<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://hard2bit.com/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/ai-compliance-platform/</loc>
    <lastmod>2026-03-11T12:58:54.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/alerta-pymes-respuesta-cve-2026-25108-filezen/</loc>
    <lastmod>2026-02-26T08:39:09.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/auditoria-de-microsoft-365-checklist-completa-para-empresas/</loc>
    <lastmod>2026-03-13T08:34:56.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/automate-iso-27001/</loc>
    <lastmod>2026-03-11T12:52:45.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/checklist-de-auditoria-de-seguridad-informatica-para-empresas/</loc>
    <lastmod>2026-04-02T09:19:10.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/ciberamenaza-ia-pymes-espana-hasta-2027/</loc>
    <lastmod>2026-02-25T11:54:54.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/ciberamenazas-2026-identidad-resiliencia-terceros/</loc>
    <lastmod>2026-02-23T13:27:20.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/ciberseguridad-para-empresas/</loc>
    <lastmod>2026-04-02T08:10:10.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/como-comprar-ciberseguridad-2026-evaluar-proveedores-mssp-software/</loc>
    <lastmod>2026-03-18T16:58:24.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/como-cumplir-nis2-en-espana-guia-practica-para-empresas-en-2026/</loc>
    <lastmod>2026-04-01T22:18:35.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/como-elegir-una-empresa-de-ciberseguridad-para-tu-negocio-guia-completa-para-2026/</loc>
    <lastmod>2026-03-13T12:14:30.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/cuanto-cuesta-una-auditoria-de-seguridad-informatica-en-empresas/</loc>
    <lastmod>2026-03-11T14:56:04.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/cve-2026-24061-en-telnetd-inetutils-bypass-remoto-y-riesgo-real-para-nis2-dora-iso-27001/</loc>
    <lastmod>2026-01-27T08:28:17.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/diferencia-entre-auditoria-y-pentesting/</loc>
    <lastmod>2026-04-01T07:07:42.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/ens-para-saas-cuando-necesitas-nivel-medio/</loc>
    <lastmod>2026-04-03T18:53:16.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/gestion-de-vulnerabilidades-priorizar-riesgo-real-credenciales-comprometidas/</loc>
    <lastmod>2026-03-28T08:17:36.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/gestion-de-vulnerabilidades-que-incluye/</loc>
    <lastmod>2026-04-01T11:32:53.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/identidades-no-humanas-2026-blindar-cuentas-servicio-tokens-api-keys/</loc>
    <lastmod>2026-03-02T16:34:50.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/iso-27001-controles-mayor-roi-al-principio/</loc>
    <lastmod>2026-02-24T06:41:22.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/llms-copilots-vibe-coding-riesgos-seguridad-empresas/</loc>
    <lastmod>2026-03-24T16:02:03.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/nis2-compliance-automation/</loc>
    <lastmod>2026-03-14T16:22:01.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/nis2-obligaciones-practicas-pymes-proveedoras/</loc>
    <lastmod>2026-02-24T07:21:11.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/proceso-de-implantacion-de-iso-27001/</loc>
    <lastmod>2026-03-17T18:25:19.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/que-presenta-hard2bit-en-aslan2026-ia-aplicada-a-riesgo-humano-compliance-y-ciberseguridad/</loc>
    <lastmod>2026-03-14T11:04:17.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/que-servicios-debe-ofrecer-una-empresa-de-ciberseguridad-en-2026/</loc>
    <lastmod>2026-03-14T10:43:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/quien-necesita-ens/</loc>
    <lastmod>2026-03-31T18:25:48.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/seagate-sd15-no-detectado-guia-recuperacion/</loc>
    <lastmod>2026-03-05T13:56:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/secuestro-de-cuentas-en-microsoft-365/</loc>
    <lastmod>2026-03-20T14:22:33.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/servicios-it-criterio-negocio-priorizar-incidencias-impacto-no-volumen/</loc>
    <lastmod>2026-03-02T14:40:25.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/blog/zero-trust-pymes-espana-guia-practica/</loc>
    <lastmod>2026-02-24T07:09:57.000Z</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/certificaciones/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/contacto/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/about-us/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/certifications/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/contact/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/products/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/products/CortexShield/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/products/NormAI/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/adversary-simulation/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/attack-surface-management/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/business-continuity-dr/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cloud-security-for-businesses/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cloud-security/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cybersecurity-audit/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cybersecurity-company/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cybersecurity-consulting/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/cybersecurity-for-smbs/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/digital-forensics/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/dora/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/ens-vs-iso-27001-vs-nis2-vs-dora/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/ens/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/ethical-hacking/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/hardware-software/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/iam-cloud-posture-review/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/incident-response-service/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/infrastructure-network-security-audit/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/iso-27001/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/it-outsourcing/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/managed-soc/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/microsoft-365-security-audit/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/microsoft-365-security/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/nis2/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/pentesting/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/remote-it-support/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/research-development/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/soc-for-businesses/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/virtual-ciso-vciso/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/en/services/vulnerability-management/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/productos/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/productos/CortexShield/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/productos/NormAI/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/auditoria-infra-red/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/auditoria-microsoft-365/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/auditoria-seguridad-informatica/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/ciberseguridad-para-pymes/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/ciso-virtual-vciso/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/consultoria-ciberseguridad/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/continuidad/</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/dora/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/empresa-ciberseguridad/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/ens-vs-iso-27001-vs-nis2-vs-dora/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/ens/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/forense-digital/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/gestion-de-vulnerabilidades/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/hacking-etico/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/hardware-software/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/iam-postura-cloud/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/investigacion-desarrollo/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/iso-27001-vs-ens/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/iso-27001/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/nis2-vs-dora/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/nis2/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/outsourcing-it/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pentesting/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/cloud-infra-security/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/cumplimiento-grc/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/identidad-zero-trust/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/investigacion-desarrollo/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/pentesting-redteam/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/respuesta-incidentes/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/pilar/seguridad-gestionada/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/red-team/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/respuesta-incidentes/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/seguridad-cloud-empresas/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/seguridad-cloud/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/seguridad-informatica-empresas/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/seguridad-microsoft-365/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/servicio-tecnico-remoto/</loc>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/soc-gestionado/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/soc-para-empresas/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/servicios/superficie-ataque/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://hard2bit.com/sobre-nosotros/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
</urlset>
