<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.starlab.io/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/challenges-in-protecting-embedded-linux-from-offline-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b28586eb-90b1-4845-b56d-c158679b4ba8/Offline+Attacks+Blog.png</image:loc>
      <image:title>Blog - Challenges in Protecting Embedded Linux from Offline Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a213d6ac-130e-45fd-affa-59e4d8424544/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - Challenges in Protecting Embedded Linux from Offline Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9a9288ac-b1bc-4d82-983b-04564cbdd46a/Kevlar+Embedded+Security.png</image:loc>
      <image:title>Blog - Challenges in Protecting Embedded Linux from Offline Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/linux-symbolic-links-convenient-useful-and-a-whole-lot-of-trouble</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/01388f83-b36c-4232-9162-b0868ab0b988/Symlinks+are+ubiquitous%2C+convenient%2C+useful%E2%80%A6and+occasionally+dangerous..gif</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b9b59023-49c4-4d64-bc39-2d3b3ed6b2dc/Copy+of+Symlinks+Blog.png</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/82fac368-cfe7-497f-a4d5-07d3beb6650a/Data+Protection+Whitepaper+Cover+Image.jpg</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9bbbd29a-2dd4-44cd-bff6-465ce7965479/Symlinks+Blog%281%29.png</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/83b5deb4-26e5-4037-acbe-77acbefdcc8a/Symlinks+Blog%284%29.png</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/85540d56-ca56-4d1e-af71-73deef5e6c63/Copy+of+Symlinks+are+ubiquitous%2C+convenient%2C+useful%E2%80%A6and+occasionally+dangerous..png</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4c939b9a-ecac-4fac-ac70-7ce061f44dff/Syscall+Filtering+Whitepaper.jpg</image:loc>
      <image:title>Blog - Linux Symbolic Links: Convenient, Useful, and a Whole Lot of Trouble - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/is-there-a-stig-for-kvm-investigating-stig-compliance-as-it-relates-to-virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8ca95ae6-d980-4fd6-a9ec-ab2b7e09adcd/Is+there+a+STIG+for+KVM.png</image:loc>
      <image:title>Blog - Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/15f67af1-fa1a-47f9-8962-b2578bcf3f02/Is+there+a+STIG+for+KVM+%281200+x+1200+px%29%281%29.png</image:loc>
      <image:title>Blog - Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/78fb1f48-2ddb-4dc4-846e-30d94597dae6/Webinar+Banner+for+for+LinkedIn+Event+Page.gif</image:loc>
      <image:title>Blog - Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization - Make it stand out</image:title>
      <image:caption>Click to view the webinar!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4ae63de1-e83f-4e58-a10f-61aae864a08c/Is+there+a+STIG+for+KVM+%281200+x+1200+px%29%282%29.png</image:loc>
      <image:title>Blog - Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/806aeaa8-7862-47db-aea2-5da9a75d3891/KVM+Cover+Page+090924.jpg</image:loc>
      <image:title>Blog - Is there a STIG for KVM? Investigating STIG Compliance as it Relates to Virtualization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/fms-readiness-a-critical-paradigm-to-maintaining-us-technological-advantage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/890bf966-1a2e-41b1-a113-e17ca4c610d5/AFCEA+Thought+Leadership+Blog+Thumbnail%281%29.png</image:loc>
      <image:title>Blog - FMS Readiness: A Critical Paradigm to Maintaining US Technological Advantage - Make it stand out</image:title>
      <image:caption>Protecting CPI is the aim of Anti-Tamper technologies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/eb823f60-3d5f-4bcb-8cb9-60d48bd91a35/AFCEA+Thought+Leadership+Blog+Thumbnail%281%29.gif</image:loc>
      <image:title>Blog - FMS Readiness: A Critical Paradigm to Maintaining US Technological Advantage - Make it stand out</image:title>
      <image:caption>Software solutions, deny, delay, and disrupt attackers leveraging various software approaches.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fcc12e7a-5741-42b4-a0cd-3ace263aa437/AFCEA+Thought+Leadership+Blog+Image.gif</image:loc>
      <image:title>Blog - FMS Readiness: A Critical Paradigm to Maintaining US Technological Advantage - Make it stand out</image:title>
      <image:caption>There is an opportunity for baseline programs to foster an FMS-ready mindset.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/3b3e93ef-c66d-4fa7-b100-f9ad6fa47e4f/Copy+of+AFCEA+Thought+Leadership+Blog+for+SL+Website.png</image:loc>
      <image:title>Blog - FMS Readiness: A Critical Paradigm to Maintaining US Technological Advantage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/achieve-modern-ip-protection-with-zero-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1ef7d1b2-fcf3-4a74-a201-fa9e9d95dbe3/A+Modern+Approach+%281600+x+500+px%29%282%29.png</image:loc>
      <image:title>Blog - Achieve Modern IP Protection with Zero-Trust Strategies for the Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/secure-boot-is-hard-lessons-learned-from-the-blacktech-firmware-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4c5aace8-c7f9-4d92-b70c-c7e887b90c15/Secure+Boot+is+Hard%21+%281600+x+500+px%29.png</image:loc>
      <image:title>Blog - Secure Boot is hard! Lessons Learned from the BlackTech Firmware Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/achieve-modern-ip-protection-by-protecting-the-host</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1694464057282-OJGHTKLA96Q1B1MLESYR/A+Modern+Approach+%281600+x+500+px%29+%281200+x+1200+px%29%281%29.png</image:loc>
      <image:title>Blog - Achieve Modern IP Protection by Protecting the Host - Make it stand out</image:title>
      <image:caption>Click to read the first blog!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f64a7d8a-1045-4d82-8896-d6b4930791bc/A+Modern+Approach+%281600+x+500+px%29%281%29.png</image:loc>
      <image:title>Blog - Achieve Modern IP Protection by Protecting the Host - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1700590447462-2HPWOR9MBNS1TCL20K21/A+Modern+Approach%282%29.png</image:loc>
      <image:title>Blog - Achieve Modern IP Protection by Protecting the Host - Make it stand out</image:title>
      <image:caption>Click to read the next blog in this series!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/how-does-ebpf-malware-perform-against-star-labs-kevlar-embedded-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/55ed688b-0ea7-4a77-bcdf-c4f85ac1ee61/Kevlar+Embedded+Security+Vs.+eBPF+Malware+%281600+x+500+px%29+%281200+x+500+px%29%281%29.png</image:loc>
      <image:title>Blog - How does eBPF Malware perform against Star Lab’s  Kevlar Embedded Security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/88b079fd-8681-46c7-bcd3-e3c87e6ae82b/eBPF+Blog+Big+Picture.png</image:loc>
      <image:title>Blog - How does eBPF Malware perform against Star Lab’s  Kevlar Embedded Security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/a-modern-approach-to-ip-protection-in-embedded-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696278611540-7DLHFMQMAYUCTKAM5WYA/A+Modern+Approach%281%29.png</image:loc>
      <image:title>Blog - A Modern Approach to IP Protection in Embedded Systems - Make it stand out</image:title>
      <image:caption>Click to read the next blog in this series!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/3beee03a-b324-4b1a-afb5-873e3bf4d5d6/A+Modern+Approach+%281600+x+500+px%29.png</image:loc>
      <image:title>Blog - A Modern Approach to IP Protection in Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/can-you-trust-the-data-coming-into-your-siem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/958185a7-07c2-4fe4-8d13-b82de470cf89/Can+you+trust+the+data+coming+into+your+SIEM.png</image:loc>
      <image:title>Blog - Can You Trust the Data Coming Into Your SIEM? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/is-application-security-the-golden-ticket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672856691465-JAMB2V30TTFAMJGEK65F/7+Tenets+Blog+%26+LinkedIn+Graphics%281%29.gif</image:loc>
      <image:title>Blog - Is Application Security the Golden Ticket? - Make it stand out</image:title>
      <image:caption>Click to read the full blog!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/09920b2e-7b5f-4e12-9c33-63a7c6feee3f/Copy+of+Is+Application+Security+the+Golden+Ticket%281%29.png</image:loc>
      <image:title>Blog - Is Application Security the Golden Ticket? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/a-build-secure-methodology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1683298374764-7LW0PRMGBQQBLL2DVML3/The+Future+of+Security%281%29.png</image:loc>
      <image:title>Blog - A Build Secure Methodology - Make it stand out</image:title>
      <image:caption>Read about our predictions for the future</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1686075180889-SWU280GSJPPUFEET3F8A/Copy+of+Build+Secure+Blog+Main+Image%283%29.png</image:loc>
      <image:title>Blog - A Build Secure Methodology - Make it stand out</image:title>
      <image:caption>Read more about Build Secure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bfffd5c5-06e2-4d39-b881-ddf65c5ba24e/Copy+of+Copy+of+Build+Secure+Blog+Main+Image.png</image:loc>
      <image:title>Blog - A Build Secure Methodology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a213d6ac-130e-45fd-affa-59e4d8424544/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - A Build Secure Methodology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b18feb0b-6c45-4295-97ac-e3cada619c79/Copy+of+Build+Secure+Blog+Main+Image%285%29.png</image:loc>
      <image:title>Blog - A Build Secure Methodology - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/what-does-build-secure-mean-anyway</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/c23babcd-5f1e-4230-a9a7-3108aeba5c0e/Untitled+design%2844%29.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/725599b6-a429-44d6-8298-ddb69e975333/Observable+Security%281%29.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1686075180889-SWU280GSJPPUFEET3F8A/Copy+of+Build+Secure+Blog+Main+Image%283%29.png</image:loc>
      <image:title>Blog - What Does "Build Secure" Mean, Anyway? - Make it stand out</image:title>
      <image:caption>Learn about our Build Secure Methodology</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/the-future-of-security-at-the-intelligent-edge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f63debda-0a16-4e8b-8bba-015833ca12d0/The+Future+of+Security+on+the+Intelligent+Edge+Blog%285%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/51de3fb5-2d11-4dae-9911-04264334c43e/The+Future+of+Security+on+the+Intelligent+Edge+Blog%282%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1684949915982-25F5QSJ6NMUX3WKY1OY8/Copy+of+Build+Secure+Blog+Main+Image%282%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Make it stand out</image:title>
      <image:caption>Read more about building inherently secure systems</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1686075180889-SWU280GSJPPUFEET3F8A/Copy+of+Build+Secure+Blog+Main+Image%283%29.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d768a606-96e0-4ff3-a3cc-0c4717ca9324/Copy+of+The+Future+of+Security+Blog.png</image:loc>
      <image:title>Blog - The Future of Security at the Intelligent Edge - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/what-to-do-about-the-new-fda-requirements</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a213d6ac-130e-45fd-affa-59e4d8424544/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - What to Do About the New FDA Requirements: A CTO's Perspective - Make it stand out</image:title>
      <image:caption>Click to download the full whitepaper!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/0840949d-e539-4f6c-b1f7-13183eeeb884/FDA+Reqs+Blog.png</image:loc>
      <image:title>Blog - What to Do About the New FDA Requirements: A CTO's Perspective - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/why-bother-with-measured-boot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/60760c08-1ab1-493e-a057-3d1fd4fe9ca6/3.png</image:loc>
      <image:title>Blog - Why Bother with Measured Boot? - Make it stand out</image:title>
      <image:caption>Et tu, bootloader?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/dd391d86-3647-455a-9987-498cc89cdbd5/4.png</image:loc>
      <image:title>Blog - Why Bother with Measured Boot? - Make it stand out</image:title>
      <image:caption>Let’s cut out the middleman!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/0d58b388-7099-46bc-bb11-b078d17561b4/1.png</image:loc>
      <image:title>Blog - Why Bother with Measured Boot? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/47e776c6-a81f-4d25-8543-cadec9a8313a/2.png</image:loc>
      <image:title>Blog - Why Bother with Measured Boot? - Make it stand out</image:title>
      <image:caption>In the beginning...are the weakest links...</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b7a0d02b-cee0-4035-87df-c4b4359c349d/Measured+Boot+Blog+Images%281%29.png</image:loc>
      <image:title>Blog - Why Bother with Measured Boot? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/takeaways-from-sko-2023-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/55dbd895-690b-4f88-a0a5-4844cc84c654/SKO+2023%281%29.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/370f234b-6441-4b4e-a334-f8427aee2661/20230206_164210.jpg</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Make it stand out</image:title>
      <image:caption>From left to right: Jonathan Kline (CTO), Gabriel Quiroz (GM), Claude Chalouhi (Head of Sales), Dan Megan (Sales), and Adam Fraser (COO)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - Takeaways from SKO 2023</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - Takeaways from SKO 2023 - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/a-step-by-step-guide-to-defending-your-embedded-system-against-bring-your-own-filesystem-byof-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4f7fb07f-dc91-4e1b-81ca-2a2356f6b35c/Attack+Surface+Reduction.png</image:loc>
      <image:title>Blog - A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks&amp;nbsp; - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/709a31c7-ee50-4775-ac57-e22de647ecd9/BYOF+Attack+Blog%281%29.png</image:loc>
      <image:title>Blog - A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks&amp;nbsp; - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b847a1aa-8f4a-4cd4-9688-50e1facd0c76/BYOF+Attack+Blog%283%29.png</image:loc>
      <image:title>Blog - A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks&amp;nbsp; - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8889a8a1-c582-4c0e-b53d-f9027bc8d006/System+Call+Restriction.png</image:loc>
      <image:title>Blog - A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks&amp;nbsp; - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/6a213be0-bda2-4819-bc4b-f934c58ddf8d/MAC.png</image:loc>
      <image:title>Blog - A Step-by-Step Guide to Defend Against “Bring Your Own Filesystem” (BYOF) Attacks&amp;nbsp; - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/7-tenets-of-layered-security-in-embedded-design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8cacd114-b70a-4381-895d-449b8c90372b/1.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fa056848-7508-45d8-9db2-0aa0e18c9f79/7+Tenets+Table%282%29.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/963ac7ad-7e48-4c47-ad2c-7e624877e59e/4.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bdda6ae3-359e-44da-b1cc-c474679e2a95/Copy+of+Webinar+Signup+7+Props+Email+Campaign%287%29.gif</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/eaf107ff-304a-47f6-bdff-76edf48a2399/2.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7dd0aa98-817f-4c35-aece-8c4fd7869227/6.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e8352f9c-f6ee-427e-b31e-47f15533cd7e/5.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/61a94bc5-3a60-4376-a38f-0aa8265177d1/3.png</image:loc>
      <image:title>Blog - 7 Tenets of Layered Security in Embedded Design - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/artifact-cleanup-in-the-gitlab-server-with-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bf85699b-7adf-4307-977e-91b79ac0342b/Untitled+design%2817%29.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - A Walkthrough of Gitlab Artifact Cleanup (with code) - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/defining-the-threat-model-for-embedded-systems-part-2-where-do-you-need-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e0658398-8dba-414a-a3b7-432b3baf0f17/System+Flash.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/13ed76ae-221b-42f5-8205-a362ba4b7306/Untitled+design%2810%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems (Part 2): Where Do you Need Security? - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/the-criticality-of-trusted-execution-environments-in-linux-based-embedded-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/94a14c27-7903-48e8-ab15-caee74a2cca8/5.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b3ac415a-6466-465c-af11-a22156d243bc/TEE+Blog+Graphics.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/5df5da3b-822f-478a-a0fd-1beb2c0c1145/TEE+Blog+Graphics%281%29.gif</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/5c06f026-e7dc-4b5c-8fa6-28b83338b838/TEE+Blog+Graphics%282%29.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fa371e2c-fefb-47c8-b508-04e924dfd05e/TEE+Blog+Graphics%283%29.gif</image:loc>
      <image:title>Blog - The Criticality of Trusted Execution Environments in Linux-based Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/how-to-define-a-threat-model-for-embedded-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/13ed76ae-221b-42f5-8205-a362ba4b7306/Untitled+design%2810%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - Defining the Threat Model for Embedded Systems: What Needs to be Secured? - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/dm-verity-in-embedded-device-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/138a8e6e-a424-4056-a323-315521985df6/dm-verity+blog%282%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bfe3ccd2-d098-4f1e-a359-3b9e794ba284/Dm-verity+Blog.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d2761b08-b03f-49c4-83fd-eb50a345b161/dm-verity+blog%285%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1433d7ab-3ca0-443a-8de5-69a47adf1fcf/dm-verity+blog%284%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/15277539-2c09-4183-8b66-348dad2db4b0/dm-verity+blog%282%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/ac7f097a-28b8-4dde-8a9b-a4e88467d778/dm-verity+blog.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/72e5effe-0ab0-42b6-a57a-842112394ea3/dm-verity+blog%283%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b89f7f2f-f851-4e03-bc68-a057f3a04ed7/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - An Introduction to Dm-verity in Embedded Device Security - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/what-to-do-about-the-linux-polkit-privilege-escalation-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/ed81496d-02b9-41c9-9f13-29b390e2d3de/Linux+Polkit+Vulnerability%285%29.gif</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - What to do about the Linux Polkit Privilege Escalation Vulnerability - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/introduction-to-the-linux-virtual-filesystem-vfs-part-i-a-high-level-tour</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1590002319998-SQL6VSZUZ76HKM4V8XRY/fin.jpeg</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fa5c3f56-7e4d-4a9a-a184-83a37c26d0d3/VFS+Delineation+Graphics.gif</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
      <image:caption>VFS Delineation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/6cc957f9-2b62-40c0-a621-cb8137045c9a/VFS+Interface+Graphic.gif</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
      <image:caption>VFS Interface</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/aa42deed-c4bd-4184-a72e-8bdb0c946a5c/VFS+Detailed+Interface+Graphic.gif</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
      <image:caption>Detailed VFS Interface</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1590001837059-7KNIQLB3YRPP1O4F7QLC/vfs_illustration.jpeg</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - Introduction to the Linux Virtual Filesystem (VFS): A High-Level Tour - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/how-to-protect-your-embedded-devices-with-star-labs-kevlar-embedded-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/421c4fb4-7b50-4437-8aeb-170350880707/CHS+Website+News+Announcement%281%29.gif</image:loc>
      <image:title>Blog - How to Protect Embedded Linux with Star Lab’s Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/how-overlooked-assumptions-result-in-emerging-cybersecurity-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1620657823246-2D9GHGSUQSHY6J4SOMCZ/AdobeStock_216065370.jpeg</image:loc>
      <image:title>Blog - How Overlooked Assumptions Result in Emerging Cybersecurity Threats</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/running-a-secure-tactical-type-1-hypervisor-on-the-champ-xd1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1616001297272-OTFBVUPYUU6IGEA97PDB/AdobeStock_120328814.jpeg</image:loc>
      <image:title>Blog - Running a Secure, Tactical, Type 1 Hypervisor on the CHAMP XD1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/the-benefits-of-a-secure-tactical-type-1-hypervisor-on-embedded-systems-over-enterprise-virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1615998056542-LTP7KZ53AFGN66RPOV95/AdobeStock_120409174.jpeg</image:loc>
      <image:title>Blog - The Benefits of a Secure, Tactical, Type 1 Hypervisor on Embedded Systems over Enterprise Virtualization</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/why-enforced-password-complexity-is-worse-for-security-and-what-to-do-about-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1615396338098-8ZW18ATUPCUW5KQ286MU/AdobeStock_196963791.jpeg</image:loc>
      <image:title>Blog - Why Enforced Password Complexity Is Worse for Security (and What to Do About It)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/the-linux-security-hardening-checklist-for-embedded-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1612883098199-ZXPZU9E13CIU90C4TEQL/AdobeStock_356468597.jpg</image:loc>
      <image:title>Blog - The Linux Security Hardening Checklist for Embedded Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/10-properties-of-secure-embedded-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/Screen+Shot+2023-01-03+at+10.26.07+AM.png</image:loc>
      <image:title>Blog - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>Download the whitepaper</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1593610788414-F435T26Y08VUEFTZLC3T/image-asset.jpeg</image:loc>
      <image:title>Blog - 10 Properties of Secure Embedded Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/learning-from-the-solarwinds-cybersecurity-attack-to-build-more-secure-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1609796087926-HSDVT93JMONL8BN5RE1E/solarwinds+hack</image:loc>
      <image:title>Blog - Learning from the SolarWinds Cybersecurity Attack to Build More Secure Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1609796184297-LA4MZKQK040JVDP94S47/malware</image:loc>
      <image:title>Blog - Learning from the SolarWinds Cybersecurity Attack to Build More Secure Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1609796216148-KECJ39AI8GL8W1PRA3IR/digital+signature</image:loc>
      <image:title>Blog - Learning from the SolarWinds Cybersecurity Attack to Build More Secure Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/the-most-secure-linux-for-embedded-systems-hint-its-not-enterprise-linux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1607529443508-JK5K7Q7YU848G94N5YT8/AdobeStock_111444442.jpeg</image:loc>
      <image:title>Blog - The Most Secure Linux for Embedded Systems – Hint, It’s Not Enterprise Linux</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/protecting-your-embedded-system-from-blindside-and-other-zero-day-cybersecurity-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Protecting Your Embedded System from BlindSide and Other Zero-Day Cybersecurity Attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1602017591770-1A2SQ0F3YOI6U7SIXGJE/AdobeStock_190555253.jpeg</image:loc>
      <image:title>Blog - Protecting Your Embedded System from BlindSide and Other Zero-Day Cybersecurity Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/protecting-linux-based-systems-from-russian-cyber-espionage-malware-drovorub</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1598629361707-6MF99A5T6WVFA311UN00/AdobeStock_226169943.jpeg</image:loc>
      <image:title>Blog - Protecting Linux-Based Systems from Russian Cyber-Espionage Malware, Drovorub</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/simple-painless-application-testing-on-virtualized-hardwarenbsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1597854937270-M0SGFP7D9M60PZP3GGAD/image-asset.jpeg</image:loc>
      <image:title>Blog - Simple, Painless Application Testing on Virtualized Hardware&amp;nbsp;</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1597854352901-9CA0B2NKXVLX6LZ7DLRO/demo.gif</image:loc>
      <image:title>Blog - Simple, Painless Application Testing on Virtualized Hardware&amp;nbsp;</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/application-whitelisting-for-linux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1595517953340-RLGT92C37OWWBKY0CBAL/image-asset.jpeg</image:loc>
      <image:title>Blog - Application Whitelisting for Linux</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/providing-confidence-and-trust-in-21st-century-information-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586456656021-ZSKJUTQU785RF8NJGXX5/software_security_by_design.png</image:loc>
      <image:title>Blog - Providing Confidence and Trust in 21st Century Information Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1591129308215-HHVB7DURCSM1RKLMMASN/image-asset.jpeg</image:loc>
      <image:title>Blog - Providing Confidence and Trust in 21st Century Information Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/linux-and-hypervisor-hardening-applying-a-secure-by-design-philosophy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586456656021-ZSKJUTQU785RF8NJGXX5/software_security_by_design.png</image:loc>
      <image:title>Blog - Linux and Hypervisor Hardening — Applying a Secure by Design Philosophy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586875441547-735649MD2JTL4UXN8HLG/image-asset.jpeg</image:loc>
      <image:title>Blog - Linux and Hypervisor Hardening — Applying a Secure by Design Philosophy</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/beyond-selinux-enforcing-confidentiality-and-integrity-for-applications-and-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Beyond SELinux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585679589580-H3PPU0SFVQZOEAJXTGI0/image-asset.jpeg</image:loc>
      <image:title>Blog - Beyond SELinux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/linux-security-modules-lsms-vs-secure-computing-mode-seccomp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585678015916-5R9JQR6CXLIA4IJSGTJ3/image.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Blog - Linux Security Modules (LSMs) vs Secure Computing Mode (seccomp) - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/how-the-xen-hypervisor-supports-cpu-virtualization-on-arm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585677884919-8AWFJOUHRK8X3293I0MD/image-asset.png</image:loc>
      <image:title>Blog - How the Xen Hypervisor Supports CPU Virtualization on ARM</image:title>
      <image:caption>Figure 2: Bit values for MIDR_EL1</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585677902177-QFJTO2ZOXCPEA7056VL8/image-asset.png</image:loc>
      <image:title>Blog - How the Xen Hypervisor Supports CPU Virtualization on ARM</image:title>
      <image:caption>Figure 3: Bit values of MPIDR_EL1</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585677723849-811DRGP58MZCVPL8JAHA/image-asset.jpeg</image:loc>
      <image:title>Blog - How the Xen Hypervisor Supports CPU Virtualization on ARM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585677861791-C753NSL50ADFK7S309UG/image-asset.png</image:loc>
      <image:title>Blog - How the Xen Hypervisor Supports CPU Virtualization on ARM</image:title>
      <image:caption>Figure 1: Illustration of secure and non-secure worlds with exception levels</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/deep-dive-mmu-virtualization-with-xen-on-arm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585671958493-OCQCNYWH83Y5GF3THLX1/image.jpeg</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Harwell Dekatron Computer (aka WITCH)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672028530-KQT55NFF0MV8HKI59V1A/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Memory Management Unit (MMU) Overview</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672097137-YGFNOT4KGRPI7IWK4UUN/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Four Level Virtual Address Resolution</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672062231-O0FDWJHHX5I2PKLAUQRL/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Virtual Address Translation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672079157-3N3S4LC9BIQKP6DCQ5QS/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Multi-Level Translation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672129743-0F038X4WGLLS6ZCTVOLX/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Virtual Address Spaces used by Xen</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672449591-LVSWWDH6BPWO0H0NZ3XP/image-asset.jpeg</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585672115658-HJ3GK5ZN50TZKGXY0UYX/image-asset.png</image:loc>
      <image:title>Blog - Deep Dive: MMU Virtualization with Xen on ARM</image:title>
      <image:caption>Stage 2 Translation</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/effective-machine-learning-practices-part-i-a-software-engineers-perspective-cg5e7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585618160822-2EG5AN9M52NI72M47YH9/image-asset.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part II – A Data Scientists Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585617966762-ZNIODRHF71NU0XVYCILA/image.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part II – A Data Scientists Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1584392211065-H5QLDCMSHXN34GEUQ04U/image-asset.jpeg</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part II – A Data Scientists Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585618142248-RW7LJYII8N2ALLD2DTOF/image-asset.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part II – A Data Scientists Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585618124448-WX0IC3TE4QBANADD9KLR/image-asset.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part II – A Data Scientists Perspective</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/effective-machine-learning-practices-part-i-a-software-engineers-perspective</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1580737168303-C4V8RAY6AN0EOFYXSY8G/image.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part I – A Software Engineer’s Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1580737218682-L8PH94VKW7YTQHRMH94I/image.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part I – A Software Engineer’s Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1584392211065-H5QLDCMSHXN34GEUQ04U/image-asset.jpeg</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part I – A Software Engineer’s Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1580737249062-M7Z26H1T71VQBP5B73OK/image.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part I – A Software Engineer’s Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1580737232883-69X10WAWFX4QSMB655PG/image.png</image:loc>
      <image:title>Blog - Effective Machine Learning Practices Part I – A Software Engineer’s Perspective</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/kasan-what-is-it-how-does-it-work-and-what-are-the-strange-numbers-at-the-end</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585617659533-BU4J8AZGZQ0BFQEQ07SY/Screen+Shot+2020-03-30+at+9.20.57+PM.png</image:loc>
      <image:title>Blog - KASAN: What is it? How does it work? And what are the strange numbers at the end?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585617499805-NXCJTCVE9TDS9M0FYTLY/Screen+Shot+2020-03-30+at+9.18.17+PM.png</image:loc>
      <image:title>Blog - KASAN: What is it? How does it work? And what are the strange numbers at the end?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585617706119-0N8UDS9SFXRUEGG2Q1ZA/Screen+Shot+2020-03-30+at+9.21.43+PM.png</image:loc>
      <image:title>Blog - KASAN: What is it? How does it work? And what are the strange numbers at the end?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585617606534-BO7BNURFEEF2DDE5GUON/Screen+Shot+2020-03-30+at+9.20.04+PM.png</image:loc>
      <image:title>Blog - KASAN: What is it? How does it work? And what are the strange numbers at the end?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/a-brief-tour-of-linux-security-modules</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a213d6ac-130e-45fd-affa-59e4d8424544/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - A Brief Tour of Linux Security Modules - Make it stand out</image:title>
      <image:caption>Click to download the full whitepaper!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616703834-6WW2LXZNBZE855UPL6B0/image-asset.jpeg</image:loc>
      <image:title>Blog - A Brief Tour of Linux Security Modules</image:title>
      <image:caption>An LSM’s place in an open system call</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616897014-5KQ5A9JREV9U0U8TVZKU/image-asset.jpeg</image:loc>
      <image:title>Blog - A Brief Tour of Linux Security Modules</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/122276a4-7624-4441-8d90-c1107b6c635d/Screen+Shot+2023-01-03+at+10.24.27+AM.jpg</image:loc>
      <image:title>Blog - A Brief Tour of Linux Security Modules - Make it stand out</image:title>
      <image:caption>Click to download the full whitepaper</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616733975-LC5Y5NR79MJU8GI1V98A/image-asset.png</image:loc>
      <image:title>Blog - A Brief Tour of Linux Security Modules</image:title>
      <image:caption>Kernel menuconfig option to select the default major LSM</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/using-gdb-to-debug-the-linux-kernel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616957381-PRD19EUPSLOABBP4VGRY/image-asset.png</image:loc>
      <image:title>Blog - Using `gdb` to Debug the Linux Kernel</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b89f7f2f-f851-4e03-bc68-a057f3a04ed7/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Blog - Using `gdb` to Debug the Linux Kernel - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/benchmarking-xen-virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616474392-1USP425CCMDQLS3YAJEP/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616350165-4MLLNETOX4VDT1UZH6ML/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616450806-DAM9PFHWWLPY1HOCS2UK/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616494132-ZFYYJFO9EPLVJF3DMHX5/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616406290-0CDHSOGNENKRVY8YG1VD/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
      <image:caption>Image from the Xen Wiki</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616376052-UV74KMT8WGG77C94R1YF/image.png</image:loc>
      <image:title>Blog - Benchmarking Xen Virtualization</image:title>
      <image:caption>Image from the Xen Wiki</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/adding-sha256-digests-to-rpms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585615872501-WS69NQE244VJ845V8TDA/Screen+Shot+2020-03-30+at+8.51.09+PM.png</image:loc>
      <image:title>Blog - Adding SHA256 Digests to RPMs</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/821a329c-5c41-4aba-81f3-3ae447e28e78/Screen+Shot+2023-01-03+at+10.20.45+AM.jpg</image:loc>
      <image:title>Blog - Adding SHA256 Digests to RPMs - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/nesting-xenblanket-on-aws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585602032565-5G3I8PAMDV852V98RWXA/image.jpeg</image:loc>
      <image:title>Blog - Nesting XenBlanket on AWS</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585602146811-AP55REQUO6WWMZYWE71L/image.png</image:loc>
      <image:title>Blog - Nesting XenBlanket on AWS</image:title>
      <image:caption>An EC2 deployment utilizing a XenBlanket hypervisor</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585602187617-DKH36L16XADKTGEJRRY1/image.png</image:loc>
      <image:title>Blog - Nesting XenBlanket on AWS</image:title>
      <image:caption>Live migration between XenBlanket instances</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585602110927-36RQOX1ZGWHACJF3FCOU/image.png</image:loc>
      <image:title>Blog - Nesting XenBlanket on AWS</image:title>
      <image:caption>A typical EC2 deployment utilizing a Xen hypervisor</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/encrypting-in-a-dangerous-world</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585590112348-TY2O6CHCV8056DTNGZM7/Screen+Shot+2020-03-30+at+1.41.30+PM.png</image:loc>
      <image:title>Blog - Encrypting in a Dangerous World</image:title>
      <image:caption>Creative Commons Attribution Icon [1] [2].</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589922490-AMQBM80REOOP6CVJRU99/image.png</image:loc>
      <image:title>Blog - Encrypting in a Dangerous World</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/designing-for-isolation-using-virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589748986-JTTPSAUWIUE8MCEKZUZK/image.png</image:loc>
      <image:title>Blog - Designing for Isolation Using Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589696243-VV8LLMUZ9K8DR98BECP5/image.png</image:loc>
      <image:title>Blog - Designing for Isolation Using Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589625242-3HWC7ZPFN217NF1DT348/image.jpeg</image:loc>
      <image:title>Blog - Designing for Isolation Using Virtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589668775-TZF0W9D4F0VCQYZH2X8A/image.png</image:loc>
      <image:title>Blog - Designing for Isolation Using Virtualization</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/delivering-ground-systems-trainer-under-tight-turnaround</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589243646-EJOTXM6C826LFJGYRY1N/image.jpeg</image:loc>
      <image:title>Blog - Delivering Ground Systems Trainer Under Tight Turnaround</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/achieving-airborne-radar-processing-system-superiority</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585589212175-ZNBML5MOQPGR0VX2YWAS/image.jpeg</image:loc>
      <image:title>Blog - Achieving Airborne Radar Processing System Superiority</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/crucible-mitigates-intel-information-disclosure-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585588972528-UE5M4G9HRXAASNIXGTSI/image-asset.jpeg</image:loc>
      <image:title>Blog - Crucible Mitigates Intel Information Disclosure Vulnerabilities</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/security-advisory-meltdown-amp-spectre-information-leakage-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585588526532-NN4OGD2WZVTWU7GJ6F7D/image-asset.jpeg</image:loc>
      <image:title>Blog - Security Advisory – Meltdown &amp;amp; Spectre information leakage attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/lure-halts-brickerbot-destruction</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585588638230-W8HZFI2IJ8WD3T2T49VN/image-asset.jpeg</image:loc>
      <image:title>Blog - LURE halts BrickerBot destruction</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/lure-protects-linux-based-systems-from-dirty-cow-cve-2016-5195-privilege-escalation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585588581356-1EM0HEADQCP70MLWEKJM/image-asset.jpeg</image:loc>
      <image:title>Blog - LURE protects Linux-based systems from Dirty Cow (CVE-2016-5195) Privilege Escalation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Products</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Linux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Case+Studies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Press+Releases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Machine+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Technology+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/category/Security+Advisory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Xen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/SELinux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Whitelisting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Passwords</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Filesystems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Data+At+Rest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Machine+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Design</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Mandatory+Access+Control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Countermeasures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Titanium</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Cryptography</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Kernel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Availability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Debugging</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Weapons+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Crucible</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/CVE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Linux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Software+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Confidentiality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/CI%2FCD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Secure+Boot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Allowlisting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Arm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/blog/tag/Integrity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-honored-by-2024-mae-innovators-awards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fa7aaa11-5eb8-477f-8988-565760027188/MAEIA_2024Silver.png</image:loc>
      <image:title>News - Star Lab Honored by 2024 MAE Innovators Awards - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-new-capabilities-for-linux-based-embedded-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-capability-to-secure-kvm-hypervisors-with-titanium-for-kvm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-23</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-launch-of-kevlar-system-inspector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-19</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-aptiv-acquisition-of-wind-river</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-kvm-support-for-titanium-security-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-version-11-of-cyber-hardening-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a3ea52a1-a748-4472-a8ff-39799e3467fa/CHS+Website+News+Announcement%282%29.gif</image:loc>
      <image:title>News - Star Lab announces Version 1.1 of Star Lab's Cyber Hardening Suite - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-discusses-zero-trust-in-forbes-article</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/501f9ffb-7875-4bcc-84fe-112bd29118e4/Newsroom+Update.gif</image:loc>
      <image:title>News - Star Lab discusses Zero Trust Security for Embedded Devices in Forbes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-launches-cyber-hardening-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672853096984-QJSVET9WBONBLUOO5VN8/CHS+Website+News+Announcement%281%29.gif</image:loc>
      <image:title>News - Star Lab launches 'Kevlar Embedded Security' - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-version-80-of-crucible-embedded-virtualization-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/135f3e1e-a57e-419a-9da9-e600468fa2bc/Copy+of+CRUCIBLE+8.0.gif</image:loc>
      <image:title>News - Star Lab Announces Version 8.0 of Titanium Secure Hypervisor (formerly Crucible) Embedded Virtualization Software</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/wind-river-extends-embedded-security-and-linux-leadership-with-acquisition-of-star-lab</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1581711923617-NSRUNH6JYQS075VSECH5/Wind-River-Logo.png</image:loc>
      <image:title>News - Wind River Extends Embedded Security and Linux Leadership with Acquisition of Star Lab</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/crucible-version-61-general-availability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-06-29</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/titanium-security-suite-70-now-available</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616236510-N2G16I81HZZMVFLTJJNS/image.jpeg</image:loc>
      <image:title>News - Titanium Security Suite 7.0 – Now Available</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-named-to-inc-5000-list-of-fastest-growing-small-companies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616129618-DBR81TLZI5MGZUE93NRT/image.jpeg</image:loc>
      <image:title>News - Star Lab Named to Inc. 5000 list of Fastest Growing Small Companies</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-cto-selected-for-best-cyber-paper-at-gvsets-2019</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616019153-HEHH5YIUOLB1UESOB4ZI/image.jpeg</image:loc>
      <image:title>News - Star Lab CTO Selected For “Best Cyber Paper” at GVSETS 2019</image:title>
      <image:caption>Star Lab CTO Selected for “Best Cyber Paper” at GVSETS 2019</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585616040321-RGGXVH19KH21YH0CS1AZ/image.png</image:loc>
      <image:title>News - Star Lab CTO Selected For “Best Cyber Paper” at GVSETS 2019</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-joins-aerospace-industries-association</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585590907475-7NVPEZZA21G9AV0GQ5FL/image.png</image:loc>
      <image:title>News - Star Lab joins Aerospace Industries Association</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-joins-sosa-consortium</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585590721923-DPW9DZBVQMMAWYLGC0OV/image.png</image:loc>
      <image:title>News - Star Lab joins SOSA™ Consortium</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-leading-the-future-of-security-amp-virtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/crucible-embedded-hypervisor-provides-built-in-security-to-new-res-trust-rackmount</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/common-criteria-niap-validations-of-titanium-and-crucible</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/the-rebranding-of-lure-to-titanium-security-suite</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/ryan-thibodeaux-to-speak-at-platform-security-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/press-release-star-lab-to-speak-at-the-embedded-linux-conference-in-portland-oregon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/product-manager-for-star-labs-crucible-authors-newly-published-book-step-ahead-with-rust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-receives-funding-from-the-us-navy-to-develop-real-time-anomaly-detection-system-for-combat-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/xen-project-spotlights-star-lab-ceo-irby-thompson-as-contributor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-awarded-intelligence-advanced-research-projects-activity-iarpa-contract</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/escar-usa-2017</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/department-of-energy-connected-lighting-systems-workshop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-to-speak-at-ndia-systems-engineering-cyber-resilient-amp-secure-weapon-system-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-joins-the-industrial-internet-consortium</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-to-speak-at-embedded-linux-conference-open-iot-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-named-to-cybersecurity-500-list</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-to-attend-xilinx-security-working-group-meeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-to-speak-at-2016-security-of-things-forum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-announces-immediate-availability-of-lure-and-crucible-products</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-demonstrates-crucible-interoperability-with-xilinxs-ultrascale-mpsoc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-to-speak-at-2016-ground-vehicle-systems-engineering-and-technology-symposium-gvsets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-opens-office-in-san-antonio-tx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-releases-beta-of-lure-product</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-21</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-releases-beta-of-crucible-product</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-opens-new-office-in-huntsville-al</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-awarded-darpa-pyxis-contract</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/star-lab-awarded-navy-cybersecurity-contract</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/press/category/Company+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press/category/Media+Coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press/category/Press+Releases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press/category/Product+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press/tag/Industry+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/press/tag/Company+News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-linux</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-09-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601818619-IW0H209YO8WW660VC86X/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601813557-OG33MRF40H2XM5BUY5JY/star.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601813557-OG33MRF40H2XM5BUY5JY/star.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601813557-OG33MRF40H2XM5BUY5JY/star.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611622646289-4DW9V5MWXUTLRN6DSDID/simon-infanger-uwWz9ecFWas-unsplash.jpg</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601818619-IW0H209YO8WW660VC86X/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600766181-HAAZREJ4XJ344LYL12L2/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585518460659-5MQ6TTOAJDQCXNZRTX5D/critical_innovation.jpg</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600759605-DBTVVIG7X0QNZOMN802U/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600773049-3HLG87BHJB33R0C3KX9X/star_white.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600817708-OP7J4BBSP1OTHOS3DSOR/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600812372-4DY4UNE6BQTMS3254LXD/image-asset.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600799135-GKW9I04Y6BMDEMUCM92A/star_white.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600807175-ZMRYELRIJLR5O2D7WRPQ/star.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582733018040-S3XUJEZ0MU8BCJQQK8TO/whitepaper.png</image:loc>
      <image:title>Titanium for Linux - Whitepaper</image:title>
      <image:caption>Guidelines for Securing Combat Systems</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2ff5a5d2-fea0-437c-b0cf-e96e38ce5bd2/titaniumtest2.png</image:loc>
      <image:title>Titanium for Linux - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/6af3edd1-ba10-4d38-af05-324ba7e98222/Titanium+Cover+Page.jpg</image:loc>
      <image:title>Titanium for Linux - Whitepaper</image:title>
      <image:caption>Click the image to download!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579889104496-BSJUERLQSM5738NM1HCK/background_solid_grey_8f8f8f.png</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1651253383531-VH4XWCJBGOF7BMOAS2TX/AdobeStock_369301820_Editorial_Use_Only.jpg</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770260497-TCPKSZ913BV4LCZFN3V1/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1713285078728-E9PC92R4MUUUZ188KQEZ/uav.jpg</image:loc>
      <image:title>Titanium for Linux</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1d7c8ef4-9008-40b3-94f5-295280db971d/conferenceroomphoto1.png</image:loc>
      <image:title>About</image:title>
      <image:caption>Huntsville Office</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601813557-OG33MRF40H2XM5BUY5JY/star.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1651250378262-K5E9ZFGRORXWAF5CRHIS/Untitled%252Bdesign.jpg</image:loc>
      <image:title>About - Gabriel Quiroz (General Manager)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579892577868-ULJ5MAZUIG9XIZJ6F9WR/adam_fraser.jpg</image:loc>
      <image:title>About - Adam Fraser (COO)</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1707173647719-OGAMD0QV05PXWQG3V93T/David+Esler+-+B%26W+Square+2+for+website.png</image:loc>
      <image:title>About - David Esler (Director of Engineering)</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601818619-IW0H209YO8WW660VC86X/image-asset.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601807485-JY0J99NHCER8JAVD6R4F/star.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585619376868-H2IGJCB8UGJE1PDUS254/office.jpg</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585620417208-L6BFARZUWAMDCBF0OPZJ/background_solid_grey_8f8f8f.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1713285657443-TGMPPI6GV6BHPXVJU57C/image-asset.jpeg</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/resources</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579893518630-C8O759LR8NQ2CUOZQYXG/pilot.jpg</image:loc>
      <image:title>Resources</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579893500326-GACUOOT5UO9QFB5NPA65/drone.jpg</image:loc>
      <image:title>Resources</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582293180347-WR8G9DA1E089NR8PHXUS/drone.jpg</image:loc>
      <image:title>Resources - ACHIEVING AIRBORNE RADAR PROCESSING SYSTEM SUPERIORITY</image:title>
      <image:caption>By incorporating Crucible into its airborne radar processing system, one major defense contractor leapfrogged the competition in only a year to provide a system far superior to those of traditional industry leaders.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582293225500-MZESAGZIC238CCOI3DL4/pilot.jpg</image:loc>
      <image:title>Resources - DELIVERING GROUND SYSTEMS TRAINER UNDER TIGHT TURNAROUND</image:title>
      <image:caption>When one defense contractor’s in-house security solution failed, leaving it with little margin to meet a looming deadline, Star Lab moved quickly to deliver a timely solution that met all technical requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585620581832-CUTE1C5NTM897J457BIF/image-asset.jpeg</image:loc>
      <image:title>Resources</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601347195-NZ300QS9P1DL4TD8MQ79/image_2021-01-25_140225.png</image:loc>
      <image:title>Resources</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-09-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611591028675-2Q6NMSAKPPL5IN9DWP3Y/image.jpg</image:loc>
      <image:title>Home - EMbedded Security</image:title>
      <image:caption>Built-in security to protect against the world’s most advanced attacks</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611591072448-RC887J78PIO28TSOX3Z8/image.jpg</image:loc>
      <image:title>Home - Security for Virtualization</image:title>
      <image:caption>Every layer of the stack must be secure</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611591050431-8O4U8BB83XSM5A2P93HD/image.jpg</image:loc>
      <image:title>Home - Technology Protection</image:title>
      <image:caption>Preventing sophisticated tampering and reverse engineering attacks</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/dbf8a4ff-6c8a-4f20-8004-60d409eb2dd2/unsplash-image-cckf4TsHAuw.jpg</image:loc>
      <image:title>Home - Explore Services</image:title>
      <image:caption>Our Expertise at Your Fingertips. What You Need. When You Need It.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354680304-AO1E2E1LQS9DGG7YWU7W/Seal_of_the_U.S._National_Security_Agency.svg.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909163-ZN60FGHR5B6F56DPJQJK/abaco.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909174-6UQSFEPN6RKDQK5YV2W1/baesystems.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909730-66JGL5JK2M9I0QK0684I/curtisswright.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909746-9ZJZOWP06TZX0ALT4SXX/idahoscientific.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910349-2JKTPK97FSQM89E2X865/intel.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910494-AZFFRQ989KRJV7B933R8/lockheedmartin.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1736275706805-YUE9A6KDSPYR5ILPD2B8/mercurysystems.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911071-EAINOTNH818XQFJKM9OX/navsea.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911539-7LGLCPOH6D2WSSZ36PG9/northropgrumman.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911621-LVL973KVXS1JR1WJS9GY/raytheon.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912087-SKCZ1C724LS5I7RJDAQM/spawar.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912746-5Q6XNR2H9K1HWYF3AR3G/xes.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912716-A1Q75NBFNPH1W1QMK8UQ/xilinx.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8c4d4d6a-61f9-4d1f-9b3a-d4f307a7945f/Kevlar+Embedded+Security.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/46bba2f8-747e-48b8-afe6-215690932742/titaniumpenguintest.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/82fac368-cfe7-497f-a4d5-07d3beb6650a/Data+Protection+Whitepaper+Cover+Image.jpg</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611589694035-SQNQLTZJXQIT5UMGTNCF/thisisengineering-raeng-0l2PPgrHXX4-unsplash.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611590022129-IB8Y13RGRU7YZU827EP0/image.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670355727727-5D8ZJ2PZL11U46N4HO0F/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672865698704-RRX5POAOG0VEIZ681OZZ/unsplash-image-Q1p7bh3SHj8.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586874644791-Y8MOSEZXP4VJ34EDA3I5/Logo+-+Star+Lab+Wind+River.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717425335134-C10R9UVPI29KY62E6DZO/image-asset.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1757017120419-XGX3FR496QWRC0486OYQ/starlab-acq_1600x667_v1.png</image:loc>
      <image:title>Home - Mercury Acquires Star Lab</image:title>
      <image:caption>Mercury acquires Star Lab to advance its leadership position in secure processing</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/aerospace-defense-case-histories</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1584982697845-PMH3AP6QQJERI2NUS84O/drone.jpg</image:loc>
      <image:title>Aerospace and Defense Case Histories - Achieving Airborne Radar Processing System Superiority</image:title>
      <image:caption>By incorporating Crucible into its airborne radar processing system, one major defense contractor leapfrogged the competition in only a year to provide a system far superior to those of traditional industry leaders.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1584982697845-PMH3AP6QQJERI2NUS84O/drone.jpg</image:loc>
      <image:title>Aerospace and Defense Case Histories - Achieving Airborne Radar Processing System Superiority</image:title>
      <image:caption>By incorporating Crucible into its airborne radar processing system, one major defense contractor leapfrogged the competition in only a year to provide a system far superior to those of traditional industry leaders.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1584982688771-MBA7GDU9IJWJLB2IWAZD/pilot.jpg</image:loc>
      <image:title>Aerospace and Defense Case Histories - Delivering Ground Systems Training Under Tight Turnaround</image:title>
      <image:caption>When one defense contractor’s in-house security solution failed, leaving it with little margin to meet a looming deadline, Star Lab moved quickly to deliver a timely solution that met all technical requirements.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585660127329-ZNP2G5TI8R9Z7HV3Y16N/image-asset.jpeg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepapers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepapers - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepapers - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Whitepapers - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Whitepapers - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Whitepapers - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Whitepapers - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Whitepapers - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Whitepapers - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Whitepapers - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Whitepapers - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Whitepapers - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Whitepapers - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Whitepapers - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Whitepapers - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Whitepapers - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Whitepapers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Whitepapers - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/product-datasheets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680283489130-2HMB2F9ASDHFXULLVH3K/datasheet_titanium.png</image:loc>
      <image:title>Product Datasheets - Titanium Technology Protection</image:title>
      <image:caption>Star Lab’s Titanium Technology Protection offers the most robust Linux system hardening and security capabilities available on the market today for operationally-deployed Linux systems. Designed using a threat model that assumes an attacker will gain administrative (root) access to the system, Titanium Technology Protection maintains the integrity and confidentiality of critical applications, data, and configurations while assuring operations. Titanium Linux is compatible with RedHat and other binary-compatible distributions.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680283489130-2HMB2F9ASDHFXULLVH3K/datasheet_titanium.png</image:loc>
      <image:title>Product Datasheets - Titanium Technology Protection</image:title>
      <image:caption>Star Lab’s Titanium Technology Protection offers the most robust Linux system hardening and security capabilities available on the market today for operationally-deployed Linux systems. Designed using a threat model that assumes an attacker will gain administrative (root) access to the system, Titanium Technology Protection maintains the integrity and confidentiality of critical applications, data, and configurations while assuring operations. Titanium Linux is compatible with RedHat and other binary-compatible distributions.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680283507841-RTNAYU7SKGHOWS3LIC8W/datasheet_crucible.png</image:loc>
      <image:title>Product Datasheets - Titanium Secure Hypervisor</image:title>
      <image:caption>Titanium Secure Hypervisor enables system engineers to leverage virtualization to enhance the integrity and upgradability of defense systems that operate in the most hostile computing environments. Virtualization of embedded systems is a reality due to the availability of COTS hardware designed specifically to support virtualization. This emerging hardware allows Titanium Secure Hypervisor to be highly performant.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680283532835-0AE0G1TTAVJ5IQ9K3PR6/datasheet_trueboot.png</image:loc>
      <image:title>Product Datasheets - Titanium Secure Boot</image:title>
      <image:caption>Star Lab’s Titanium Secure Boot provides the strongest level of boot-time authentication/trust on Intel chipsets, all the while being more flexible in terms of target Linux distributions and BIOS variants.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717424087288-XWSB4B71PEY02I2BCJAY/Cyber+Hardening+Suite.png</image:loc>
      <image:title>Product Datasheets - Kevlar Embedded Security</image:title>
      <image:caption>Designed using a threat model that assumes an attacker will gain administrative access to the system, Star Lab’s Kevlar Embedded Security maintains the integrity and confidentiality of critical applications, data, and configurations at rest, through system boot, at runtime, and during updates in the field.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1715276849535-HG0KE65LU5D28CNMZ8TO/Titanium+for+KVM+Cover+Page.png</image:loc>
      <image:title>Product Datasheets - Titanium for KVM</image:title>
      <image:caption>Star Lab’s Titanium for KVM extends the protection capabilities in Titanium Technology Protection to secure the LInux KVM hypervisor host and guest VMs.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/trenton-partnership</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599741524378-UDW5UH5WPJ08XZWD9WU5/full_spectrum_dominance.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599741706725-XZW3A64DQN6A8A0MJ7VO/seamless_parity.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599742025793-AC755X27RXZEAG5PI1M2/hardened_software.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599742009634-055CVPIXL8W7ZQF8E2TT/ruggedized_hardware.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599742393912-P6E5HYF6PK4POWP8KUQK/made_in_usa.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599744130242-TETKO24AQ7GJC6EEHCDK/hardware_banner.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599743663655-8NNXADP7YR46X2HZ43XX/star_lab_logo.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599742847895-J00JK8NLCHHJHM2VNADB/trenton.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599743969228-RFMQWWBF8WLGCSPOGWKI/hardware.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599741654397-Y88M91LLVJFH879I1RFL/background_solid_blue_dark_020e47.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599742288685-91B9Y8EDNRJXFO0O8QY2/what_you_see.png</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599743242284-SQN5KORVP7XC5OQRH9AY/partnership_matters.jpg</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599744399733-65BERNHIAN34EW04FYA1/banner.jpg</image:loc>
      <image:title>Trenton Partnership</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/trenton-webinar-registration</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1603813180219-WBG96SP23GB076NIJDK2/image_2020-10-27_113939.png</image:loc>
      <image:title>Trenton Webinar Registration</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1600174325316-P1PRGL88O37EZ4T7SFSX/Logo+-+Star+Lab+Wind+River+Knockout.png</image:loc>
      <image:title>Trenton Webinar Registration</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1603814611970-VPWZFF01E2BETAAX9A4B/AdobeStock_335145711.jpeg</image:loc>
      <image:title>Trenton Webinar Registration</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-secure-boot</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601044011-CMEZY82M77OGEY8RNZPF/image-asset.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601020019-XO56U215YYR6LAOV2NUZ/image-asset.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1615998056542-LTP7KZ53AFGN66RPOV95/AdobeStock_120409174.jpeg</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601050608-FXWSRGKENL38V43NZ0CP/image-asset.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601039501-3TVEO6D4H6T5ORUQ5J2M/image-asset.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b95d23d9-d940-470b-a85b-b1b3820eadfd/Webinar-Secure+Boot.jpg</image:loc>
      <image:title>Titanium Secure Boot - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7a96b05b-eb56-4098-afad-c185bbb3159c/Whitepaper+-+Titanium+Secure+Boot.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/24bcdfc2-0328-4d4e-a34d-d03913be4766/Secure+Boot+Cover+page+090924.jpg</image:loc>
      <image:title>Titanium Secure Boot - Whitepaper</image:title>
      <image:caption>Click the image to download!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579889104496-BSJUERLQSM5738NM1HCK/background_solid_grey_8f8f8f.png</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1683215877620-TRLEFRL1EGIHP6NVSNCV/AdobeStock_263902447.jpg</image:loc>
      <image:title>Titanium Secure Boot</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-technology-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611598534392-BKTEZNBM6RSCTHMW606Z/image.jpg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675445203164-LMLTCC5UH4PBCMEAPYXO/AdobeStock_263902447.jpg</image:loc>
      <image:title>Titanium Technology Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1604612420389-94OR5IFOSC8096Y95TK7/image-asset.jpeg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1603825384248-SC0RBZ54YEPD9I9WSXQ4/AdobeStock_335145711.jpeg</image:loc>
      <image:title>Titanium Technology Protection - Anti-Tamper</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1604612289505-2R2XJRHOQI5D2TZLCMGU/image-asset.jpeg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a76383ad-06ce-4d71-ad00-2c974fa438b8/Titanium+Technology+Protection.png</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2ff5a5d2-fea0-437c-b0cf-e96e38ce5bd2/titaniumtest2.png</image:loc>
      <image:title>Titanium Technology Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7755cfd8-e017-43c5-a977-51d37161992f/Titanium+Technology+Protection.png</image:loc>
      <image:title>Titanium Technology Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fa7aaa11-5eb8-477f-8988-565760027188/MAEIA_2024Silver.png</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770260497-TCPKSZ913BV4LCZFN3V1/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672866878135-5O525ABFWH0UN8AQZWL7/image-asset.jpg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1705985141931-I4Q51FA06ARB7GF4FLKC/AdobeStock_369301820_Editorial_Use_Only.jpg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1732563227655-2WWWICM3THJJCMDBN17L/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Titanium Technology Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354680304-AO1E2E1LQS9DGG7YWU7W/Seal_of_the_U.S._National_Security_Agency.svg.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909163-ZN60FGHR5B6F56DPJQJK/abaco.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909174-6UQSFEPN6RKDQK5YV2W1/baesystems.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909730-66JGL5JK2M9I0QK0684I/curtisswright.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909746-9ZJZOWP06TZX0ALT4SXX/idahoscientific.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910349-2JKTPK97FSQM89E2X865/intel.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910494-AZFFRQ989KRJV7B933R8/lockheedmartin.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1736275706805-YUE9A6KDSPYR5ILPD2B8/mercurysystems.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911071-EAINOTNH818XQFJKM9OX/navsea.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911539-7LGLCPOH6D2WSSZ36PG9/northropgrumman.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911621-LVL973KVXS1JR1WJS9GY/raytheon.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912087-SKCZ1C724LS5I7RJDAQM/spawar.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912746-5Q6XNR2H9K1HWYF3AR3G/xes.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912716-A1Q75NBFNPH1W1QMK8UQ/xilinx.png</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611591296643-EV16A8G7E8T505N7NHY2/GettyImages-157278122.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354136891-U0YA5ALH8BR3FG60CJC7/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Partners</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/kevlar-embedded-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7a869f17-29f3-4bb6-8a7f-d7705b9c6550/Website+Images-12.jpg</image:loc>
      <image:title>Kevlar Embedded Security - Anti-Tamper</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b624da52-17bd-4c2d-8851-f40d4e08f5f6/Website+Images-14.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1b550aeb-98be-4fd5-a061-46232671ebcc/Website+Images-13.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675444166173-H1V92SPAKPYYHFW0UF75/unsplash-image-DgZxBnZeQo8.jpg</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e44782f3-c2c1-476f-aa0b-a3156e07f606/Kevlar+System+Inspector.png</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2339c5bf-c65f-4ac8-9aa9-257bee46489b/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Click to downlaod</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/Screen+Shot+2023-01-03+at+10.26.07+AM.png</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d2554211-827f-4c9e-aac3-8853a8d726db/Kevlar+Embedded+Security.png</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/80f52bfe-6bad-449d-997f-fd047ecc77fe/Kevlar+Embedded+Security.png</image:loc>
      <image:title>Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672758932064-T1S3D9CWSIDPNA7URKND/Website+Images-8.png</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770539612-KPF02QPLYYWMUQHWNCA7/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672771531482-Q36H5IWI953ITEYY4GFF/unsplash-image-h3aOPjhRoc0.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1681921128594-1N96DB2E0CEUAHHA08S6/Website%2525252BImages-17.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1694465816063-77D0Z7K9QGF1Y70S5CTN/KES+Full+Logo+Square.png</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1707943693546-FOTTXOFLVJZA6FLNCRIB/Website%252525252BImages-15.jpg</image:loc>
      <image:title>Kevlar Embedded Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/webinars</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656343682470-ARP7MS9ML1O08D9AVNXF/image-asset.jpeg</image:loc>
      <image:title>Webinars - Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656343682470-ARP7MS9ML1O08D9AVNXF/image-asset.jpeg</image:loc>
      <image:title>Webinars - Secure Boot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656343705146-Z38L9UZ6SCAY249VZ2ZK/image-asset.jpeg</image:loc>
      <image:title>Webinars - Secure Hypervisor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656343730195-G1IY7O8B1N8WRM4JSCER/image-asset.jpeg</image:loc>
      <image:title>Webinars - Secure OS</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656344006318-PGZRQHLESMEEEYKUOCZX/image-asset.jpeg</image:loc>
      <image:title>Webinars - Container Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1603823988752-OCOMF3IN23KXTT5R2W2V/image_2020-10-27_143946.png</image:loc>
      <image:title>Webinars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1656438754274-N0MYWYOU6Q0UYSSHYJEJ/Webinar-Managing+Ransomware+in+Linux.jpg</image:loc>
      <image:title>Webinars</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/78fb1f48-2ddb-4dc4-846e-30d94597dae6/Webinar+Banner+for+for+LinkedIn+Event+Page.gif</image:loc>
      <image:title>Webinars - Secure Virtualization in A&amp;D Applications</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733521401312-1XN0PH9G40AO3FDVUTCO/Webinar+Banner+for+for+LinkedIn+Event+Page%281%29.gif</image:loc>
      <image:title>Webinars - Built-in vs Bolt-on Security for Embedded Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1718995586304-RVXLYIKMZAA07VR59OR4/Webinar+Banner+for+for+LinkedIn+Event+Page%285%29.png</image:loc>
      <image:title>Webinars - Data Protection with Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733520237294-Z3MBXGM1QC0PT3M73NSC/Copy+of+MAE+Webinar+Email+Blast+%281600+x+900+px%29.png</image:loc>
      <image:title>Webinars - AI in Healthcare | The Security Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733520300353-6SW74RSGMBAYCXYVGMIE/IoT+DSC%281%29.png</image:loc>
      <image:title>Webinars - IoT Device Security Conference | Cybersecurity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733521544831-ZIIZ0X6INV59M7HGBSD5/AI+in+Industrial%283%29.png</image:loc>
      <image:title>Webinars - AI in Industrial | The Security Perspective</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733520341786-K54LP93HHJAUR6T70NOE/Hardened+Yocto%281%29.png</image:loc>
      <image:title>Webinars - Hardened Yocto | Overcoming Challenges with Building a Secure Embedded Linux OS</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/product-partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354680304-AO1E2E1LQS9DGG7YWU7W/Seal_of_the_U.S._National_Security_Agency.svg.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5e1f51eb1bb1681137ea90b8/638f8939d43158058391dfed/638f96dfe1d8be77cc595d81/1670354655149/</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354680304-AO1E2E1LQS9DGG7YWU7W/Seal_of_the_U.S._National_Security_Agency.svg.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909163-ZN60FGHR5B6F56DPJQJK/abaco.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909174-6UQSFEPN6RKDQK5YV2W1/baesystems.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909730-66JGL5JK2M9I0QK0684I/curtisswright.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909746-9ZJZOWP06TZX0ALT4SXX/idahoscientific.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910349-2JKTPK97FSQM89E2X865/intel.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910494-AZFFRQ989KRJV7B933R8/lockheedmartin.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1736275706805-YUE9A6KDSPYR5ILPD2B8/mercurysystems.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911071-EAINOTNH818XQFJKM9OX/navsea.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911539-7LGLCPOH6D2WSSZ36PG9/northropgrumman.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911621-LVL973KVXS1JR1WJS9GY/raytheon.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912087-SKCZ1C724LS5I7RJDAQM/spawar.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912746-5Q6XNR2H9K1HWYF3AR3G/xes.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912716-A1Q75NBFNPH1W1QMK8UQ/xilinx.png</image:loc>
      <image:title>Product Partners</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/explore-kevlar-embedded-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675177482706-1SFJWAZCA90KBCO68NTN/Kevlar+Embedded+Security%282%29.png</image:loc>
      <image:title>Explore Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675178189739-OOLLWH5SE6FRE1GZZGKW/Kevlar+Embedded+Security+with+height.png</image:loc>
      <image:title>Explore Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9a838c69-41d2-4291-aa1f-85ebad3c2d87/unsplash-image-XJXWbfSo2f0.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d6eec595-e003-4d68-ae3e-0f7e6ee8ea21/KES+Datasheet+Screenshot.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675370744207-Z402HSSKD7PF3D6T7WEF/Untitled%2Bdesign%252837%2529.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675371911379-WDHMXBKUMPZHMZCILDGT/unsplash-image-RoYujmHrdxA.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675372489548-43AEEKLGI63PS6C9WFC5/unsplash-image-BUDn0s7QteI.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675372606338-7N9JXPY7D6TJDDZUOJ6P/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675440189085-Z78ALMLK07GT003CCEHX/unsplash-image-Tjbk79TARiE.jpg</image:loc>
      <image:title>Explore Kevlar Embedded Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/explore-kevlar-system-inspector</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bf929dc6-733a-45bb-86e7-b8323215697a/Kevlar+System+Inspector.png</image:loc>
      <image:title>Explore Kevlar System Inspector - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e44782f3-c2c1-476f-aa0b-a3156e07f606/Kevlar+System+Inspector.png</image:loc>
      <image:title>Explore Kevlar System Inspector - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e44782f3-c2c1-476f-aa0b-a3156e07f606/Kevlar+System+Inspector.png</image:loc>
      <image:title>Explore Kevlar System Inspector - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1675372606338-7N9JXPY7D6TJDDZUOJ6P/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Explore Kevlar System Inspector</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680536500934-P2RMO7ZD4PJEMNH3SBUC/unsplash-image-FWoq_ldWlNQ.jpg</image:loc>
      <image:title>Explore Kevlar System Inspector</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680536341164-31COBKUYG52Y8JKJ0X15/unsplash-image-mfB1B1s4sMc.jpg</image:loc>
      <image:title>Explore Kevlar System Inspector</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1681913818001-575S7FPT2BG351ADTKSD/Kevlar%2BSystem%2BInspector.jpg</image:loc>
      <image:title>Explore Kevlar System Inspector</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/0e56b0a4-8cab-40f0-85cb-31c271525c2f/Adversarial+Services%285%29.png</image:loc>
      <image:title>Services - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f88347ee-bcbd-449e-b09a-bb81a244ebba/Security+Engineering+Transformation%282%29.png</image:loc>
      <image:title>Services - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/ec62da33-cf80-4e8e-a8ca-faa6b1e85ea1/Design+Services.png</image:loc>
      <image:title>Services - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/a20f4304-8ff7-4523-88d8-65297ca62c1b/Expertise+On-Demand%281%29.png</image:loc>
      <image:title>Services - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1683211412435-GNFICQP1S0436FBQ4QFJ/unsplash-image-cckf4TsHAuw.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1683211412435-GNFICQP1S0436FBQ4QFJ/unsplash-image-cckf4TsHAuw.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/services/explore-adversarial-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/17a68c27-084a-4ac6-a66f-387fa61abadd/Architectural+Scurity+Assessment+Breakdown+Image.jpg</image:loc>
      <image:title>Explore Adversarial Services - Make it stand out</image:title>
      <image:caption>Click to download the Services Breakdown!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1695763337289-OPBKNZQPGXESSE9AZXDC/Adversarial%252BServices%2525282%252529.jpg</image:loc>
      <image:title>Explore Adversarial Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696356657705-P48G8BESG7FNX6ZY05JG/Adversarial%252BServices%2525283%252529.jpg</image:loc>
      <image:title>Explore Adversarial Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/88b079fd-8681-46c7-bcd3-e3c87e6ae82b/eBPF+Blog+Big+Picture.png</image:loc>
      <image:title>Explore Adversarial Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/services/explore-security-engineering-transformation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7ff4080b-20da-4418-b2a6-f7901c9c6769/Security+Transformation+Title+Photo.jpg</image:loc>
      <image:title>Explore Security Engineering Transformation - Make it stand out</image:title>
      <image:caption>Click the image to download the Services Breakdown!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696360397978-7X9VKJZGCJVNBZPZW2WD/Security%2BEngineering%2BTransformation%25285%2529.jpg</image:loc>
      <image:title>Explore Security Engineering Transformation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696363684718-UGGO3ATWCJ98BKKNGR0V/image-asset.jpg</image:loc>
      <image:title>Explore Security Engineering Transformation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696365475139-SQ02RH0ESMMSIBPNIQ51/Preparatory%25252BSecurity%252525281%25252529.jpg</image:loc>
      <image:title>Explore Security Engineering Transformation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/services/explore-design-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696433402471-SKPZRKWINHP3CO07K8TB/Design%2BServices%25281%2529.jpg</image:loc>
      <image:title>Explore Design Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696434123950-M4UHSWJRV22JRN5QCG11/Design%252BServices%252B%2525282%252529.jpg</image:loc>
      <image:title>Explore Design Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696434652181-FEGAU2RONFC6S3MOD7VE/Design%25252BServices%252525282%25252529.jpg</image:loc>
      <image:title>Explore Design Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/services/explore-expertise-ondemand</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696603840445-4NI9PAA6QRN33AW8LJ82/Design+Services%283%29.png</image:loc>
      <image:title>Explore Expertise On-Demand</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696604532136-O5JXQYV1O1M8L95HXQFC/Design%2BServices%25285%2529.jpg</image:loc>
      <image:title>Explore Expertise On-Demand</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1696604550929-DQYT8QQC88ZGOS3AFVTE/Design%2525252BServices%25252525284%2525252529.jpg</image:loc>
      <image:title>Explore Expertise On-Demand</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/xponential-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/design-automation-conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/ausa-global-force</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/afa-warfare-symposium</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/designcon-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/aaaa-2025-summit-6x2wk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/aaaa-2025-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/sea-air-space-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/surface-navy-association-37th-national-symposium</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/national-cyber-summit-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1dec1e21-0aa0-4844-8a1d-d9a9150e7e36/Banner_1080x627.jpg</image:loc>
      <image:title>Events - National Cyber Summit 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/smd-symposium-happy-hour</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2defba31-74b2-486d-8254-66337144e973/Grey%282%29.png</image:loc>
      <image:title>Events - SMD Symposium Happy Hour - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/embeddedworldnorthamerica-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/whats-new-in-kevlar-embedded-security-live-demo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/5422df55-d953-45d8-b0cd-9ec9ff9ad50c/Webinar+Banner+for+Zoom+%28640+x+200+px%29%281%29.png</image:loc>
      <image:title>Events - What's New in Kevlar Embedded Security: A Live Demo + Q&amp;amp;A - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9a9288ac-b1bc-4d82-983b-04564cbdd46a/Kevlar+Embedded+Security.png</image:loc>
      <image:title>Events - What's New in Kevlar Embedded Security: A Live Demo + Q&amp;amp;A - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/webinar/ai-in-healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/enabling-technologies-happy-hour-san-diego</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-06</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/smd-symposium-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/41a40b92-daed-4832-abc4-0d07b82d1adf/SMD+Symposium+Event+Image+%281600+x+900+px%29%281%29.png</image:loc>
      <image:title>Events - SMD Symposium - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/built-in-vs-bolt-on-security-why-the-current-approach-to-embedded-security-just-doesnt-cut-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/197b66d9-5330-4a88-b888-0020358e0562/Webinar+Banner+for+Zoom+%28640+x+200+px%29.png</image:loc>
      <image:title>Events - Built-in vs Bolt-on Security: Why the Current Approach to Embedded Security Just Doesn't Cut it - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/star-lab-at-satellite-2024-event</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/webinar/secure-virtualization-in-aandd-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/96598a20-a4f1-40b1-bb2d-404443842c38/1.png</image:loc>
      <image:title>Events - Secure Virtualization in A&amp;amp;D Applications - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/military-aviation-and-air-dominance-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706200024684-IX0AZDHXC3T2VQBBCQGA/Military+Aviation+%26+Air+Dominance%282%29.png</image:loc>
      <image:title>Events - Military Aviation &amp;amp; Air Dominance Summit 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/events/xilinx-security-working-group-co</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/xilinx-security-working-group-dc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-14</lastmod>
  </url>
  <url>
    <loc>https://www.starlab.io/events/afcea-west-2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b5086051-b45a-4d03-8886-6f62a657d274/https+__www.westconference.org_WEST24_CUSTOM_images_media_banner.png</image:loc>
      <image:title>Events - AFCEA West 2024 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-for-kvm</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/0e2cbd62-8aeb-483a-808c-5a3c0d655af6/Titanium+Technology+Protection.png</image:loc>
      <image:title>Titanium for KVM - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1704476086483-E38F47WW3Z7DRIYLM0M7/1.png</image:loc>
      <image:title>Titanium for KVM - Make it stand out</image:title>
      <image:caption>Click to read the full blog!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/cf9b307e-b6c3-4b34-b505-8b2191cf70aa/image-asset.jpg</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706647423274-0V49YVQGJQT9KTQPJYP6/Is+there+a+STIG+for+KVM+%281200+x+1200+px%29.png</image:loc>
      <image:title>Titanium for KVM - Make it stand out</image:title>
      <image:caption>Click to read the full blog!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600915255-5SJMSRZ2YCYLSZ086F1P/star.png</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600923630-EA1PT1M3NTH2Y1VMY31C/image-asset.png</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600919560-T6JK6UL1K7ZCWENJJLHG/image-asset.png</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611600911041-YQE46ZOXIMTRGQ97YVQJ/image-asset.png</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2ff5a5d2-fea0-437c-b0cf-e96e38ce5bd2/titaniumtest2.png</image:loc>
      <image:title>Titanium for KVM - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/806aeaa8-7862-47db-aea2-5da9a75d3891/KVM+Cover+Page+090924.jpg</image:loc>
      <image:title>Titanium for KVM - Whitepaper</image:title>
      <image:caption>Click the image to download!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579875934078-WJEORQ1T6UITG9CE95TC/background_solid_grey_8f8f8f.png</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770260497-TCPKSZ913BV4LCZFN3V1/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1705430348001-T9GU5BNJBGIS8JL5M4CT/image-asset.jpg</image:loc>
      <image:title>Titanium for KVM</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/secure-virtualization-webinar-request</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/bb4eed25-25ad-47c7-b798-798392ce3bb1/Webinar+Banner+for+Zoom+%281920+x+1080+px%29+%281200+x+1200+px%29%282%29.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918703325-HVMS9L252575A9GOKVGD/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Secure Your Platform for the Cyber Resilience Act</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1733518430212-Y2UUTKURJ1W65XRRK24C/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Hardware Vendors as Security Enablers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731344172417-VBCKXL0UT5EPFQV83JV9/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Protecting Electronic Warfare Platforms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/image.jpg</image:loc>
      <image:title>Secure Virtualization Webinar Request - 7 Tenets of Layered Security in Embedded Design</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763619722-7LL59D8S4YW4ZGALMFC1/software_security_by_design.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Software Security By Design</image:title>
      <image:caption>Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1706630302583-NS4X3U5OWYHRJL11FGM0/Building+Security+Into+Cover+Image.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Building Security Into Embedded Linux Implementations</image:title>
      <image:caption>The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1709912927938-JW7TRRTZF5GEKS2ZIYPP/Syscall+Filtering+Whitepaper.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/d1d4d8ac-ae32-4fc5-9d86-bba4e05e3a97/Titanium+for+KVM+Whitepaper+Cover+Page.jpg</image:loc>
      <image:title>Secure Virtualization Webinar Request - Titanium for KVM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/35727473-4f5d-4235-8eb8-bf8616f52ccd/trueboot_vs_uefi_secure_boot.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Titanium Secure Boot vs. UEFI Secure Boot</image:title>
      <image:caption>Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667191790-6VKY8VEKKZRFOWSQC16F/whitepaper_crucible.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
      <image:caption>Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Titanium for Linux: Guidelines for Securing Combat Systems</image:title>
      <image:caption>Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585669708612-S06ZQBG2K60CDA7JFIIX/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems</image:title>
      <image:caption>The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&amp;D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763638680-PNTXJXEXFEEBFG0PDW1W/beyond_selinux.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data</image:title>
      <image:caption>One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”. In short, there’s no reason you can’t use both. SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1599590982905-JYQC39SP1KFT3ZZORBBQ/image-asset.png</image:loc>
      <image:title>Secure Virtualization Webinar Request - 10 Properties of Secure Embedded Systems</image:title>
      <image:caption>When tasked with securing an embedded system, the defender must be prepared to protect against every possible vulnerability. These are the most important security design principles and best practices that can prevent an attacker from gaining unauthorized access to, reverse engineer, stealing sensitive information from, or otherwise tampering with your embedded system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1717426839690-3M4HCR03TA3QOTJ9XXE0/Data+Protection+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Secure Virtualization Webinar Request</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Secure Virtualization Webinar Request - Protecting Unmanned Vehicles Against Battlefield Loss</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1707422681065-QGJNG37AQ3EJPW06WZBT/Webinar%2BBanner%2Bfor%2BZoom%2B%25281920%2Bx%2B1080%2Bpx%2529%25283%2529.jpg</image:loc>
      <image:title>Secure Virtualization Webinar Request</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1707423675143-7YPCIE5AV84JCLRXYBG6/image-asset.jpg</image:loc>
      <image:title>Secure Virtualization Webinar Request</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/webinars-on-demand</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/5d7739aa-9f9b-488d-889a-02ae18ec2ddd/Webpage+Image.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/0885419e-a063-4624-b9f1-62d85f4311c9/Webinar-Secure+Hypervisor.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8965433e-ea3c-4b6c-a03d-921625cf6d93/Webinar-Secure+OS.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/3597a256-d233-4add-9d6a-9a937c952907/Webinar-Container+Security.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/cf9e7ca5-495a-4520-a3b0-39be8617c9c9/Webinar-Managing+Ransomware+in+Linux.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/fd3bc53a-3e6a-4026-89b4-6e94fa5d1104/Webinar-Zero+Days+on+Linux.gif</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/016ec393-95d6-43d8-a88d-0f57ba0bb089/Webinar+Banner+for+for+LinkedIn+Event+Page%286%29.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/dedd2357-8e43-4d7a-a950-6c86eac43a60/Built+in+vs+Bolt+on%281%29.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4c234ce2-b2c2-4768-9530-0a58c219197b/Webinar+Banner+for+for+LinkedIn+Event+Page%285%29.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9b2107e6-d284-4ef1-b866-78e050feeb70/AI+in+Healthcare%281%29.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8ff31b12-a6ca-4b40-9158-c10bcb9860a1/ecd_footer_logo.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/4d53bc0f-a345-4a6f-a617-1d5f51087d48/AI+Day.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8ff31b12-a6ca-4b40-9158-c10bcb9860a1/ecd_footer_logo.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/09c55599-9887-423f-b6b9-638ee139e051/AI+in+Industrial.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8ff31b12-a6ca-4b40-9158-c10bcb9860a1/ecd_footer_logo.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/b855906d-5997-4496-89de-6d380904330c/Hardened+Yocto.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/84dc42df-24a8-45f4-b118-54ee4dc32c12/IoT+DSC.png</image:loc>
      <image:title>Webinars - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/cyber-resilience-for-embedded-systems</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/505b8286-f745-4c55-a735-8df192741b15/TTP+Small+Icon.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f9e1c563-0f41-4864-a851-ed152086f4bf/KES+Small+Icon.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/e44782f3-c2c1-476f-aa0b-a3156e07f606/Kevlar+System+Inspector.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672763510928-9R5GVKXI4Q93E1XZ3GZ2/Screen+Shot+2023-01-03+at+10.26.07+AM.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2339c5bf-c65f-4ac8-9aa9-257bee46489b/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Cyber Resilience for Embedded Systems - Make it stand out</image:title>
      <image:caption>Click to downlaod</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1712939408564-FU9XH0NEOVXIU7A5D4SP/4.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1707495481123-4WFT4WE5WFLBI2Z271X9/image-asset.jpg</image:loc>
      <image:title>Cyber Resilience for Embedded Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1713277534827-XLHVLF0DL4HKSNLMLZMT/5.jpg</image:loc>
      <image:title>Cyber Resilience for Embedded Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1713277359443-MKB6GQ1SGXTWWD66EQ40/3.png</image:loc>
      <image:title>Cyber Resilience for Embedded Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/partners/curtiss-wright</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611586662534-7NGL8EB4RXXFO99JPEK6/Logo+-+Star+Lab+Wind+River+Knockout.png</image:loc>
      <image:title>Curtiss-Wright Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2771db9f-342a-4d89-99fd-c71cbbcaecc2/CurtissWrightLogo_W_L.png</image:loc>
      <image:title>Curtiss-Wright Partnership - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/3a785d76-6125-4eca-b777-3b49d1a495e7/VPX3-1260-Reflection.png</image:loc>
      <image:title>Curtiss-Wright Partnership - Make it stand out</image:title>
      <image:caption>VPX3-1260</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/7755cfd8-e017-43c5-a977-51d37161992f/Titanium+Technology+Protection.png</image:loc>
      <image:title>Curtiss-Wright Partnership - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9afa9480-0221-48bf-b456-3c767fbae36e/CW+Case+Study.png</image:loc>
      <image:title>Curtiss-Wright Partnership - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735318517267-RQEKN1ESL4QRYQFQUKA2/CW+Partner+Page%281%29.png</image:loc>
      <image:title>Curtiss-Wright Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1681914794752-JGBSCE02UTQHAU41ZJVI/unsplash-image-FWoq_ldWlNQ.jpg</image:loc>
      <image:title>Curtiss-Wright Partnership</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735324457664-0V8Y118E7JL6WUF1TZZP/5.jpg</image:loc>
      <image:title>Curtiss-Wright Partnership</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579893941249-U6VEKK226AQPYQ82I0ZC/banner.jpg</image:loc>
      <image:title>Privacy Policy</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/careers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579893754743-I3CLRAX3UFOLOGGKHI55/banner.jpg</image:loc>
      <image:title>Careers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/blog-home</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1611601673548-OLK2AN4LFCSSM5B7HZ3B/image_2021-01-25_140752.png</image:loc>
      <image:title>Star Lab Blog</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/news-home</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585576051857-QUID9HGMUY6HW4F1K760/image-asset.jpeg</image:loc>
      <image:title>Newsroom</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/crucible</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726500691-AWL9C3402843MO19RH1S/background_solid_yellow_f6cd16.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726786268-7S6CL6LQ6XUBOGN23XO8/image-asset.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726722448-ZM72XMUSWQ67SKFVQJ2W/image-asset.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726775698-5J3F75WWK34E89PFZZ4H/image-asset.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726692950-L7JEWV09M58KIR9HM9X1/Performant.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726742981-BW3MQ8VXA8KJUVISOFG1/image-asset.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579726755755-EMLNNQKWESNLC1VE3DP6/image-asset.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579724474751-DKJTU5XZMM5SQARG45SM/background_solid_blue_dark_020e47.png</image:loc>
      <image:title>Crucible (Copy)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729618095-M42VLO2U3FAOBW1TKSBN/MultiDistro.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729630038-FX0SVTPBXSU7OIXTJ31I/AntiTamper.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729575238-8Y8G5XYUUV5L8KEJ8ZGM/AttackSurface.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729661952-0OAHI5D1I4HX9C0CINCJ/CertifiedData.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729605036-925JMLCRIF5KXCKLZ2JU/MandatoryAccess.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729649182-MCN8BQDXQOXA2LAWYLY3/CommonCriteria.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729698115-OZF8EN3OXTQAL3BJOWQW/background_solid_yellow_f6cd16.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1582729592605-EQ9P7LOGO2BJ7E59VYCE/SimpleIntegration.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579791602538-GT6CT4B9N9UD2227RESL/background_solid_grey_8f8f8f.png</image:loc>
      <image:title>Titanium (Copy)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/careers-embedded-test-engineer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1579893754743-I3CLRAX3UFOLOGGKHI55/banner.jpg</image:loc>
      <image:title>Careers (Embedded Test Engineer)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-titanium</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1585667192037-0WXJ9N4WJBTUCU1ZRHZX/whitepaper_titanium.png</image:loc>
      <image:title>Titanium: Guidelines for Securing Combat Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-meeting-cybersecurity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586456935654-HNJRF4C2MQ882X94IQEV/meeting_cyber_safety_and_reliability_requirements.png</image:loc>
      <image:title>Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-titanium-secure-boot</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-07-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/db791268-64cc-4c43-a78f-95ef093a8b9b/Whitepaper+-+Titanium+Secure+Boot.jpg</image:loc>
      <image:title>Titanium Secure Boot vs. UEFI Secure Boot</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-tactical-virtualization</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1586456090969-6VWMAG3H91IJG01NY584/whitepaper_crucible.png</image:loc>
      <image:title>Tactical Virtualization: A New Design Paradigm for Combat Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-software-security-by-design</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/de535500-3d45-48f3-a4d4-dfa973f2f283/Screen+Shot+2023-01-03+at+10.20.45+AM.png</image:loc>
      <image:title>Software Security By Design</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-se-linux</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/39ac2844-d242-4b63-8c0a-ef7b31d69cd1/Screen+Shot+2023-01-03+at+10.24.27+AM.png</image:loc>
      <image:title>Whitepaper (SE Linux)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/contact-us-7-tenets-training-request</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770635223-W8ID3V3WY8EXQWG65US9/unsplash-image-BUDn0s7QteI.jpg</image:loc>
      <image:title>Contact Us - 7 Tenets Training Request</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-newsletter-signup</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672771545793-97E0543B2QMIFSACOMFR/unsplash-image-h3aOPjhRoc0.jpg</image:loc>
      <image:title>Titanium Newsletter Signup</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper-7-tenets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/9688e62a-9e97-4325-b183-929b720605d7/Screen+Shot+2023-01-03+at+10.26.07+AM.png</image:loc>
      <image:title>Whitepaper (7 Tenets)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/partners-display</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-12-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670354680304-AO1E2E1LQS9DGG7YWU7W/Seal_of_the_U.S._National_Security_Agency.svg.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909163-ZN60FGHR5B6F56DPJQJK/abaco.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909174-6UQSFEPN6RKDQK5YV2W1/baesystems.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909730-66JGL5JK2M9I0QK0684I/curtisswright.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865909746-9ZJZOWP06TZX0ALT4SXX/idahoscientific.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910349-2JKTPK97FSQM89E2X865/intel.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865910494-AZFFRQ989KRJV7B933R8/lockheedmartin.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1736275706805-YUE9A6KDSPYR5ILPD2B8/mercurysystems.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911071-EAINOTNH818XQFJKM9OX/navsea.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911539-7LGLCPOH6D2WSSZ36PG9/northropgrumman.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865911621-LVL973KVXS1JR1WJS9GY/raytheon.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912087-SKCZ1C724LS5I7RJDAQM/spawar.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912746-5Q6XNR2H9K1HWYF3AR3G/xes.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1670865912716-A1Q75NBFNPH1W1QMK8UQ/xilinx.png</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1671137269342-5OERHIY5N8LUNO4KHGVR/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Partners Display</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/titanium-logo-footer-main</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2ff5a5d2-fea0-437c-b0cf-e96e38ce5bd2/titaniumtest2.png</image:loc>
      <image:title>Titanium Logo Footer - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1672770260497-TCPKSZ913BV4LCZFN3V1/unsplash-image-kUHfMW8awpE.jpg</image:loc>
      <image:title>Titanium Logo Footer</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/contact-us-kevlar-system-inspector-user</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1680623371336-UFD0H487S6HU25660ER1/unsplash-image-iar-afB0QQw.jpg</image:loc>
      <image:title>Contact Us - Kevlar System Inspector User</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/architecture-security-assessment-breakdown</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/17a68c27-084a-4ac6-a66f-387fa61abadd/Architectural+Scurity+Assessment+Breakdown+Image.jpg</image:loc>
      <image:title>Architecture Security Assessment Breakdown</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/building-security-into-embedded-linux-implementations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/2339c5bf-c65f-4ac8-9aa9-257bee46489b/Building+Security+Into+Cover+Image.jpg</image:loc>
      <image:title>Building Security Into Embedded Linux Implementations Whitepaper</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/system-call-filtering-in-linux-an-unsung-hero</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/80302ea3-9b60-4489-bdd2-3a2c4e5ea265/Syscall+Filtering+Whitepaper.jpg</image:loc>
      <image:title>System Call Filtering in Linux: An Unsung Hero</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/data-protection-with-kevlar-embedded-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f753ee5e-310c-409d-b43f-5d407653c8df/Data+Protection+Whitepaper+Cover+Image.jpg</image:loc>
      <image:title>Data Protection with Kevlar Embedded Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/protecting-unmanned-vehicles-against-battlefield-loss</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-12-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/f0f92d6c-8498-4a48-a35b-2ede79475310/UUV+Whitepaper.jpg</image:loc>
      <image:title>Whitepaper (Protecting Unmanned Vehicles Against Battlefield Loss)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/protecting-ew-platforms</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/be05bb1f-a998-406b-b8f7-6b2ed117957f/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Whitepaper (Protecting EW Platforms)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1731427455564-MJ13Z8OUV91TT3P93FYP/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Whitepaper (Protecting EW Platforms)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/webinar/iot-device-security-conference</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/ae891676-7b27-402d-8b96-dd9dfb8379f4/IoT+DSC.png</image:loc>
      <image:title>IoT Device Security Conference | Embedded Computing Design (Copy) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/8ff31b12-a6ca-4b40-9158-c10bcb9860a1/ecd_footer_logo.png</image:loc>
      <image:title>IoT Device Security Conference | Embedded Computing Design (Copy) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/hardware-vendors-as-security-enablers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/ccb156cb-595a-43fd-bd88-1fe24ace1143/Whitepaper_ProtectingEWPlatforms_CoverImage%281%29.png</image:loc>
      <image:title>Whitepaper (Hardware Vendors as Security Enablers)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735919287886-SB5B75GNFLB0OLMQF681/Hardware+Vendors+Whitepaper+Cover+Image.png</image:loc>
      <image:title>Whitepaper (Hardware Vendors as Security Enablers)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/cra</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918420518-60NPPJNM00LN9F56O7Z6/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepaper (Cyber Resilience Act)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918420518-60NPPJNM00LN9F56O7Z6/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepaper (Cyber Resilience Act)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.starlab.io/whitepaper/secure-your-platform-for-the-cyber-resilience-act</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918420518-60NPPJNM00LN9F56O7Z6/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepaper (Cyber Resilience Act) (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e1f51eb1bb1681137ea90b8/1735918420518-60NPPJNM00LN9F56O7Z6/Cyber+Resilience+Act+Cover+Image+Blur.png</image:loc>
      <image:title>Whitepaper (Cyber Resilience Act) (Copy)</image:title>
    </image:image>
  </url>
</urlset>

