<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.getrealsecurity.com</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/labs</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/platform</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/legal/terms</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/legal/accessibility</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/rsa</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/protect-free-trial</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/events</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/expose-fake-job-candidates</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/lp/deepfake-readiness-benchmark-report</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/get-a-demo/thank-you</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/fs-isac-2026-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/untitled</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/event-for-delete</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/stop-candidate-fraud</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/iam-leaders</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/ceo-board</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/chro-talent-acquisition</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/cio</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/ciso</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/customer-support</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/chief-risk-and-fraud-officers</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/candidate-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/help-desk-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/contact-center-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/workforce-integrity</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/executive-impersonation</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/staffing-recruiting</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/enterprise</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/business-process-outsourcing</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/solutions/defense-contractors</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/30-years-of-digital-forensics-from-airbrushing-to-ai-to-the-birth-of-getreal</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/5-ai-threats-that-companies-might-not-see-coming-4hxg4</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/a-guide-for-cisos-and-cios-how-to-plan-your-budget-for-deepfake-ai-detection-in-2026</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/adversarial-thinking-and-threat-research-in-a-deepfake-world</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/ai-news-videos-blur-line-between-real-and-fake-reports</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/ai-resurrections-of-dead-celebrities-amuse-and-rankle</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/amid-russia-ukraine-negotiations-fake-audio-circulates-of-donald-trump-jr-supporting-russia</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/analyst-report-tag-top-five-deepfake-disinformation-detection-vendors-2026</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/automated-social-engineering-ai-agent</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/beyond-the-talk-hany-farid-in-conversation-with-elise-hu</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/courts-arent-ready-for-ai-generated-evidence</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/criminals-impersonate-senior-us-officials-in-messaging-scams</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfake-fraud-tools-are-lagging-behind-expectations</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfake-readiness-benchmark-report</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfake-social-engineering-and-ai-impersonation-critical-gap-in-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfakes-ai-and-the-battle-for-democracy</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfakes-and-chatbots-are-now-good-enough-that-many-web-users-dont-trust-they-are-interacting-with-real-people</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfakes-are-evolving-this-company-wants-to-catch-them-all</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/deepfakes-now-have-motion-control</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/dissecting-the-latest-political-audio-leak-vp-vance-audio</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/do-ai-detection-tools-work</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/doppel-and-getreal-security-partner-to-combat-the-rise-of-deepfakes-targeting-brands-and-executives-online</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/enterprise-account-recovery-defending-against-credential-reset-attacks</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/enterprise-deepfake-protection-business-imperative-matt-moynahan-humanx</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-alert-the-hollywood-sign-is-not-on-fire-despite-online-visuals</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-interview-with-ceo-matt-moynahan-about-the-worlds-leading-digital-content-verification-company</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-labs-tackling-media-manipulation</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-security-advances-continuous-identity-protection-to-combat-deepfakes</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-security-launches-automated-forensic-analysis-platform-to-help-defend-against-ai-powered-deception-deepfake-fraud-and-identity-manipulation</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-security-named-winner-for-real-time-threat-mitigation-in-the-siliconangle-techforward-awards</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/getreal-security-raises-17-5m-series-a-led-by-forgepoint-capital-to-address-rapidly-growing-threats-associated-with-generative-ai-and-malicious-digital-media</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/guest-blog-deepfake-detection-core-identity-protection-control</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/guest-blog-deepfakes-and-the-expanding-enterprise-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/has-getreal-cracked-the-code-on-ai-deepfakes-18m-and-an-impressive-client-list-says-yes</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/hiring-kill-chain-securing-the-front-door-in-a-genai-world</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/hiring-processes-are-under-attack</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/how-can-companies-navigate-the-new-age-of-ai-powered-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/how-deepfake-cctv-videos-are-misleading-millions-on-social-media</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/how-to-outsmart-deepfake-war-footage-terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/how-to-spot-fake-ai-photos</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/meet-the-deepfake-fraudster-who-applied-to-work-at-a-deepfake-specialist</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/more-fake-applicants-are-trying-to-trick-hr-thanks-to-the-rise-of-deepfakes</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/new-getreal-security-research-41-of-enterprises-surveyed-report-having-hired-and-onboarded-fraudulent-candidates</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/north-korea-it-worker-campaigns-keep-working</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/openais-sora-makes-disinformation-extremely-easy-and-extremely-real</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/our-ceo-matthew-moynahan-chats-with-ed-amoroso-ceo-of-tag</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/real-time-deepfake-protection-paving-the-way-to-continuous-identity-protection</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/securing-the-human-capital-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/securing-the-human-layer-social-engineering-and-identity-based-impersonation</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/see-how-ai-images-claiming-to-reveal-minneapolis-ice-agents-face-spread-confusion</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/sora-looks-real-the-physics-say-otherwise</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/synthetic-identity-fraud-deepfakes-2026-deepfake-summit</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-ai-forecast-podcast-securing-the-evolving-frontier-of-digital-trust</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-ai-impostor-how-fake-job-candidates-are-infiltrating-companies</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-axios-npm-supply-chain-attack-and-the-human-layer</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-boardroom-gap-why-cisos-struggle-to-talk-about-deepfakes----and-how-to-frame-it</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-deepfake-detective-particles-of-thought</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-deepfake-dilemma-how-synthetic-media-is-eroding-trust-in-the-enterprise</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-deepfake-trick-that-used-to-work--and-why-its-failing-now</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-number-one-sign-youre-watching-an-ai-video</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/the-wave-of-ai-discovered-vulnerability-disclosures-will-make-the-internet-safer</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/this-isnt-funny-anymore-ai-deepfakes-are-stealing-millions-every-year-and-these-entrepreneurs-are-racing-to-stop-them</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/this-time-is-different</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/todays-fight-against-malicious-digital-media-reflections-on-the-content-authenticity-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/tom-cross-joins-getreal-to-expand-security-threat-research-capabilities</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/trump-signs-bill-banning-deepfakes-nonconsensual-images-what-to-know</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/video-shared-with-claims-it-shows-a-large-pro-palestine-demo-in-japan-is-ai</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/what-attackers-know-about-your-company-thanks-to-ai</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/why-ai-keeps-getting-better-at-making-fake-images</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/why-ai-means-identity-is-the-new-security-perimeter</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/why-process-controls-alone-wont-protect-it-service-desks-against-social-engineering-and-deepfakes</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/why-we-incubated-getreal-labs</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/will-smith-accused-of-using-ai-to-fake-crowds-in-concert-video</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/your-next-hire-isnt-real</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources/zoom-world-partnership-cisos-deepfake-authentication</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/david-rines</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/dr-hany-farid</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/emmanuelle-saliba</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/jim-brennan</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/mark-priebe</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/matthew-moynahan</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/tina-nikoukhah</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/tom-cross</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/execs/varun-kohli</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/alert</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/blog</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/news</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/podcast</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/press-release</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/report</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/video</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/resources-tag/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/davide-salvi</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/denise-moussa</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/dr-adrien-courtois</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/dr-benedikt-lorch</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/dr-tina-nikoukhah</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/edoardo-daniele-cannas</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/germans-hirsch</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/pr-hany-farid</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/teams/labs/romit-barua</loc>
    </url>
    <url>
        <loc>https://www.getrealsecurity.com/events/sinc-national-ciso-security-leaders-forum</loc>
    </url>
</urlset>