modules.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/managed-extended-detection-and-response-mxdr/</loc>
		<lastmod>2026-04-01T21:29:57+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/24-7-Monitoring.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Privilege-Misuse-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/managed-detection-and-response-mdr/</loc>
		<lastmod>2026-04-01T21:28:54+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/24-7-Monitoring.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Privilege-Misuse-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-SOC-and-MDR.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/467806-1024x574.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/other-security-modules/</loc>
		<lastmod>2026-04-01T21:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-SOC-and-MDR.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Endpoint-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Penetration-Testing.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Risk-Assessments.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cyber-Accountability-Companion.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/04/A-modern-hightech-control-room-meeting-with-three-1024x572.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/about-us/</loc>
		<lastmod>2026-04-01T21:17:57+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/IMG_0057-1024x575.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Deliver-Real-Impact.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/IMG_0277-1024x575.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/g-rise-executive-reporting/</loc>
		<lastmod>2026-03-16T23:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-Network-Detection-and-Response.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Incident-Response-Planning.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/cyberantix-circle.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/soc-as-a-service-socaas/</loc>
		<lastmod>2026-03-16T23:26:56+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/24-7-Monitoring.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cyber-Accountability-Companion.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cyber-Accountability-Companion.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Care-Deeply.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/1160-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/journey-to-green/</loc>
		<lastmod>2026-01-28T11:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Sequence-Actions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cyber-Accountability-Companion.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/17990-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/architecture-design-and-review/</loc>
		<lastmod>2026-01-28T11:09:01+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cybersecurity-Architecture-Design-and-Review.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Noise-Reduction-and-Correlation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Security-Strategy.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Zero-Trust.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Managed-Network-Detection-and-Response.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/1160-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/vciso/</loc>
		<lastmod>2026-01-28T11:08:50+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Risk-Assessments.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Security-Strategy.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Incident-Response-Planning.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Privilege-Misuse-Detection.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberantix.co.za/consulting-and-advisory/</loc>
		<lastmod>2026-01-28T11:07:06+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Virtual-Chief-Information-Security-Officer.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Security-Strategy.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/G-RISE-Executive-Reporting.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Cybersecurity-Architecture-Design-and-Review.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Governance-Forums.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Incident-Response-Planning.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/Risk-Assessments.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberantix.co.za/wp-content/uploads/2026/01/7360-1024x524.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->