<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.la.nec.com/internet-das-coisas-iot</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/nec-a-infraestrutura-estrategica-que-conecta-a-latam-ao-futuro-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><lastmod>2025-12-16</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologias-aplicadas-a-diferentes-eventos-en-el-espacio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1792735825-1.png</image:loc><image:caption>shutterstock17927358251</image:caption><image:title>shutterstock17927358251</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/como-planejar-e-priorizar-os-investimentos-em-ciberseguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/ciberseguranca-como-a-ia-pode-contribuir-para-um-mundo-mais-seguro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/legislacion-ciberseguridad-datos-sesibles</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2369601435.jpg</image:loc><image:caption>Shutterstock2369601435</image:caption><image:title>Shutterstock2369601435</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-03-26</lastmod></url><url><loc>https://blog.la.nec.com/machine-learning-e-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/porque-o-modelo-de-trabalho-hibrido-e-o-futuro-das-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1194512599.png</image:loc><image:caption>shutterstock1194512599</image:caption><image:title>shutterstock1194512599</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/cibercrime-atua-no-pdv</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/target.png</image:loc><image:caption>target</image:caption><image:title>target</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/1_PDV.png</image:loc><image:caption>1PDV</image:caption><image:title>1PDV</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tabela.png</image:loc><image:caption>tabela</image:caption><image:title>tabela</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/home_depot.png</image:loc><image:caption>homedepot</image:caption><image:title>homedepot</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/csirts-conectados-por-mais-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_6_-_CSIRT_2.jpg</image:loc><image:caption>artigo6CSIRT2</image:caption><image:title>artigo6CSIRT2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/cocriando-inovacao-com-telcos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2261354073.jpg</image:loc><image:caption>Shutterstock2261354073</image:caption><image:title>Shutterstock2261354073</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-10-10</lastmod></url><url><loc>https://blog.la.nec.com/es/gestion-de-patrimonio-digitalizacion-de-la-gestion-patrimonial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1926515411.png</image:loc><image:caption>shutterstock1926515411</image:caption><image:title>shutterstock1926515411</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.la.nec.com/agricultura-digital-como-a-tecnologia-tem-impactado-a-colheita-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_747145174.jpg</image:loc><image:caption>shutterstock747145174</image:caption><image:title>shutterstock747145174</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2022-05-11</lastmod></url><url><loc>https://blog.la.nec.com/ex-funcionarios-ainda-podem-acessar-arquivos-das-empresas-onde-trabalhavam</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/es/governanza-digital-en-las-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/blog-nec-es.jpg</image:loc><image:caption>blogneces</image:caption><image:title>blogneces</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.la.nec.com/5g-como-propulsor-de-receita-das-operadoras-na-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20como%20propulsor%20de%20receita%20das%20operadoras%20na%20Am%C3%A9rica%20Latina.jpg</image:loc><image:caption>5GcomopropulsordereceitadasoperadorasnaAméricaLatina</image:caption><image:title>5GcomopropulsordereceitadasoperadorasnaAméricaLatina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://blog.la.nec.com/es/como-las-smart-cities-estan-transformando-la-vida-urbana</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1219864266%20(1).jpg</image:loc><image:caption>iStock12198642661</image:caption><image:title>iStock12198642661</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://blog.la.nec.com/a-transformacao-do-mundo-low-touch-com-a-biometria</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec_co_2017_personal_112_l.jpg</image:loc><image:caption>necco2017personal112l</image:caption><image:title>necco2017personal112l</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/ciberfalha-humana</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/executivos-da-india-apontam-as-redes-abertas-como-o-melhor-modelo-para-massificar-o-5g-no-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2095605268.jpg</image:loc><image:caption>shutterstock2095605268</image:caption><image:title>shutterstock2095605268</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-de-ti-e-um-exerc%C3%ADcio-de-balanceamento</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/analise-de-seguranca-em-bibliotecas-de-terceiros-pontos-de-seguranca-a-se-considerar-antes-de-utiliza-las</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1727737498.png</image:loc><image:caption>shutterstock1727737498</image:caption><image:title>shutterstock1727737498</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/es/como-la-tecnologia-redefine-la-movilidad-urbana-para-las-ciudades-del-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1503630608%20(1).jpg</image:loc><image:caption>iStock15036306081</image:caption><image:title>iStock15036306081</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-10-29</lastmod></url><url><loc>https://blog.la.nec.com/tendencias-transformacao-digital-para-bancos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2152034201.jpg</image:loc><image:caption>shutterstock2152034201</image:caption><image:title>shutterstock2152034201</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-04-18</lastmod></url><url><loc>https://blog.la.nec.com/es/tokio-fue-un-exitoso-campo-de-pruebas-para-la-tecnologia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1523925506.jpg</image:loc><image:caption>shutterstock1523925506</image:caption><image:title>shutterstock1523925506</image:title></image:image><lastmod>2022-01-21</lastmod></url><url><loc>https://blog.la.nec.com/es/automatizacion-data-centers-reducir-costos-operativos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2026-02-12</lastmod></url><url><loc>https://blog.la.nec.com/automated-compliance-solucao-garantir-seguranca-dados-sensiveis-setor-bancario</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2088740770.jpg</image:loc><image:caption>shutterstock2088740770</image:caption><image:title>shutterstock2088740770</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20servi%C3%A7os%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemserviçosbancários</image:caption><image:title>automaçãoderedeemserviçosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/es/como-la-tecnologia-esta-transformando-la-movilidad-en-las-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia%20e%20mobilidade%20das%20cidades%20inteligentes.jpg</image:loc><image:caption>tecnologiaemobilidadedascidadesinteligentes</image:caption><image:title>tecnologiaemobilidadedascidadesinteligentes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/AD_4nXdJpvkCHHC3QfmnboqxlIcs16jcNs00lMDuiqqyHCyO5qfyzNX9ldtVC3KjvXDjHVFircMms2F-jJdUQmKxrNbITLyK-jJZD061BLKAutPpZWLGCDcnX46x-png.png</image:loc><image:caption>AD4nXdJpvkCHHC3QfmnboqxlIcs16jcNs00lMDuiqqyHCyO5qfyzNX9ldtVC3KjvXDjHVFircMms2FjJdUQmKxrNbITLyKjJZD061BLKAutPpZWLGCDcnX46xpng</image:caption><image:title>AD4nXdJpvkCHHC3QfmnboqxlIcs16jcNs00lMDuiqqyHCyO5qfyzNX9ldtVC3KjvXDjHVFircMms2FjJdUQmKxrNbITLyKjJZD061BLKAutPpZWLGCDcnX46xpng</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-09-17</lastmod></url><url><loc>https://blog.la.nec.com/a-distancia-entre-a-alta-direcao-e-os-desafios-da-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Board-of-directors.jpg</image:loc><image:caption>Boardofdirectors</image:caption><image:title>Boardofdirectors</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/a-mobilidade-urbana-na-era-da-hiperconectividade-e-seus-beneficios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1240838194.png</image:loc><image:caption>shutterstock1240838194</image:caption><image:title>shutterstock1240838194</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2021-04-27</lastmod></url><url><loc>https://blog.la.nec.com/5g-a-melhor-estrategia-para-vencer-a-exclusao-digital-e-a-expansao-territorial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2223906521%20(1).jpg</image:loc><image:caption>iStock22239065211</image:caption><image:title>iStock22239065211</image:title></image:image><lastmod>2025-10-20</lastmod></url><url><loc>https://blog.la.nec.com/full-stack-observability-o-que-e-e-como-pode-beneficiar-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1234148077.jpg</image:loc><image:caption>shutterstock1234148077</image:caption><image:title>shutterstock1234148077</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-08-16</lastmod></url><url><loc>https://blog.la.nec.com/conhecimento-que-vale-ouro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/o-ciclo-de-vida-na-resposta-de-um-incidente-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/incident-resp.jpg</image:loc><image:caption>incidentresp</image:caption><image:title>incidentresp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NIST.png</image:loc><image:caption>NIST</image:caption><image:title>NIST</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/olimp%C3%ADadas-fonte-para-o-cibercrime</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/From-Beijing-Ton-London-1-21.jpg</image:loc><image:caption>FromBeijingTonLondon121</image:caption><image:title>FromBeijingTonLondon121</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Olimpadas.jpg</image:loc><image:caption>Olimpadas</image:caption><image:title>Olimpadas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/seu-fornecedor-possui-certificacao-iso/iec-27001</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/executivo_meditando.jpg</image:loc><image:caption>executivomeditando</image:caption><image:title>executivomeditando</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/uniao-entre-setor-publico-e-privado-para-construir-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2284848389.jpg</image:loc><image:caption>shutterstock2284848389</image:caption><image:title>shutterstock2284848389</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/image-png.png</image:loc><image:caption>imagepng</image:caption><image:title>imagepng</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-05-14</lastmod></url><url><loc>https://blog.la.nec.com/es/la-transformacion-de-la-conectividad-empresarial-el-wi-fi-7-en-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1454998892%20(1).jpg</image:loc><image:caption>iStock14549988921</image:caption><image:title>iStock14549988921</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://blog.la.nec.com/os-pilares-que-sustentam-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-26</lastmod></url><url><loc>https://blog.la.nec.com/criminalidade-e-seus-impactos-financeiros-nos-cofres-publicos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2025-10-09</lastmod></url><url><loc>https://blog.la.nec.com/oito-praticas-de-ciberseguranca-para-aplicacoes-financeiras</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1089540212.jpg</image:loc><image:caption>shutterstock1089540212</image:caption><image:title>shutterstock1089540212</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/futuro-sustentavel-colaboracao-redes-de-dados-abertas-e-vetorizacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/colaborac%CC%A7a%CC%83o%2c%20redes%20de%20dados%20abertas%20e%20vetorizac%CC%A7a%CC%83o%20.jpeg</image:loc><image:caption>colaboracaoredesdedadosabertasevetorizacao</image:caption><image:title>colaboracaoredesdedadosabertasevetorizacao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/telemedicina-os-beneficios-de-um-ecossistema-preparado-para-atendimentos-a-distancia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_697587175.jpg</image:loc><image:caption>shutterstock697587175</image:caption><image:title>shutterstock697587175</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/dns-tunneling-a-zona-turva-do-tr%C3%A1fego-de-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Trfego_de_DNS_Tunneling.png</image:loc><image:caption>TrfegodeDNSTunneling</image:caption><image:title>TrfegodeDNSTunneling</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/rede.jpg</image:loc><image:caption>rede</image:caption><image:title>rede</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/testes_executados_por_Lenny_Zeltser.png</image:loc><image:caption>testesexecutadosporLennyZeltser</image:caption><image:title>testesexecutadosporLennyZeltser</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/datacenter-in-a-box</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1282709413.jpg</image:loc><image:caption>shutterstock1282709413</image:caption><image:title>shutterstock1282709413</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/analise-sistematica-de-dados-vai-ajudar-copenhagen-a-zerar-emissoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ana%CC%81lise%20sistema%CC%81tica%20de%20dados.jpg</image:loc><image:caption>analisesistematicadedados</image:caption><image:title>analisesistematicadedados</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/postura-de-seguranca-da-informacao-ao-utilizar-baas-ou-faas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/importancia-da-digitalizacao-das-instituicoes-publicas-alinhada-as-necessidades-dos-cidadaos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1161254992.jpg</image:loc><image:caption>shutterstock1161254992</image:caption><image:title>shutterstock1161254992</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/innovacion-con-las-telcos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2145858771.jpg</image:loc><image:caption>Shutterstock2145858771</image:caption><image:title>Shutterstock2145858771</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/es/open-banking-ecossistema-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2253202935.jpg</image:loc><image:caption>Shutterstock2253202935</image:caption><image:title>Shutterstock2253202935</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-06-19</lastmod></url><url><loc>https://blog.la.nec.com/wannacry-e-a-segunda-onda</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/automacao-data-centers-reduzir-custos-operacionais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><lastmod>2026-02-12</lastmod></url><url><loc>https://blog.la.nec.com/jornada-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/virtualizacao-cuidados-de-si</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/ia-transforma-operacoes-de-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/intelig%C3%AAncia%20artificial%20nas%20opera%C3%A7%C3%B5es%20de%20rede.jpg</image:loc><image:caption>inteligênciaartificialnasoperaçõesderede</image:caption><image:title>inteligênciaartificialnasoperaçõesderede</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/e-preciso-integrar-as-areas-de-seguranca-da-informacao-rh-e-compliance</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/20200214_1022631310.jpg</image:loc><image:caption>202002141022631310</image:caption><image:title>202002141022631310</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/quanto-valem-os-dados-da-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/amea%C3%A7as-a-protecao-dos-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/As%20principais%20amea%C3%A7as%20%C3%A0%20prote%C3%A7%C3%A3o%20dos%20dados.jpg</image:loc><image:caption>Asprincipaisameaçasàproteçãodosdados</image:caption><image:title>Asprincipaisameaçasàproteçãodosdados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/ia-esg-novas-ferramentas-e-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><lastmod>2024-05-07</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-digital-o-que-e-preciso-saber-sobre-o-zero-day</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/atuacao-da-nec-no-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/solu%C3%A7%C3%B5es%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>soluçõesNECparasetorfinanceiro</image:caption><image:title>soluçõesNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/es/la-aplicacion-de-la-ia-en-los-procesos-de-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-09-04</lastmod></url><url><loc>https://blog.la.nec.com/es/riesgos-de-no-mejorar-la-seguridad-de-los-datos-en-los-bancos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/vulnerabilidade%20em%20seguran%C3%A7a%20de%20dados%20banc%C3%A1rios.jpg</image:loc><image:caption>vulnerabilidadeemsegurançadedadosbancários</image:caption><image:title>vulnerabilidadeemsegurançadedadosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-04-09</lastmod></url><url><loc>https://blog.la.nec.com/10-dicas-para-melhorar-sua-privacidade-online</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/nec-visionary-week-uma-nova-e-ousada-perspectiva-para-uma-sociedade-orientada-para-o-dx</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1091848223.jpg</image:loc><image:caption>shutterstock1091848223</image:caption><image:title>shutterstock1091848223</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/es/escalabilidad-e-innovaci%C3%B3n-para-los-servicios-bancarios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20servi%C3%A7os%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemserviçosbancários</image:caption><image:title>automaçãoderedeemserviçosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/escalabilidade%20automatizada%20em%20setor%20banc%C3%A1rio.jpg</image:loc><image:caption>escalabilidadeautomatizadaemsetorbancário</image:caption><image:title>escalabilidadeautomatizadaemsetorbancário</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-02-04</lastmod></url><url><loc>https://blog.la.nec.com/impacto-observabilidade-aplicada-mundo-etp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1682713504.jpg</image:loc><image:caption>shutterstock1682713504</image:caption><image:title>shutterstock1682713504</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-10-02</lastmod></url><url><loc>https://blog.la.nec.com/como-a-inteligencia-artificial-se-tornou-aliada-no-combate-as-minas-terrestres</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2169743925.jpg</image:loc><image:caption>shutterstock2169743925</image:caption><image:title>shutterstock2169743925</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-06-02</lastmod></url><url><loc>https://blog.la.nec.com/5-situacoes-em-que-o-5g-ira-aprimorar-os-processos-do-setor-de-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1501365494.jpg</image:loc><image:caption>shutterstock1501365494</image:caption><image:title>shutterstock1501365494</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/qual-o-orcamento-ideal-para-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/como-5g-apoia-a-atualizacao-dos-servicos-financeiros</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_653538925.png</image:loc><image:caption>shutterstock653538925</image:caption><image:title>shutterstock653538925</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://blog.la.nec.com/es/innovacion-robotica-el-uso-de-la-tecnologia-con-inteligencia-artificial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1987497002-1.jpg</image:loc><image:caption>shutterstock19874970021</image:caption><image:title>shutterstock19874970021</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/ciberseguranca-no-setor-bancario-por-que-uma-prioridade-e-como-se-prevenir</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_517900255.jpg</image:loc><image:caption>shutterstock517900255</image:caption><image:title>shutterstock517900255</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://blog.la.nec.com/como-o-open-finance-garante-controle-de-dados-financeiros-aos-clientes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2006036159.jpg</image:loc><image:caption>shutterstock2006036159</image:caption><image:title>shutterstock2006036159</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-08-02</lastmod></url><url><loc>https://blog.la.nec.com/tres-problemas-urbanos-que-cidades-inteligentes-ajudam-a-solucionar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2032995323.jpg</image:loc><image:caption>shutterstock2032995323</image:caption><image:title>shutterstock2032995323</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/por-que-fazer-uma-analise-de-risco</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/porque%20fazer%20analise%20de%20risco.jpg</image:loc><image:caption>porquefazeranalisederisco</image:caption><image:title>porquefazeranalisederisco</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/servicios-gestionados-ti</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/servicos-gerenciados.png</image:loc><image:caption>servicosgerenciados</image:caption><image:title>servicosgerenciados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-07-05</lastmod></url><url><loc>https://blog.la.nec.com/como-os-servicos-biometricos-aumentam-a-eficiencia-bancaria-em-um-mundo-pos-covid-19</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/sp_visual-1.png</image:loc><image:caption>spvisual1</image:caption><image:title>spvisual1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/plataforma-integracao-e-orquestracao-citysensai</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><lastmod>2024-04-23</lastmod></url><url><loc>https://blog.la.nec.com/aprendendo-com-os-incidentes-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/bicicleta.jpg</image:loc><image:caption>bicicleta</image:caption><image:title>bicicleta</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/patrimonio-herdeiro-millennial-alavanca-digitalizacao-da-gestao-de-patrimonio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1926515411.png</image:loc><image:caption>shutterstock1926515411</image:caption><image:title>shutterstock1926515411</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/devo-me-preocupar-com-a-seguranca-das-apis</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Devo%20me%20preocupar%20com%20a%20seguran%C3%A7a%20das%20APIs.jpg</image:loc><image:caption>DevomepreocuparcomasegurançadasAPIs</image:caption><image:title>DevomepreocuparcomasegurançadasAPIs</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-11</lastmod></url><url><loc>https://blog.la.nec.com/ciclo-de-vida-de-uma-vulnerabilidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/protecao-e-ciberseguranca-desafios-e-solucoes-para-o-mundo-hibrido</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2124172223.jpg</image:loc><image:caption>shutterstock2124172223</image:caption><image:title>shutterstock2124172223</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/caminhos-tornar-os-centros-urbanos-brasileiros-mais-eficientes-sustentaveis</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2238834443.jpg</image:loc><image:caption>shutterstock2238834443</image:caption><image:title>shutterstock2238834443</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-10-30</lastmod></url><url><loc>https://blog.la.nec.com/rastreando-usuarios-em-dominios-windows-parte-2</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/datacenter-edge-e-infraestrutura-de-ti-e-telecomunicacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/infraestrutura-5G-artigo.jpg</image:loc><image:caption>infraestrutura5Gartigo</image:caption><image:title>infraestrutura5Gartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://blog.la.nec.com/o-office-365-e-suscetivel-a-ataques-digitais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/qual-e-o-custo-de-uma-violacao-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/para-controlar-o-futuro-e-preciso-cria-lo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/as-ameacas-sao-dinamicas-e-os-velhos-habitos-persistentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/ntt-e-nec-se-unem-para-estruturar-redes-5g-avancadas-e-construir-um-futuro-digital-inovador-e-colaborativo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(11).png</image:loc><image:caption>Designsemnome11</image:caption><image:title>Designsemnome11</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/visibilidade-%C3%A9-poder-contra-atacando-o-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/cryptxxx-ransomware.jpg</image:loc><image:caption>cryptxxxransomware</image:caption><image:title>cryptxxxransomware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/es/impacto-del-5g-en-los-modelos-de-negocio-del-sector-de-las-telecomunicaciones</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/O%20impacto%20do%205G%20nos%20modelos%20de%20neg%C3%B3cio%20de%20todo%20o%20setor%20das%20telecomunica%C3%A7%C3%B5es.jpg</image:loc><image:caption>Oimpactodo5Gnosmodelosdenegóciodetodoosetordastelecomunicações</image:caption><image:title>Oimpactodo5Gnosmodelosdenegóciodetodoosetordastelecomunicações</image:title></image:image><lastmod>2025-03-11</lastmod></url><url><loc>https://blog.la.nec.com/o-peso-de-contar-com-especialistas-para-desenvolver-o-data-center-de-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/infraestrutura-5G-artigo.jpg</image:loc><image:caption>infraestrutura5Gartigo</image:caption><image:title>infraestrutura5Gartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Op%C3%A7%C3%A3o%201.jpg</image:loc><image:caption>Opção1</image:caption><image:title>Opção1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-03-16</lastmod></url><url><loc>https://blog.la.nec.com/tendencias-de-iot-para-o-mercado-corporativo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/zero-trust-network-access-protecao-multicamadas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1968876043%20(1).jpg</image:loc><image:caption>Shutterstock19688760431</image:caption><image:title>Shutterstock19688760431</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/a-caca-de-talentos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/riscos-de-nao-aprimorar-seguranca-de-dados-em-bancos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/vulnerabilidade%20em%20seguran%C3%A7a%20de%20dados%20banc%C3%A1rios.jpg</image:loc><image:caption>vulnerabilidadeemsegurançadedadosbancários</image:caption><image:title>vulnerabilidadeemsegurançadedadosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><lastmod>2025-03-18</lastmod></url><url><loc>https://blog.la.nec.com/home-office-como-manter-a-seguranca-de-seus-dados-trabalhando-em-casa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-05-15</lastmod></url><url><loc>https://blog.la.nec.com/como-a-nec-reduz-os-riscos-na-nuvem-em-50-com-a-netscout</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/nao-seja-a-proxima-v%C3%ADtima</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/meu-projeto-esta-um-caos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/es/nec-construyendo-el-futuro-de-las-telecomunicaciones</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1431418019.jpg</image:loc><image:caption>Shutterstock1431418019</image:caption><image:title>Shutterstock1431418019</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/e-para-se-preocupar-com-o-projeto-quando-ele-nao-mais-existir</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.la.nec.com/es/cidades-inteligentes-desafios-movilidad-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC_CON_Blog_DGDF_M%C3%AAs_05_%20Artigo%20%2302%20ES.png</image:loc><image:caption>NECCONBlogDGDFMês05Artigo02ES</image:caption><image:title>NECCONBlogDGDFMês05Artigo02ES</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2164483246%20(1).jpg</image:loc><image:caption>iStock21644832461</image:caption><image:title>iStock21644832461</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-07-03</lastmod></url><url><loc>https://blog.la.nec.com/security-by-design-como-fornecer-produtos-e-servicos-seguros-e-protegidos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/ids-e-ips-protecoes-contra-intrusao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/governanca-digital-nas-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/blog-nec-pt.jpg</image:loc><image:caption>blognecpt</image:caption><image:title>blognecpt</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.la.nec.com/hackers-nao-brincam-em-servico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/figura7.jpg</image:loc><image:caption>figura7</image:caption><image:title>figura7</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/hackers%20n%C3%A3o%20brincam%20em%20servi%C3%A7o.jpg</image:loc><image:caption>hackersnãobrincamemserviço</image:caption><image:title>hackersnãobrincamemserviço</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/clientes-e-provedores-de-outsourcing-uma-partida-de-poquer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/poker3-blog.jpg</image:loc><image:caption>poker3blog</image:caption><image:title>poker3blog</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/cidades-inteligentes-tecnologia-promove-qualidade-vida-sociedade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1203798238.jpg</image:loc><image:caption>shutterstock1203798238</image:caption><image:title>shutterstock1203798238</image:title></image:image><lastmod>2023-08-08</lastmod></url><url><loc>https://blog.la.nec.com/ganhadores-das-eleicoes-2016</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/eleies.jpg</image:loc><image:caption>eleies</image:caption><image:title>eleies</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/a-aceleracao-da-transformacao-digital-industrias-e-sociedades-mais-brilhantes-conectadas-pelo-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731868796.png</image:loc><image:caption>google1594731868796</image:caption><image:title>google1594731868796</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731888371.png</image:loc><image:caption>google1594731888371</image:caption><image:title>google1594731888371</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731868796-1.png</image:loc><image:caption>google15947318687961</image:caption><image:title>google15947318687961</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731868797-1.png</image:loc><image:caption>google15947318687971</image:caption><image:title>google15947318687971</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/sp_visual.png</image:loc><image:caption>spvisual</image:caption><image:title>spvisual</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731868796-2.png</image:loc><image:caption>google15947318687962</image:caption><image:title>google15947318687962</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rich%20Text%20Pasting/google-1594731868797.png</image:loc><image:caption>google1594731868797</image:caption><image:title>google1594731868797</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/roubo-de-identidade-principal-crime-de-violacao-de-dados-do-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/os-desafios-enfrentados-pelos-orgaos-publicos-para-proteger-seus-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Os_desafios_enfrentados_pelos_rgos_pblicos_para_proteger_seus_dados.jpg</image:loc><image:caption>Osdesafiosenfrentadospelosrgospblicosparaprotegerseusdados</image:caption><image:title>Osdesafiosenfrentadospelosrgospblicosparaprotegerseusdados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/tecnologias-low-touch-no-varejo-redesenhando-a-experiencia-do-consumidor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1478264060.jpg</image:loc><image:caption>shutterstock1478264060</image:caption><image:title>shutterstock1478264060</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/quando-o-virtual-patching-e-recomendado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/como-economizar-energia-com-iluminacao-publica-inteligente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ilumina%C3%A7%C3%A3o%20p%C3%BAblica%20inteligente.jpg</image:loc><image:caption>Iluminaçãopúblicainteligente</image:caption><image:title>Iluminaçãopúblicainteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1445614323.jpg</image:loc><image:caption>iStock1445614323</image:caption><image:title>iStock1445614323</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-03-21</lastmod></url><url><loc>https://blog.la.nec.com/es/movilidad-inteligente-como-la-ia-reduce-accidentes-y-automatiza-la-deteccion-de-infracciones-de-transito</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/autonomous-vehicles-data-visualizations-are-crucial-smart-cities-urban-life-improvement-aig62.jpg</image:loc><image:caption>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:caption><image:title>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://blog.la.nec.com/a-base-da-seguran%C3%A7a-esta-em-uma-boa-infraestrutura</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo%20raul.jpg</image:loc><image:caption>artigoraul</image:caption><image:title>artigoraul</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/sistemas-legados-de-bancos-como-a-nuvem-amplia-as-possibilidades-do-setor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_137255093.png</image:loc><image:caption>shutterstock137255093</image:caption><image:title>shutterstock137255093</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-10-26</lastmod></url><url><loc>https://blog.la.nec.com/ciberataques-saiba-quanto-sua-empresa-j%C3%A1-pode-ter-perdido</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data_breach1.jpg</image:loc><image:caption>databreach1</image:caption><image:title>databreach1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ciberataques1.png</image:loc><image:caption>ciberataques1</image:caption><image:title>ciberataques1</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/navegando-com-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/colaborador-voc%C3%AA-cuida-das-informacoes-da-sua-empresa-</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/a-nuvem-como-catalisador-de-um-futuro-mais-din%C3%A2mico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_265202639.jpg</image:loc><image:caption>shutterstock265202639</image:caption><image:title>shutterstock265202639</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/leis-de-privacidade-para-onde-estamos-indo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Privacidade.png</image:loc><image:caption>Privacidade</image:caption><image:title>Privacidade</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/es/ia-transforma-operaciones-de-red</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/inteligencia%20artificial%20en%20las%20operaciones%20de%20red.jpg</image:loc><image:caption>inteligenciaartificialenlasoperacionesdered</image:caption><image:title>inteligenciaartificialenlasoperacionesdered</image:title></image:image><lastmod>2024-12-10</lastmod></url><url><loc>https://blog.la.nec.com/certificacoes-de-seguran%C3%A7a-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/laptop.jpg</image:loc><image:caption>laptop</image:caption><image:title>laptop</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/respostas-a-incidentes-o-que-fazer-e-avaliar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/6-motivos-para-contratar-um-servico-de-monitoracao-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/sua-empresa-precisa-gerenciar-as-vulnerabilidades-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/download-do-vingadores-ultimato-nao-tao-rapido</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/o-perigo-dos-e-mails-de-resposta-automatica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/esg-smart-cities</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><lastmod>2023-09-19</lastmod></url><url><loc>https://blog.la.nec.com/prevenindo-a-perda-dos-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Prevenindo%20a%20perda%20de%20dados.jpg</image:loc><image:caption>Prevenindoaperdadedados</image:caption><image:title>Prevenindoaperdadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/entendendo-a-observabilidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2287185557.jpg</image:loc><image:caption>Shutterstock2287185557</image:caption><image:title>Shutterstock2287185557</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/ti-e-si-investimentos-obrigatorios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/redes-de-transporte-abertas-de-ponta-a-ponta-na-era-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1408227566.jpg</image:loc><image:caption>shutterstock1408227566</image:caption><image:title>shutterstock1408227566</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><lastmod>2022-06-07</lastmod></url><url><loc>https://blog.la.nec.com/autenticacao-de-usuario-um-mundo-alem-de-senhas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/inteligencia-artificial-no-mundo-de-finan%C3%A7as-e-biometria</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Intelig%C3%AAncia%20artificial%20no%20mundo%20de%20finan%C3%A7as%20e%20biometria.jpg</image:loc><image:caption>Inteligênciaartificialnomundodefinançasebiometria</image:caption><image:title>Inteligênciaartificialnomundodefinançasebiometria</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-23</lastmod></url><url><loc>https://blog.la.nec.com/a-dura-realidade-das-violacoes-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/cybersecurity-summer-bootcamp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/aeroporto-japones-quer-embarque-touchless-em-todos-os-voos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1456783511.png</image:loc><image:caption>shutterstock1456783511</image:caption><image:title>shutterstock1456783511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/ciber-guerra</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-desenvolvimento-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1135913801.jpg</image:loc><image:caption>Shutterstock1135913801</image:caption><image:title>Shutterstock1135913801</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-10-24</lastmod></url><url><loc>https://blog.la.nec.com/seja-diligente-e-planeje-o-or%C3%A7amento-contra-ataques-cibern%C3%A9ticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Seja%20diligente%20e%20planeje%20o%20or%C3%A7amento%20contra%20ataques%20cibern%C3%A9ticos.jpg</image:loc><image:caption>Sejadiligenteeplanejeoorçamentocontraataquescibernéticos</image:caption><image:title>Sejadiligenteeplanejeoorçamentocontraataquescibernéticos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/a-dificil-arte-de-ser-cio-e-manter-a-seguranca-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/atelier-dsi-devient-un-catalyseur-post-digital.jpg</image:loc><image:caption>atelierdsidevientuncatalyseurpostdigital</image:caption><image:title>atelierdsidevientuncatalyseurpostdigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/2014-03-28-ExceptionalCIO.png</image:loc><image:caption>20140328ExceptionalCIO</image:caption><image:title>20140328ExceptionalCIO</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/dia-da-internet-segura-conscientizar-e-preciso</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/como-uma-unica-conta-de-e-mail-pode-gerar-perdas-financeiras</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/E-mail_Original.jpg</image:loc><image:caption>EmailOriginal</image:caption><image:title>EmailOriginal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/esquema.jpg</image:loc><image:caption>esquema</image:caption><image:title>esquema</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/arquitetura-e-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/arquitetura_e_segurana_da_informao_2.jpg</image:loc><image:caption>arquiteturaeseguranadainformao2</image:caption><image:title>arquiteturaeseguranadainformao2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/o-conceito-do-porco-espinho</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/porco-espinho2.jpg</image:loc><image:caption>porcoespinho2</image:caption><image:title>porcoespinho2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_elaine1.png</image:loc><image:caption>artigoelaine1</image:caption><image:title>artigoelaine1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/computacao-de-alta-performance-aceleradora-pesquisa-inovacao-cientifica-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_644409295.jpg</image:loc><image:caption>shutterstock644409295</image:caption><image:title>shutterstock644409295</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><lastmod>2023-06-02</lastmod></url><url><loc>https://blog.la.nec.com/assegure-projetos-seguros</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/a-tempestade-perfeita</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/smart-scann-neonatal-solucao-nec</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-img-1-1.png</image:loc><image:caption>necimg11</image:caption><image:title>necimg11</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475.jpg</image:loc><image:caption>shutterstock2304284475</image:caption><image:title>shutterstock2304284475</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1968250909.jpg</image:loc><image:caption>Shutterstock1968250909</image:caption><image:title>Shutterstock1968250909</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-img-2.png</image:loc><image:caption>necimg2</image:caption><image:title>necimg2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2117396804.jpg</image:loc><image:caption>Shutterstock2117396804</image:caption><image:title>Shutterstock2117396804</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://blog.la.nec.com/quando-uma-empresa-est%C3%A1-mais-propensa-a-ciberataques</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/time.jpeg</image:loc><image:caption>time</image:caption><image:title>time</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/resposta-a-incidentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/12-dicas-para-a-black-friday</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/BlackFriday01.jpg</image:loc><image:caption>BlackFriday01</image:caption><image:title>BlackFriday01</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/d%C3%BAvidas-sobre-seguran%C3%A7a-pergunte-ao-especialista-parte-2</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/es/integracion-de-datos-elevando-la-salud-a-un-nuevo-nivel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2026-01-22</lastmod></url><url><loc>https://blog.la.nec.com/por_tras_da_seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/por_tras_da_seguranca_SI.jpg</image:loc><image:caption>portrasdasegurancaSI</image:caption><image:title>portrasdasegurancaSI</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/coalizao-quer-desenvolver-vacina-da-proxima-pandemia-em-100-dias</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1791139418.jpg</image:loc><image:caption>shutterstock1791139418</image:caption><image:title>shutterstock1791139418</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/siem-dado-nao-e-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/SIEM_dado_no__informao.jpg</image:loc><image:caption>SIEMdadonoinformao</image:caption><image:title>SIEMdadonoinformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/fundacao-de-bill-gates-busca-inovacao-para-zerar-deficit-vacinal-em-paises-pobres</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(12).png</image:loc><image:caption>Designsemnome12</image:caption><image:title>Designsemnome12</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-hospitais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ind%C3%BAstria-e-agroneg%C3%B3cio.jpg</image:loc><image:caption>Indústriaeagronegócio</image:caption><image:title>Indústriaeagronegócio</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1919699384.jpg</image:loc><image:caption>shutterstock1919699384</image:caption><image:title>shutterstock1919699384</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2309189217.jpg</image:loc><image:caption>Shutterstock2309189217</image:caption><image:title>Shutterstock2309189217</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1569043051.jpg</image:loc><image:caption>shutterstock1569043051</image:caption><image:title>shutterstock1569043051</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/sua-rede-esta-vulneravel-saiba-como-responder-a-essa-pergunta-e-previna-se</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Sua-rede-esta-vulneravel-saiba-como-responder-a-essa-pergunta-e-previna-se.jpg</image:loc><image:caption>Suaredeestavulneravelsaibacomoresponderaessaperguntaeprevinase</image:caption><image:title>Suaredeestavulneravelsaibacomoresponderaessaperguntaeprevinase</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/nuvem-container-e-serverless-como-aplicar-essas-tecnologias-em-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-26</lastmod></url><url><loc>https://blog.la.nec.com/de-graca-nem-injecao-na-testa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-voce-vai-ser-a-proxima-vitima</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ransomware%20voc%C3%AA%20vai%20ser%20a%20pr%C3%B3xima%20v%C3%ADtima.png</image:loc><image:caption>Ransomwarevocêvaiserapróximavítima</image:caption><image:title>Ransomwarevocêvaiserapróximavítima</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/brasil-e-lider-em-rede-de-bot-multifuncional</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/entendendo-o-conceito-esg-e-as-vantagens-da-sua-aplicacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Entendendo%20o%20conceito%20ESG%20e%20as%20vantagens%20da%20sua%20aplica%C3%A7%C3%A3o.jpg</image:loc><image:caption>EntendendooconceitoESGeasvantagensdasuaaplicação</image:caption><image:title>EntendendooconceitoESGeasvantagensdasuaaplicação</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/razoes-ctos-investem-na-biometria-no-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2338846971.png</image:loc><image:caption>Shutterstock2338846971</image:caption><image:title>Shutterstock2338846971</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/parece-ate-ficcao-cientifica-mas-nao-e</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/como-o-open-ran-apoia-melhorias-em-estrutura-de-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_725365642.jpg</image:loc><image:caption>shutterstock725365642</image:caption><image:title>shutterstock725365642</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/tecnicamente-tudo-sobre-o-maior-ataque-de-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/ciberseguranca-para-atrair-investimentos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-a-ameaca-que-nao-para-de-evoluir</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ransomware3.jpg</image:loc><image:caption>ransomware3</image:caption><image:title>ransomware3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologia-en-japon-los-turistas-realizan-pagos-con-solo-mostrar-la-cara</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1414761095.jpg</image:loc><image:caption>shutterstock1414761095</image:caption><image:title>shutterstock1414761095</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.la.nec.com/servicos-gerenciados-apoiam-ambientes-complexos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/servicos-gerenciados.png</image:loc><image:caption>servicosgerenciados</image:caption><image:title>servicosgerenciados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-07-03</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-de-dados-prioridades-cisos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/prioridades%20do%20CISO%20para%20a%20seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>prioridadesdoCISOparaasegurançadedados</image:caption><image:title>prioridadesdoCISOparaasegurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://blog.la.nec.com/es/nec-desempeno-en-el-sector-financiero</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/solu%C3%A7%C3%B5es%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>soluçõesNECparasetorfinanceiro</image:caption><image:title>soluçõesNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-09-05</lastmod></url><url><loc>https://blog.la.nec.com/ajudar-operadoras-a-embarcar-em-jornada-open-ran-e-liberar-o-potencial-do-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1928082863.jpg</image:loc><image:caption>shutterstock1928082863</image:caption><image:title>shutterstock1928082863</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2022-04-19</lastmod></url><url><loc>https://blog.la.nec.com/3-oportunidades-que-o-5g-expandir%C3%A1-no-agroneg%C3%B3cio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1569043051.jpg</image:loc><image:caption>shutterstock1569043051</image:caption><image:title>shutterstock1569043051</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-de-dados-os-principios-essenciais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Jun_04.jpg</image:loc><image:caption>Jun04</image:caption><image:title>Jun04</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/como-as-cidades-inteligentes-est%C3%A3o-transformando-a-vida-urbana</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1284842668%20(1).jpg</image:loc><image:caption>iStock12848426681</image:caption><image:title>iStock12848426681</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><lastmod>2025-07-15</lastmod></url><url><loc>https://blog.la.nec.com/es/uso-estrategico-de-datos-en-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2037557162%20-%20c%C3%B3pia%202.png</image:loc><image:caption>Shutterstock2037557162cópia2</image:caption><image:title>Shutterstock2037557162cópia2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-06-13</lastmod></url><url><loc>https://blog.la.nec.com/bitcoin-vilao-ou-heroi</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/golpe-sobre-imposto-de-renda-e-grande-atrativo-para-hackers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/calendario-de-phishing</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/phishingdsd.jpg</image:loc><image:caption>phishingdsd</image:caption><image:title>phishingdsd</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/torne-sua-rede-mais-segura-com-um-filtro-web</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/busca-por-eficiencia-levou-dinamarca-a-ter-setor-publico-mais-digital-do-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(13).png</image:loc><image:caption>Designsemnome13</image:caption><image:title>Designsemnome13</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/montando-o-futuro-das-redes-com-a-automacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_769705507%20(2).jpg</image:loc><image:caption>Shutterstock7697055072</image:caption><image:title>Shutterstock7697055072</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://blog.la.nec.com/a-revolucao-da-rede-5g-e-seu-impacto-na-ciberseguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/black-friday-garanta-a-seguran%C3%A7a-da-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/BlackFriday02.jpg</image:loc><image:caption>BlackFriday02</image:caption><image:title>BlackFriday02</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/open-banking-ecossistema-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2253202935.jpg</image:loc><image:caption>Shutterstock2253202935</image:caption><image:title>Shutterstock2253202935</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.la.nec.com/threat-hunting-aberta-a-temporada-de-caca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/as-pistas-em-uma-batalha-cibernetica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/As%20pistas%20em%20uma%20batalha%20cibern%C3%A9tica.jpg</image:loc><image:caption>Aspistasemumabatalhacibernética</image:caption><image:title>Aspistasemumabatalhacibernética</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/a-ficha-tecnica-do-ransomware-petya</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/vulnerabilidade-no-remote-desktop-services-permite-acesso-remoto-a-ofensor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/as-etapas-de-um-ataque-hacker</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/hacker%20etapas.jpg</image:loc><image:caption>hackeretapas</image:caption><image:title>hackeretapas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/es/movilidad-y-transacciones-digitales-redes-resilientes-moldean-el-futuro-de-los-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico-1.jpg</image:loc><image:caption>representacaoconceitocensodemografico1</image:caption><image:title>representacaoconceitocensodemografico1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://blog.la.nec.com/se-uma-ameaca-gera-perdas-a-empresa-qual-e-a-responsabilidade-do-cio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/impactos-financieros-estrat%C3%A9gicos-de-la-no-automatizaci%C3%B3n-de-las-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://blog.la.nec.com/8-motivos-para-terceirizar-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/8_motivos_para_terceirizar_a_segurana_da_informao.jpg</image:loc><image:caption>8motivosparaterceirizaraseguranadainformao</image:caption><image:title>8motivosparaterceirizaraseguranadainformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/def-con-26</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/como-as-telcos-utilizarao-o-5g-para-aprimorar-seus-servicos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1514400755.png</image:loc><image:caption>shutterstock1514400755</image:caption><image:title>shutterstock1514400755</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://blog.la.nec.com/razoes-para-se-investir-adequadamente-em-si</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/momentodigitaldosbancos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(1).png</image:loc><image:caption>Designsemnome1</image:caption><image:title>Designsemnome1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/escalabilidade-e-inovacao-para-servicos-bancarios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20servi%C3%A7os%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemserviçosbancários</image:caption><image:title>automaçãoderedeemserviçosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/escalabilidade%20automatizada%20em%20setor%20banc%C3%A1rio.jpg</image:loc><image:caption>escalabilidadeautomatizadaemsetorbancário</image:caption><image:title>escalabilidadeautomatizadaemsetorbancário</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><lastmod>2025-02-04</lastmod></url><url><loc>https://blog.la.nec.com/pix-o-uso-de-tecnologia-contactless-no-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1837870159.jpg</image:loc><image:caption>shutterstock1837870159</image:caption><image:title>shutterstock1837870159</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://blog.la.nec.com/arquitetura-serverless-o-que-e-e-como-pode-beneficiar-o-seu-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/como-gerar-threat-intelligence</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/voce-utiliza-as-redes-sociais-com-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/servicos-gerenciados-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/segurana_da_informa.jpg</image:loc><image:caption>seguranadainforma</image:caption><image:title>seguranadainforma</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/docker-for-security</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/servicos-compartilhados-de-cyber-security-um-novo-paradigma-a-ser-avaliado-pelos-cios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/tecnologias-touchless-a-uniao-da-seguranca-com-experiencias-personalizadas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1456783511.jpg</image:loc><image:caption>shutterstock1456783511</image:caption><image:title>shutterstock1456783511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/sonda-espacial-japonesa-volta-a-terra-para-deixar-amostra-de-asteroide-e-sai-em-nova-missao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2253202935.jpg</image:loc><image:caption>Shutterstock2253202935</image:caption><image:title>Shutterstock2253202935</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Aster12.jpg</image:loc><image:caption>Aster12</image:caption><image:title>Aster12</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/usos-biometria-espacos-publicos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_573425479.jpg</image:loc><image:caption>shutterstock573425479</image:caption><image:title>shutterstock573425479</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-10-03</lastmod></url><url><loc>https://blog.la.nec.com/database-firewall</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/desafios-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-%C3%A0-frente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Relatrio_Trend_Submundo_Brasileiro.jpg</image:loc><image:caption>RelatrioTrendSubmundoBrasileiro</image:caption><image:title>RelatrioTrendSubmundoBrasileiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/gdpr-e-hoje-e-agora</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/cio-a-peca-chave-na-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_7_-_CIO_a_pea_chave_em_SI-post.jpg</image:loc><image:caption>artigo7CIOapeachaveemSIpost</image:caption><image:title>artigo7CIOapeachaveemSIpost</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/a-importancia-da-certificacao-iso/iec-27001-para-uma-organizacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ISO-27001.jpg</image:loc><image:caption>ISO27001</image:caption><image:title>ISO27001</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/BSI-Assurance-Mark-ISO-27001-KEYB.jpg</image:loc><image:caption>BSIAssuranceMarkISO27001KEYB</image:caption><image:title>BSIAssuranceMarkISO27001KEYB</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/o-impacto-da-covid-19-e-as-tecnologias-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/covid19_main_pc.png</image:loc><image:caption>covid19mainpc</image:caption><image:title>covid19mainpc</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/o-que-esta-em-jogo-quando-a-seguranca-nao-e-integrada-ao-processo-de-desenvolvimento</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_760454356.jpg</image:loc><image:caption>shutterstock760454356</image:caption><image:title>shutterstock760454356</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-04-22</lastmod></url><url><loc>https://blog.la.nec.com/como-a-tecnologia-redefine-a-mobilidade-urbana-para-as-cidades-do-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1503630608%20(1).jpg</image:loc><image:caption>iStock15036306081</image:caption><image:title>iStock15036306081</image:title></image:image><lastmod>2025-10-29</lastmod></url><url><loc>https://blog.la.nec.com/e-hora-de-darmos-boas-vindas-a-lei-de-prote%C3%A7%C3%A3o-de-dados-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/como-usar-o-threat-intelligence-a-seu-favor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/data-security-priorities-accurate</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/prioridades%20del%20CISO%20en%20materia%20de%20seguridad%20de%20datos.jpg</image:loc><image:caption>prioridadesdelCISOenmateriadeseguridaddedatos</image:caption><image:title>prioridadesdelCISOenmateriadeseguridaddedatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://blog.la.nec.com/e-no-inicio-tudo-eram-trevas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2019-02-04</lastmod></url><url><loc>https://blog.la.nec.com/a-aplicacao-da-ia-nos-processos-de-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-09-04</lastmod></url><url><loc>https://blog.la.nec.com/o-desafio-de-se-ter-um-soc</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-publica-tecnologia-cidades-latinoamericanas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1765563070%20(1).jpg</image:loc><image:caption>iStock17655630701</image:caption><image:title>iStock17655630701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ParadaSeguraMinima.jpg</image:loc><image:caption>ParadaSeguraMinima</image:caption><image:title>ParadaSeguraMinima</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://blog.la.nec.com/citysensai-investimento-em-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1409136751%20(1).jpg</image:loc><image:caption>iStock14091367511</image:caption><image:title>iStock14091367511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2163547048%20(2).jpg</image:loc><image:caption>iStock21635470482</image:caption><image:title>iStock21635470482</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imagem-artigo-citysensai.jpg</image:loc><image:caption>imagemartigocitysensai</image:caption><image:title>imagemartigocitysensai</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico.jpg</image:loc><image:caption>representacaoconceitocensodemografico</image:caption><image:title>representacaoconceitocensodemografico</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-08-25</lastmod></url><url><loc>https://blog.la.nec.com/es/identificacion-digital-usos-biometria-en-publico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec.png</image:loc><image:caption>nec</image:caption><image:title>nec</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-10-10</lastmod></url><url><loc>https://blog.la.nec.com/virtual-patching-seu-importante-aliado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/servicos-governamentais-digitais-precisam-conquistar-a-confianca-e-maior-adesao-dos-cidadaos-para-crescer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_644191906.jpg</image:loc><image:caption>shutterstock644191906</image:caption><image:title>shutterstock644191906</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/como-saber-se-sua-empresa-esta-fazendo-o-suficiente-para-proteger-dados-criticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como_saber_se_sua_empresa_est_fazendo_o_suficiente_para_proteger_dados_...-1.jpg</image:loc><image:caption>Comosabersesuaempresaestfazendoosuficienteparaprotegerdados1</image:caption><image:title>Comosabersesuaempresaestfazendoosuficienteparaprotegerdados1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/hospitais-devem-preparar-rede-para-era-conectividade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC%20Brasil%20-%20Como%20hospitais%20devem%20preparar%20rede%20conectividade.jpg</image:loc><image:caption>NECBrasilComohospitaisdevemprepararredeconectividade</image:caption><image:title>NECBrasilComohospitaisdevemprepararredeconectividade</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/alianca-entre-ntt-e-nec-ja-resulta-em-novas-solucoes-para-as-redes-5g-e-aplicacoes-customizadas-para-diferentes-industria</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/1-4_GettyImages-462012665.jpg</image:loc><image:caption>14GettyImages462012665</image:caption><image:title>14GettyImages462012665</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/seguro-contra-riscos-ciberneticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/a-nec-y-el-wi-fi-7-acelerando-la-conectividad-en-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2073120226.jpg</image:loc><image:caption>iStock2073120226</image:caption><image:title>iStock2073120226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://blog.la.nec.com/padroes-para-um-software-seguro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/desenvolvimento-2Bseguro-2Bde-2Bsoftware.jpg</image:loc><image:caption>desenvolvimento2Bseguro2Bde2Bsoftware</image:caption><image:title>desenvolvimento2Bseguro2Bde2Bsoftware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/conexao-remota-e-seguranca-de-dados-conceito-de-zero-trust</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/modern-man-working-remotely-on-a-computer-from-hom-FMMNCTW.jpg</image:loc><image:caption>modernmanworkingremotelyonacomputerfromhomFMMNCTW</image:caption><image:title>modernmanworkingremotelyonacomputerfromhomFMMNCTW</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/es/esg-smart-cities-es</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><lastmod>2024-06-13</lastmod></url><url><loc>https://blog.la.nec.com/o-que-esperar-das-ameacas-no-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/biometira-contribui-analise-servicos-financeiros</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2023-09-27</lastmod></url><url><loc>https://blog.la.nec.com/nova-artilharia-contra-ciberameacas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Nova%20Artilharia%20contra%20ciberamea%C3%A7as.jpg</image:loc><image:caption>NovaArtilhariacontraciberameaças</image:caption><image:title>NovaArtilhariacontraciberameaças</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/nec-se-posiciona-ao-centro-do-ecossistema-aberto-como-integrador-de-rede-no-latam-telco-vision-forum</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum1.png</image:loc><image:caption>TelcoVisionFourum1</image:caption><image:title>TelcoVisionFourum1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum2.png</image:loc><image:caption>TelcoVisionFourum2</image:caption><image:title>TelcoVisionFourum2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-pecas-blog-imagem-telco-vision-forum.png</image:loc><image:caption>necpecasblogimagemtelcovisionforum</image:caption><image:title>necpecasblogimagemtelcovisionforum</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Murakamisan.png</image:loc><image:caption>Murakamisan</image:caption><image:title>Murakamisan</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum3.png</image:loc><image:caption>TelcoVisionFourum3</image:caption><image:title>TelcoVisionFourum3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/es/la-transformaci%C3%B3n-de-la-movilidad-urbana-una-mirada-tecnol%C3%B3gica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199.jpg</image:loc><image:caption>iStock1255236199</image:caption><image:title>iStock1255236199</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://blog.la.nec.com/gdpr-sua-empresa-esta-preparada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/os-pilares-da-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/gdpr-general-data-protection-regulation</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2238834443.jpg</image:loc><image:caption>shutterstock2238834443</image:caption><image:title>shutterstock2238834443</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ilumina%C3%A7%C3%A3o%20p%C3%BAblica%20inteligente.jpg</image:loc><image:caption>Iluminaçãopúblicainteligente</image:caption><image:title>Iluminaçãopúblicainteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_598614410.jpg</image:loc><image:caption>Shutterstock598614410</image:caption><image:title>Shutterstock598614410</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1726031935.jpg</image:loc><image:caption>shutterstock1726031935</image:caption><image:title>shutterstock1726031935</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/a-revolucao-iot</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/voce-sabe-definir-uma-senha-segura</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/voc%C3%AA%20sabe%20definir%20uma%20senha.jpg</image:loc><image:caption>vocêsabedefinirumasenha</image:caption><image:title>vocêsabedefinirumasenha</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/iiot-tecnologia-e-ciberseguranca-para-ambientes-industriais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/por-que-realizar-um-teste-de-invasao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/o-5g-e-a-expansao-dos-ataques-ciberneticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2122606190.jpg</image:loc><image:caption>Shutterstock2122606190</image:caption><image:title>Shutterstock2122606190</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/risco-e-compliance</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/entenda-como-tecnologias-para-economia-low-touch-tem-impactado-o-setor-de-bancos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/image-1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://blog.la.nec.com/alvo-do-cibercrime-um-privilegio-de-todos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_02.jpg</image:loc><image:caption>artigo02</image:caption><image:title>artigo02</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/seguridad-publica-y-datos-en-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1243075077%20(1).jpg</image:loc><image:caption>iStock12430750771</image:caption><image:title>iStock12430750771</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1440232812.jpg</image:loc><image:caption>iStock1440232812</image:caption><image:title>iStock1440232812</image:title></image:image><lastmod>2025-07-29</lastmod></url><url><loc>https://blog.la.nec.com</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/standard-quality-control-collage-concept%20(1).jpg</image:loc><image:caption>standardqualitycontrolcollageconcept1</image:caption><image:title>standardqualitycontrolcollageconcept1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/two-people-data-center-with-server-background.jpg</image:loc><image:caption>twopeopledatacenterwithserverbackground</image:caption><image:title>twopeopledatacenterwithserverbackground</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/023ba563-edc2-4583-974f-f027144cfc70-1.jpg</image:loc><image:caption>023ba563edc24583974ff027144cfc701</image:caption><image:title>023ba563edc24583974ff027144cfc701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/v617-bb-10-technology.jpg</image:loc><image:caption>v617bb10technology</image:caption><image:title>v617bb10technology</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/info-DDoS_home-e-download%20(1).jpg</image:loc><image:caption>infoDDoShomeedownload1</image:caption><image:title>infoDDoShomeedownload1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/homem-tocando-icones-de-elementos-de-negocios-na-tela.jpg</image:loc><image:caption>homemtocandoiconesdeelementosdenegociosnatela</image:caption><image:title>homemtocandoiconesdeelementosdenegociosnatela</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Nec2019/Landing%20Pages/VM_home-e-download%20(1).jpg</image:loc><image:caption>VMhomeedownload1</image:caption><image:title>VMhomeedownload1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/autonomous-vehicles-data-visualizations-are-crucial-smart-cities-urban-life-improvement-aig62.jpg</image:loc><image:caption>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:caption><image:title>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico.jpg</image:loc><image:caption>representacaoconceitocensodemografico</image:caption><image:title>representacaoconceitocensodemografico</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/cloud_home-e-download-1.jpg</image:loc><image:caption>cloudhomeedownload1</image:caption><image:title>cloudhomeedownload1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.la.nec.com/es/datacenter-edge-y-las-infraestructuras-de-ti-y-telecom</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/infraestrutura-5G-artigo.jpg</image:loc><image:caption>infraestrutura5Gartigo</image:caption><image:title>infraestrutura5Gartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://blog.la.nec.com/es/iniciativas-esg-crecimiento-sostenible-empresas-sociedad</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2156594721.jpg</image:loc><image:caption>Shutterstock2156594721</image:caption><image:title>Shutterstock2156594721</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-04-09</lastmod></url><url><loc>https://blog.la.nec.com/senhas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/observabilidade-chave-para-redes-e-aplicacoes-resilientes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/%5BTeletime%20-%20Imagem%20Artigo%5D%20Observabilidade_%20A%20chave%20para%20a%20efici%C3%AAncia%20nos%20processos%20de%20TI%20-%20c%C3%B3pia.png</image:loc><image:caption>TeletimeImagemArtigoObservabilidadeAchaveparaaeficiêncianosprocessosdeTIcópia</image:caption><image:title>TeletimeImagemArtigoObservabilidadeAchaveparaaeficiêncianosprocessosdeTIcópia</image:title></image:image><lastmod>2024-04-16</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-um-alerta-do-fbi</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ransom2.jpg</image:loc><image:caption>ransom2</image:caption><image:title>ransom2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/como-monitorar-a-seguranca-do-ambiente-de-ti</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/post_arcon.jpg</image:loc><image:caption>postarcon</image:caption><image:title>postarcon</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/como-garantir-a-protecao-de-cloud-e-data-center</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/5g-e-transformacao-digital-como-as-grandes-corporacoes-aproveitam-a-conectividade-para-inovar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2025-10-03</lastmod></url><url><loc>https://blog.la.nec.com/sysmon-melhorando-o-nivel-de-deteccao-em-redes-windows</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/deteccao-fraude-digital-id</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1531066550.jpg</image:loc><image:caption>shutterstock1531066550</image:caption><image:title>shutterstock1531066550</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://blog.la.nec.com/4-desafios-em-resposta-a-incidentes-para-organizacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/respstas_a_incidentes.jpg</image:loc><image:caption>respstasaincidentes</image:caption><image:title>respstasaincidentes</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/iot-tecnologia-em-expansao-nos-ambientes-corporativos-e-industriais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/toquio-foi-um-grande-campo-de-testes-para-a-tecnologia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1523925506-1.jpg</image:loc><image:caption>shutterstock15239255061</image:caption><image:title>shutterstock15239255061</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-21</lastmod></url><url><loc>https://blog.la.nec.com/5g-tecnologia-que-tem-a-colaboracao-como-palavra-chave</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/20200302_1570151008.jpg</image:loc><image:caption>202003021570151008</image:caption><image:title>202003021570151008</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/e-se-a-formula-da-coca-cola-vazasse</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/ataque-ddos-a-bola-da-vez-novamente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/o-cibercrime-esta-no-ar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-mobile</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/caso-apple-e-fbi-impacto-nos-neg%C3%B3cios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/apple.jpg</image:loc><image:caption>apple</image:caption><image:title>apple</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/virtual-patching-beneficios-e-pontos-de-atencao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/case-de-sucesso-nec-como-o-munic%C3%ADpio-de-tigres-reduziu-de-cerca-de-80-da-taxa-de-roubo-de-ve%C3%ADculos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imag-blog-nec.png</image:loc><image:caption>imagblognec</image:caption><image:title>imagblognec</image:title></image:image><lastmod>2024-04-29</lastmod></url><url><loc>https://blog.la.nec.com/como-governos-podem-aumentar-a-seguranca-das-informacoes-dos-cidadaos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_598614410.jpg</image:loc><image:caption>Shutterstock598614410</image:caption><image:title>Shutterstock598614410</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ilumina%C3%A7%C3%A3o%20p%C3%BAblica%20inteligente.jpg</image:loc><image:caption>Iluminaçãopúblicainteligente</image:caption><image:title>Iluminaçãopúblicainteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1726031935.jpg</image:loc><image:caption>shutterstock1726031935</image:caption><image:title>shutterstock1726031935</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2238834443.jpg</image:loc><image:caption>shutterstock2238834443</image:caption><image:title>shutterstock2238834443</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-10-30</lastmod></url><url><loc>https://blog.la.nec.com/impacto-5g-nos-modelos-de-negocios-do-setor-de-telecomunicacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/O%20impacto%20do%205G%20nos%20modelos%20de%20neg%C3%B3cio%20de%20todo%20o%20setor%20das%20telecomunica%C3%A7%C3%B5es.jpg</image:loc><image:caption>Oimpactodo5Gnosmodelosdenegóciodetodoosetordastelecomunicações</image:caption><image:title>Oimpactodo5Gnosmodelosdenegóciodetodoosetordastelecomunicações</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://blog.la.nec.com/o-que-e-threat-intelligence</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/gsdg.jpg</image:loc><image:caption>gsdg</image:caption><image:title>gsdg</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fhgh.png</image:loc><image:caption>fhgh</image:caption><image:title>fhgh</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/como-la-medicina-esta-utilizando-la-tecnologia-para-prevenir-enfermedades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_381900487.png</image:loc><image:caption>shutterstock381900487</image:caption><image:title>shutterstock381900487</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/es/lgpd-cumplimiento-automatizado-de-datos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2353094007-1.png</image:loc><image:caption>Shutterstock23530940071</image:caption><image:title>Shutterstock23530940071</image:title></image:image><lastmod>2024-06-04</lastmod></url><url><loc>https://blog.la.nec.com/explore-como-o-futuro-da-conectividade-fara-o-iot-e-a-industria-4.0-acontecer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1256952995%20(1).jpg</image:loc><image:caption>iStock12569529951</image:caption><image:title>iStock12569529951</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2091028289%20(1).jpg</image:loc><image:caption>iStock20910282891</image:caption><image:title>iStock20910282891</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-597232780%20(1).jpg</image:loc><image:caption>iStock5972327801</image:caption><image:title>iStock5972327801</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1765563070%20(1).jpg</image:loc><image:caption>iStock17655630701</image:caption><image:title>iStock17655630701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2030685938.jpg</image:loc><image:caption>shutterstock2030685938</image:caption><image:title>shutterstock2030685938</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://blog.la.nec.com/muita-seguranca-em-2017</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/2017.jpg</image:loc><image:caption>2017</image:caption><image:title>2017</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/lei-de-protecao-de-dados-no-brasil-estamos-quase-la</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/brasil-maior-alvo-de-ciberataques-na-am%C3%A9rica-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/teclado_Brasil.jpg</image:loc><image:caption>tecladoBrasil</image:caption><image:title>tecladoBrasil</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/estou-sendo-atacado-e-agora</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/hospedagem-de-aplicativos-empresariais-com-a-nec</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1819606721.png</image:loc><image:caption>shutterstock1819606721</image:caption><image:title>shutterstock1819606721</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-12-16</lastmod></url><url><loc>https://blog.la.nec.com/es/impactos-de-identificacion-digital-interacion-humana</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Digital%20identification.jpg</image:loc><image:caption>Digitalidentification</image:caption><image:title>Digitalidentification</image:title></image:image><lastmod>2025-01-15</lastmod></url><url><loc>https://blog.la.nec.com/retrospectiva-2017-o-ano-dos-ciberataques-mundiais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/eleicoes-2018-proteja-se-dos-hackers-ao-escolher-seus-candidatos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/knowledge-base-porque-voc%C3%AA-deve-ter-uma</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/3-passos-para-gerenciar-as-chaves-de-criptografia-com-a-nec-e-fornetix</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_309941807.png</image:loc><image:caption>shutterstock309941807</image:caption><image:title>shutterstock309941807</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/certifica%C3%A7%C3%B5es-iso-para-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/certifica%C3%A7%C3%B5es-ISO-para-cidades-inteligentes.jpg</image:loc><image:caption>certificaçõesISOparacidadesinteligentes</image:caption><image:title>certificaçõesISOparacidadesinteligentes</image:title></image:image><lastmod>2024-04-08</lastmod></url><url><loc>https://blog.la.nec.com/es/deteccion-de-fraude-con-digital-id</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1896228895.jpg</image:loc><image:caption>Shutterstock1896228895</image:caption><image:title>Shutterstock1896228895</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-10-31</lastmod></url><url><loc>https://blog.la.nec.com/para-estar-seguro-questione</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/%5BNOV%2016%5D%20Para%20estar%20seguro%2c%20questione.jpg</image:loc><image:caption>NOV16Paraestarseguroquestione</image:caption><image:title>NOV16Paraestarseguroquestione</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/gestao-de-vulnerabilidades-na-estrategia-de-protecao-do-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/transformacaodotrabalho</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/20200305_776682157-1.jpg</image:loc><image:caption>202003057766821571</image:caption><image:title>202003057766821571</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-10-26</lastmod></url><url><loc>https://blog.la.nec.com/o-conceito-distante-da-realidade-de-security-by-design</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/semana-da-mobilidade-entenda-como-a-tecnologia-transforma-a-gestao-de-transito-nas-cidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-592033988.jpg</image:loc><image:caption>iStock592033988</image:caption><image:title>iStock592033988</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><lastmod>2025-09-19</lastmod></url><url><loc>https://blog.la.nec.com/5-motivos-para-contratar-um-servico-de-resposta-a-incidentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/razones-ctos-invierten-en-biometria-sector-financiero</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2338846971.png</image:loc><image:caption>Shutterstock2338846971</image:caption><image:title>Shutterstock2338846971</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-08-09</lastmod></url><url><loc>https://blog.la.nec.com/home-office-e-as-ameacas-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1566492097.jpg</image:loc><image:caption>shutterstock1566492097</image:caption><image:title>shutterstock1566492097</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2020-12-16</lastmod></url><url><loc>https://blog.la.nec.com/legislacao-ciberseguranca-dados-sesiveis</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2287651235.jpg</image:loc><image:caption>Shutterstock2287651235</image:caption><image:title>Shutterstock2287651235</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/mss_solucoes_com_especialistas_processos_e_tecnologia_integrados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/solucoes-perigos-seguranca-informacao.jpg</image:loc><image:caption>solucoesperigossegurancainformacao</image:caption><image:title>solucoesperigossegurancainformacao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/voce-sabe-o-que-e-wardriving-e-como-se-proteger</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/o-que-os-vazamentos-de-dados-representam</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/deteccao-analise-detalhada-e-resposta-rapida-a-ataques-direcionados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Sem_ttulo.png</image:loc><image:caption>Semttulo</image:caption><image:title>Semttulo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Deteccao_anlise_detalhada_e_resposta_rapida_a_ataques_direcionados.jpg</image:loc><image:caption>Deteccaoanlisedetalhadaerespostarapidaaataquesdirecionados</image:caption><image:title>Deteccaoanlisedetalhadaerespostarapidaaataquesdirecionados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/como-los-empleados-remotos-pueden-ayudar-a-la-seguridad-de-los-datos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2174654959.jpg</image:loc><image:caption>shutterstock2174654959</image:caption><image:title>shutterstock2174654959</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto-1.png</image:loc><image:caption>segurancatrabalhoremoto1</image:caption><image:title>segurancatrabalhoremoto1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-08-22</lastmod></url><url><loc>https://blog.la.nec.com/america-latina-se-consolida-como-novo-hub-global-de-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-11-27</lastmod></url><url><loc>https://blog.la.nec.com/fake-news-seja-filtro-e-nao-esponja</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/nec-apresenta-em-evento-digital-o-5g-como-passo-para-a-criacao-de-um-novo-mundo-mais-colaborativo-e-sustentavel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(17).png</image:loc><image:caption>Designsemnome17</image:caption><image:title>Designsemnome17</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/es/observabilidad-full-stack-que-es-y-como-puede-beneficiar-a-su-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1234148077.jpg</image:loc><image:caption>shutterstock1234148077</image:caption><image:title>shutterstock1234148077</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-03-19</lastmod></url><url><loc>https://blog.la.nec.com/es/nec-la-infraestructura-estrategica-que-conecta-a-latam-al-futuro-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><lastmod>2025-12-16</lastmod></url><url><loc>https://blog.la.nec.com/navegar-com-seguran%C3%A7a-e-preciso</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Navegar_com_segurana__preciso2.jpg</image:loc><image:caption>Navegarcomseguranapreciso2</image:caption><image:title>Navegarcomseguranapreciso2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/fui-vitima-de-um-cibercrime-e-quero-denunciar-como-proceder</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-da-informacao-como-fazer-seu-cio-entender-os-riscos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como_fazer_seu_CIO_perceber_os_riscos_em_SI.jpg</image:loc><image:caption>ComofazerseuCIOperceberosriscosemSI</image:caption><image:title>ComofazerseuCIOperceberosriscosemSI</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/se-o-pior-acontecer-estamos-preparados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/novas-vulnerabilidades-no-rdp-podem-ser-exploradas-por-malware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/redes-wi-fi-exigem-configuracao-adequada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/8-alertas-antes-de-implantar-um-projeto-de-vm</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/gdpr-em-vigor-dicas-para-adequa%C3%A7%C3%A3o</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/black-friday-2018-atencao-aos-golpes-virtuais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/es/arquitectura-moderna-experiencia-del-cliente-con-automatizacion</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509-1.png</image:loc><image:caption>Shutterstock22419025091</image:caption><image:title>Shutterstock22419025091</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://blog.la.nec.com/bcm-para-conter-a-violacao-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/qualidade-processo-e-seguranca-da-informacao-tudo-a-ver</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/ciberameacas-um-risco-crescente-para-os-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ciberameaas_-_um_risco_crescente_para_os_negcios.png</image:loc><image:caption>Ciberameaasumriscocrescenteparaosnegcios</image:caption><image:title>Ciberameaasumriscocrescenteparaosnegcios</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-lockergoga</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/a-bioeconomia-no-brasil-o-futuro-do-desenvolvimento-economico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/A%20bioeconomia%20no%20Brasil.jpg</image:loc><image:caption>AbioeconomianoBrasil</image:caption><image:title>AbioeconomianoBrasil</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><lastmod>2023-05-02</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-corporativa-e-o-compartilhamento-de-documentos-no-whatsapp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/whatsapp2.jpeg</image:loc><image:caption>whatsapp2</image:caption><image:title>whatsapp2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/naom_56fa7d921af27.jpg</image:loc><image:caption>naom56fa7d921af27</image:caption><image:title>naom56fa7d921af27</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/es/reconocimiento-facial-para-apps-bancarias-y-sus-posibilidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1658387542.jpg</image:loc><image:caption>shutterstock1658387542</image:caption><image:title>shutterstock1658387542</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/es/movilidad-inteligente-y-planificacion-integrada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1177229243%20(1).jpg</image:loc><image:caption>iStock11772292431</image:caption><image:title>iStock11772292431</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1271634448.jpg</image:loc><image:caption>iStock1271634448</image:caption><image:title>iStock1271634448</image:title></image:image><lastmod>2025-07-18</lastmod></url><url><loc>https://blog.la.nec.com/business-process-compromise-voc%C3%AA-sabe-o-que-%C3%A9</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/qual-a-eficiencia-do-seu-gerenciamento-de-vulnerabilidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/como-acelerar-seu-processo-de-promocao-em-si</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como_acelerar_seu_processo_de_promoo_em_SI-blog.jpg</image:loc><image:caption>ComoacelerarseuprocessodepromooemSIblog</image:caption><image:title>ComoacelerarseuprocessodepromooemSIblog</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/como-tecnologias-auxiliam-na-aplicacao-de-esg-nas-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-06-26</lastmod></url><url><loc>https://blog.la.nec.com/es/empresa-tecnologica-socia-de-ciudad-inteligente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Cidade%20Inteligente.jpg</image:loc><image:caption>CidadeInteligente</image:caption><image:title>CidadeInteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-07-12</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-no-japao-turistas-fazem-pagamentos-apenas-mostrando-o-rosto</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1414761095.jpg</image:loc><image:caption>shutterstock1414761095</image:caption><image:title>shutterstock1414761095</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/es/america-latina-se-consolida-como-nuevo-hub-global-de-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami-1.jpg</image:loc><image:caption>ImagenblogMurakami1</image:caption><image:title>ImagenblogMurakami1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-11-27</lastmod></url><url><loc>https://blog.la.nec.com/protegendo-os-seus-dados-5-topicos-a-serem-considerados-na-migracao-do-data-center-para-a-nuvem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_271778819.png</image:loc><image:caption>shutterstock271778819</image:caption><image:title>shutterstock271778819</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-11-11</lastmod></url><url><loc>https://blog.la.nec.com/cibercrime-na-crise-politica-e-economica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/HQ.jpg</image:loc><image:caption>HQ</image:caption><image:title>HQ</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/governos-digitais-transparencia-inclusao-e-desenvolvimento</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1924263854.jpg</image:loc><image:caption>shutterstock1924263854</image:caption><image:title>shutterstock1924263854</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/autenticacao-biometrica-multimodal-como-garantir-uma-operacao-segura-sem-impactar-a-experiencia-do-usuario</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/autonomous-vehicles-data-visualizations-are-crucial-smart-cities-urban-life-improvement-aig62.jpg</image:loc><image:caption>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:caption><image:title>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2026-04-02</lastmod></url><url><loc>https://blog.la.nec.com/nao-se-gerencia-o-que-nao-se-mede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/alem-do-5g-e-6g-o-proximo-passo-das-infraestruturas-da-telecomunicacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Al%C3%A9m%20do%205G%20e%206G_%20o%20pr%C3%B3ximo%20passo%20das%20infraestruturas%20da%20telecomunica%C3%A7%C3%A3o.jpg</image:loc><image:caption>Alémdo5Ge6Gopróximopassodasinfraestruturasdatelecomunicação</image:caption><image:title>Alémdo5Ge6Gopróximopassodasinfraestruturasdatelecomunicação</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2023-07-17</lastmod></url><url><loc>https://blog.la.nec.com/as-10-melhores-praticas-em-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/ntt-inc-e-nec-visam-superar-expectativas-com-redes-abertas-avancadas-com-foco-num-futuro-mais-digital-e-sustentavel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2147292965-3.jpg</image:loc><image:caption>Shutterstock21472929653</image:caption><image:title>Shutterstock21472929653</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-no-combate-as-mudancas-climaticas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2091028289%20(1).jpg</image:loc><image:caption>iStock20910282891</image:caption><image:title>iStock20910282891</image:title></image:image><lastmod>2025-07-24</lastmod></url><url><loc>https://blog.la.nec.com/copa-do-mundo-atencao-aos-ataques-ciberneticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/arquitetura-moderna-experiencia-do-cliente-com-automacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-07-12</lastmod></url><url><loc>https://blog.la.nec.com/business-e-mail-compromise</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/es/como-garantizar-mas-seguridad-y-escalabilidad-en-el-trafico-de-datos-para-una-actuacion-mas-eficiente-y-financieramente-relevante</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-10-16</lastmod></url><url><loc>https://blog.la.nec.com/saude-identificacao-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475.jpg</image:loc><image:caption>shutterstock2304284475</image:caption><image:title>shutterstock2304284475</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2117396804.jpg</image:loc><image:caption>Shutterstock2117396804</image:caption><image:title>Shutterstock2117396804</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://blog.la.nec.com/reconhecimento-facial-para-aplicativos-bancarios-e-suas-possibilidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1658387542.jpg</image:loc><image:caption>shutterstock1658387542</image:caption><image:title>shutterstock1658387542</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/eu-vejo-o-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.la.nec.com/es/wi-fi-7-en-america-latina-la-nueva-era-de-la-conectividad-empresarial</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://blog.la.nec.com/mais-seguran%C3%A7a-de-ti-com-reducao-de-custo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/help.jpg</image:loc><image:caption>help</image:caption><image:title>help</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/biometria-e-sociedade-impactos-da-tecnologia-na-seguranca-publica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/6-dicas-para-sua-seguranca-digital-nas-ferias</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/glossario-de-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Mar_03_Glossrio_de_segurana_da_informao.jpg</image:loc><image:caption>Mar03Glossriodeseguranadainformao</image:caption><image:title>Mar03Glossriodeseguranadainformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/wi-fi-7-na-america-latina-a-nova-era-da-conectividade-empresarial</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://blog.la.nec.com/realidade-aumentada-robotica-e-mais-as-tecnologias-que-iremos-ver-nos-proximos-anos-no-setor-de-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1932174680.jpg</image:loc><image:caption>shutterstock1932174680</image:caption><image:title>shutterstock1932174680</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/cryptojacking-imperceptivel-mas-amea%C3%A7ador</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/denuncia-de-ameacas-ciberneticas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/inovacoes-industria-4.0</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ind%C3%BAstria-e-agroneg%C3%B3cio.jpg</image:loc><image:caption>Indústriaeagronegócio</image:caption><image:title>Indústriaeagronegócio</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1919699384.jpg</image:loc><image:caption>shutterstock1919699384</image:caption><image:title>shutterstock1919699384</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1569043051.jpg</image:loc><image:caption>shutterstock1569043051</image:caption><image:title>shutterstock1569043051</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2309189217.jpg</image:loc><image:caption>Shutterstock2309189217</image:caption><image:title>Shutterstock2309189217</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/violacoes-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data_breach-1.jpg</image:loc><image:caption>databreach1</image:caption><image:title>databreach1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/transformando-industrias-com-redes-privativas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2312989425.jpg</image:loc><image:caption>Shutterstock2312989425</image:caption><image:title>Shutterstock2312989425</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/colaboradores-e-as-politicas-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/matria-tecnologia-Vamos-falar-sobre-segurana-da-informao.png</image:loc><image:caption>matriatecnologiaVamosfalarsobreseguranadainformao</image:caption><image:title>matriatecnologiaVamosfalarsobreseguranadainformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/contra-covid-19-biometria-ganha-novas-aplicacoes-em-aeroportos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(14).png</image:loc><image:caption>Designsemnome14</image:caption><image:title>Designsemnome14</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/os-efeitos-positivos-dos-conflitos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/olimpiadas-exigem-cuidados-com-si</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Olimpadas_exigem_cuidados_com_SI.jpg</image:loc><image:caption>OlimpadasexigemcuidadoscomSI</image:caption><image:title>OlimpadasexigemcuidadoscomSI</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/next-generation-firewall</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Next%20Generation%20Firewall.jpg</image:loc><image:caption>NextGenerationFirewall</image:caption><image:title>NextGenerationFirewall</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ngfsdlfk.png</image:loc><image:caption>ngfsdlfk</image:caption><image:title>ngfsdlfk</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/ciberameacas-aumentam-durante-a-copa-do-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/duvidas-sobre-seguranca-pergunte-ao-especialista</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/alem-da-senha-por-que-a-biometria-multimodal-e-a-solucao-para-transacoes-bancarias-seguras</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/freepik__talk__29818.png</image:loc><image:caption>freepiktalk29818</image:caption><image:title>freepiktalk29818</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2026-01-06</lastmod></url><url><loc>https://blog.la.nec.com/o-que-um-soc-security-operation-center-pode-fazer-pela-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/nec-caminho-futuro-visao-2030</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/banner-nec%20-%20c%C3%B3pia%202.png</image:loc><image:caption>bannerneccópia2</image:caption><image:title>bannerneccópia2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/riscos-de-deixar-a-seguranca-da-informacao-dos-data-centers-de-lado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1319520962.png</image:loc><image:caption>shutterstock1319520962</image:caption><image:title>shutterstock1319520962</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2021-11-11</lastmod></url><url><loc>https://blog.la.nec.com/iot-atencao-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/gestao-de-projetos-seguros</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.la.nec.com/como-a-inteligencia-artificial-podera-ser-usada-pelo-setor-bancario</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como%20a%20Intelig%C3%AAncia%20Artificial%20poder%C3%A1%20ser%20usada%20pelo%20setor%20banc%C3%A1rio.jpg</image:loc><image:caption>ComoaInteligênciaArtificialpoderáserusadapelosetorbancário</image:caption><image:title>ComoaInteligênciaArtificialpoderáserusadapelosetorbancário</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/vazamento-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/vazamento%20de%20dados.jpg</image:loc><image:caption>vazamentodedados</image:caption><image:title>vazamentodedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/porque-os-cios-devem-se-preocupar-com-a-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Porqu_os_CIOs_devem_se_preocupar_com_a_Segurana_da_Informao.jpg</image:loc><image:caption>PorquosCIOsdevemsepreocuparcomaSeguranadaInformao</image:caption><image:title>PorquosCIOsdevemsepreocuparcomaSeguranadaInformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/uso-combinado-de-5g-iot-big-data-ai-impulsionando-novos-modelos-de-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1053868622.png</image:loc><image:caption>shutterstock1053868622</image:caption><image:title>shutterstock1053868622</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/os-cidadaos-desejam-mais-seguranaca-mas-estamos-preparados-para-ela</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/5g-ia-pago-de-bajo-contacto</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2179380685-1.jpg</image:loc><image:caption>Shutterstock21793806851</image:caption><image:title>Shutterstock21793806851</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.la.nec.com/dark-analytics-informacoes-preciosas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-na-nuvem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/es/5g-y-transformacion-digital-como-las-grandes-corporaciones-aprovechan-la-conectividad-para-innovar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-10-03</lastmod></url><url><loc>https://blog.la.nec.com/quem-e-o-chief-information-security-officer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/MAR_162_Quem__o_CISO.jpg</image:loc><image:caption>MAR162QuemoCISO</image:caption><image:title>MAR162QuemoCISO</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-reduz-custos-gestao-municipal</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1820093804.jpg</image:loc><image:caption>Shutterstock1820093804</image:caption><image:title>Shutterstock1820093804</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/es/mas-alla-del-5g-6g-el-seguinte-paso-en-telecomunicaciones</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1934207456.png</image:loc><image:caption>Shutterstock1934207456</image:caption><image:title>Shutterstock1934207456</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-09-26</lastmod></url><url><loc>https://blog.la.nec.com/es/identificacion-de-recien-nacidos-y-ni%C3%B1os</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1561815367.jpg</image:loc><image:caption>Shutterstock1561815367</image:caption><image:title>Shutterstock1561815367</image:title></image:image><lastmod>2024-02-23</lastmod></url><url><loc>https://blog.la.nec.com/tsunami-na-internet</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/%5B02%2017%5D%20Tsunami%20na%20internet.jpg</image:loc><image:caption>0217Tsunaminainternet</image:caption><image:title>0217Tsunaminainternet</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/resolucao-n-4.658-sobre-a-politica-de-seguranca-cibernetica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/tendencias-de-conectividade-para-o-futuro-da-agricultura-e-como-coloca-las-em-pratica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tend%C3%AAncias%20de%20conectividade%20para%20o%20futuro%20da%20Agricultura%20.jpg</image:loc><image:caption>TendênciasdeconectividadeparaofuturodaAgricultura</image:caption><image:title>TendênciasdeconectividadeparaofuturodaAgricultura</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><lastmod>2021-12-06</lastmod></url><url><loc>https://blog.la.nec.com/whatsapp-como-se-manter-seguro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/ciberseguran%C3%A7a-em-tempos-de-crise</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Cibersegurana_em_tempos_de_crise.jpg</image:loc><image:caption>Ciberseguranaemtemposdecrise</image:caption><image:title>Ciberseguranaemtemposdecrise</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/cio-dont-cry</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/5-praticas-dos-especialistas-nec-para-evitar-ciberataques-em-tempos-de-home-office</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/esg-implementado-en-el-mercado-de-telecomunicaciones</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1393615541.jpg</image:loc><image:caption>shutterstock1393615541</image:caption><image:title>shutterstock1393615541</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/SM-2.png</image:loc><image:caption>SM2</image:caption><image:title>SM2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2446000443.jpg</image:loc><image:caption>shutterstock2446000443</image:caption><image:title>shutterstock2446000443</image:title></image:image><lastmod>2024-08-27</lastmod></url><url><loc>https://blog.la.nec.com/informacoes-confidenciais-de-colaboradores</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/sony.jpg</image:loc><image:caption>sony</image:caption><image:title>sony</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/atencao-para-esses-tipos-de-malware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tipos%20de%20malware.jpg</image:loc><image:caption>tiposdemalware</image:caption><image:title>tiposdemalware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/o-cibercriminoso-pode-ser-voce</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/badrabbit-novo-surto-de-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/qualidade-e-seguranca-no-desenvolvimento-de-software</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ap_Dev.jpg</image:loc><image:caption>ApDev</image:caption><image:title>ApDev</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/vao-te-contar-seu-segredo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-quem-quer-chorar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/es/autenticacion-biometrica-multimodal-como-garantizar-una-operacion-segura-sin-impactar-la-experiencia-del-usuario</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2026-04-02</lastmod></url><url><loc>https://blog.la.nec.com/como-promover-a-automatizacao-da-seguranca-fisica-e-digital-dos-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1489452098.png</image:loc><image:caption>shutterstock1489452098</image:caption><image:title>shutterstock1489452098</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-09-02</lastmod></url><url><loc>https://blog.la.nec.com/quanto-sua-empresa-esta-disposta-a-arriscar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Jun_03.jpg</image:loc><image:caption>Jun03</image:caption><image:title>Jun03</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-08-14</lastmod></url><url><loc>https://blog.la.nec.com/iniciativas-esg-que-apoiam-o-crescimento-sustentavel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2156594721.jpg</image:loc><image:caption>Shutterstock2156594721</image:caption><image:title>Shutterstock2156594721</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/planejando-uma-viagem-tome-cuidado-na-hora-de-se-conectar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/proteja-suas-criancas-na-internet</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/es/innovaci%C3%B3n-bancaria-con-automatizaci%C3%B3n-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20processos%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemprocessosbancários</image:caption><image:title>automaçãoderedeemprocessosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-02-11</lastmod></url><url><loc>https://blog.la.nec.com/ferramentas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2019-02-04</lastmod></url><url><loc>https://blog.la.nec.com/conectividade-hibrida-e-multicloud-a-chave-para-ia-e-nuvem-de-alta-velocidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/two-people-data-center-with-server-background.jpg</image:loc><image:caption>twopeopledatacenterwithserverbackground</image:caption><image:title>twopeopledatacenterwithserverbackground</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/v617-bb-10-technology.jpg</image:loc><image:caption>v617bb10technology</image:caption><image:title>v617bb10technology</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://blog.la.nec.com/es/como-la-automatizacion-transforma-la-planificacion-de-capex</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede-2.jpg</image:loc><image:caption>automaçãoderede2</image:caption><image:title>automaçãoderede2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Planejamento%20de%20CAPEX.jpg</image:loc><image:caption>PlanejamentodeCAPEX</image:caption><image:title>PlanejamentodeCAPEX</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Smart%20CAPEX-1.jpg</image:loc><image:caption>SmartCAPEX1</image:caption><image:title>SmartCAPEX1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/protegendo-sua-privacidade-parte-1</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/desvendando-uma-botnet</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/e-impossivel-brigar-contra-aquilo-que-nao-se-ve</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/7-competencias-que-o-mercado-espera-dos-profissionais-de-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/competncias_que_o_mercado_espera_dos_profissionais_de_Segurana_da_Informao.jpg</image:loc><image:caption>competnciasqueomercadoesperadosprofissionaisdeSeguranadaInformao</image:caption><image:title>competnciasqueomercadoesperadosprofissionaisdeSeguranadaInformao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/redes-abertas-abrem-caminho-de-transforma%C3%A7%C3%A3o-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1167288919%20(2).jpg</image:loc><image:caption>Shutterstock11672889192</image:caption><image:title>Shutterstock11672889192</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://blog.la.nec.com/saiba-como-proteger-seu-celular-contra-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Saiba%20como%20proteger%20seu%20celular%20contra%20ransomware.jpg</image:loc><image:caption>Saibacomoprotegerseucelularcontraransomware</image:caption><image:title>Saibacomoprotegerseucelularcontraransomware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/figura%202.png</image:loc><image:caption>figura2</image:caption><image:title>figura2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/figura1.png</image:loc><image:caption>figura1</image:caption><image:title>figura1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/figura3.png</image:loc><image:caption>figura3</image:caption><image:title>figura3</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/nec-esta-listo-para-ayudar-a-los-operadores-a-embarcarse-en-su-viaje-open-ran-y-liberar-todo-el-potencial-de-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1928082863.jpg</image:loc><image:caption>shutterstock1928082863</image:caption><image:title>shutterstock1928082863</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/o-wi-fi-gratuito-pode-sair-bem-caro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/es/ia-esg-nuevas-herramientas-y-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763.png</image:loc><image:caption>Shutterstock2078751763</image:caption><image:title>Shutterstock2078751763</image:title></image:image><lastmod>2024-05-07</lastmod></url><url><loc>https://blog.la.nec.com/sua-empresa-esta-realmente-protegida</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/%5B03%2017%5D%20Sua%20empresa%20est%C3%A1%20realmente%20protegida2.jpg</image:loc><image:caption>0317Suaempresaestárealmenteprotegida2</image:caption><image:title>0317Suaempresaestárealmenteprotegida2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/identificacao-de-recem-nascidos-e-criancas-na-saude-moderna</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475.jpg</image:loc><image:caption>shutterstock2304284475</image:caption><image:title>shutterstock2304284475</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2117396804.jpg</image:loc><image:caption>Shutterstock2117396804</image:caption><image:title>Shutterstock2117396804</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/es/tendencias-5g-en-el-mercado-movil-ahora-y-en-el-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1934207456.jpg</image:loc><image:caption>shutterstock1934207456</image:caption><image:title>shutterstock1934207456</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/es/5g-la-mejor-estrategia-para-superar-la-exclusion-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2223906521%20(1).jpg</image:loc><image:caption>iStock22239065211</image:caption><image:title>iStock22239065211</image:title></image:image><lastmod>2025-10-20</lastmod></url><url><loc>https://blog.la.nec.com/5g-e-open-banking-novas-possibilidades-para-teles-e-empresas-do-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1354886600.jpg</image:loc><image:caption>shutterstock1354886600</image:caption><image:title>shutterstock1354886600</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2021-04-27</lastmod></url><url><loc>https://blog.la.nec.com/sucesso-smart-cities-evolucao-identificacao-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2037557108.jpg</image:loc><image:caption>Shutterstock2037557108</image:caption><image:title>Shutterstock2037557108</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/lideran%C3%A7a-de-n%C3%ADvel-5-iso-27001</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/leaders_inspire_1200x627.jpg</image:loc><image:caption>leadersinspire1200x627</image:caption><image:title>leadersinspire1200x627</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/es/ciudades-inteligentes-cuando-la-tecnologia-promueve-la-calidad-de-vida-de-la-sociedad</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1203798238.jpg</image:loc><image:caption>Shutterstock1203798238</image:caption><image:title>Shutterstock1203798238</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/monitoracao-o-braco-direito-na-defesa-da-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/exemplos-implementacao-saude-4.0-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo-imagem.png</image:loc><image:caption>artigoimagem</image:caption><image:title>artigoimagem</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/tecnologias-que-modernizam-a-seguranca-nas-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_598614410.jpg</image:loc><image:caption>Shutterstock598614410</image:caption><image:title>Shutterstock598614410</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-10-31</lastmod></url><url><loc>https://blog.la.nec.com/como-lidar-com-vazamento-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data-Recovery1.jpg</image:loc><image:caption>DataRecovery1</image:caption><image:title>DataRecovery1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/como-visualizar-e-gerenciar-as-vulnerabilidades-do-ambiente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/raizen-torna-conectividade-agil-e-escalavel-ao-adotar-solu%C3%A7ao-wi-fi-com-inteligencia-artificial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1974907301.jpg</image:loc><image:caption>shutterstock1974907301</image:caption><image:title>shutterstock1974907301</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/proteja-suas-aplicacoes-web</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/voce-sabe-mesmo-o-que-e-confidencialidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Arcon_artigo_Confidencialidade.png</image:loc><image:caption>ArconartigoConfidencialidade</image:caption><image:title>ArconartigoConfidencialidade</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/visibilidade-monitoramento-unificados-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/two-people-data-center-with-server-background.jpg</image:loc><image:caption>twopeopledatacenterwithserverbackground</image:caption><image:title>twopeopledatacenterwithserverbackground</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://blog.la.nec.com/rastreando-usuarios-em-dominios-windows-parte-1</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/es/nec-es-un-integrador-que-se-ubica-en-el-coraz%C3%B3n-del-ecosistema-abierto-de-red-en-latam-telco-vision-forum</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Murakamisan.png</image:loc><image:caption>Murakamisan</image:caption><image:title>Murakamisan</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum2.png</image:loc><image:caption>TelcoVisionFourum2</image:caption><image:title>TelcoVisionFourum2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum3.png</image:loc><image:caption>TelcoVisionFourum3</image:caption><image:title>TelcoVisionFourum3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Telco_Vision_Fourum1.png</image:loc><image:caption>TelcoVisionFourum1</image:caption><image:title>TelcoVisionFourum1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-pecas-blog-imagem-telco-vision-forum-op1.png</image:loc><image:caption>necpecasblogimagemtelcovisionforumop1</image:caption><image:title>necpecasblogimagemtelcovisionforumop1</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://blog.la.nec.com/utilizacao-de-threat-intelligence-nas-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/ano-novo-velhos-conselhos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ano%20novo%2c%20velhos%20conselhos.jpg</image:loc><image:caption>Anonovovelhosconselhos</image:caption><image:title>Anonovovelhosconselhos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-setor-de-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><lastmod>2024-07-16</lastmod></url><url><loc>https://blog.la.nec.com/es/la-delincuencia-y-sus-impactos-financieros-en-las-arcas-publicas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2025-10-09</lastmod></url><url><loc>https://blog.la.nec.com/esg-implementado-no-mercado-de-telecom</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1393615541.jpg</image:loc><image:caption>shutterstock1393615541</image:caption><image:title>shutterstock1393615541</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2446000443.jpg</image:loc><image:caption>shutterstock2446000443</image:caption><image:title>shutterstock2446000443</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/voce-sabe-o-que-e-essencial-em-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc%C3%AA%20sabe%20o%20que%20%C3%A9%20essencial%20em%20seguran%C3%A7a.jpg</image:loc><image:caption>Vocêsabeoqueéessencialemsegurança</image:caption><image:title>Vocêsabeoqueéessencialemsegurança</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/descubra-como-la-tecnologia-puede-abordar-la-vacunacion-infantil-en-los-paises-en-desarrollo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC_img_blog_julho.png</image:loc><image:caption>NECimgblogjulho</image:caption><image:title>NECimgblogjulho</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/a-culpa-nao-e-do-firewall</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/IT-firewall.jpg</image:loc><image:caption>ITfirewall</image:caption><image:title>ITfirewall</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20servi%C3%A7os%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemserviçosbancários</image:caption><image:title>automaçãoderedeemserviçosbancários</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/cidades-brasileiras-devem-investir-em-solucoes-smart-cities</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1765563070%20(1).jpg</image:loc><image:caption>iStock17655630701</image:caption><image:title>iStock17655630701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2091028289%20(1).jpg</image:loc><image:caption>iStock20910282891</image:caption><image:title>iStock20910282891</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1256952995%20(1).jpg</image:loc><image:caption>iStock12569529951</image:caption><image:title>iStock12569529951</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_174817232.jpg</image:loc><image:caption>Shutterstock174817232</image:caption><image:title>Shutterstock174817232</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-597232780%20(1).jpg</image:loc><image:caption>iStock5972327801</image:caption><image:title>iStock5972327801</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://blog.la.nec.com/o-papel-da-inteligencia-artificial-na-medicina-de-precisao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1653839683.jpg</image:loc><image:caption>shutterstock1653839683</image:caption><image:title>shutterstock1653839683</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/threat-hunting-e-attck</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/windows-server-2008-fim-do-suporte-voce-esta-preparado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/exito-ciudades-inteligentes-evolucion-identificacion-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2037557108.jpg</image:loc><image:caption>Shutterstock2037557108</image:caption><image:title>Shutterstock2037557108</image:title></image:image><lastmod>2024-06-13</lastmod></url><url><loc>https://blog.la.nec.com/cio-livre-se-dos-velhos-h%C3%A1bitos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/CIO%20livre-se%20dos%20velhos%20h%C3%A1bitos.jpg</image:loc><image:caption>CIOlivresedosvelhoshábitos</image:caption><image:title>CIOlivresedosvelhoshábitos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/a-4-revolucao-industrial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/ameacas-persistentes-avancadas-o-alvo-pode-ser-o-seu-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ataque_persistente_hacker.jpg</image:loc><image:caption>ataquepersistentehacker</image:caption><image:title>ataquepersistentehacker</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/integracoes-tecnologicas-o-futuro-da-industria-na-adocao-da-5a-geracao-de-rede-movel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1934207456.png</image:loc><image:caption>shutterstock1934207456</image:caption><image:title>shutterstock1934207456</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2021-08-12</lastmod></url><url><loc>https://blog.la.nec.com/digital-natives-riscos-vs-resultado-e-inovacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/es/temp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.webp</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto-1.webp</image:loc><image:caption>segurancatrabalhoremoto1</image:caption><image:title>segurancatrabalhoremoto1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/3.webp</image:loc><image:caption>3</image:caption><image:title>3</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://blog.la.nec.com/es/observabilidad-toma-decisiones-de-forma-segura</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2287185557.jpg</image:loc><image:caption>Shutterstock2287185557</image:caption><image:title>Shutterstock2287185557</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/planejamento-urbano-smart-cities</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_650092282.jpg</image:loc><image:caption>shutterstock650092282</image:caption><image:title>shutterstock650092282</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><lastmod>2023-07-25</lastmod></url><url><loc>https://blog.la.nec.com/es/el-5g-sera-crucial-para-liberar-todo-el-potencial-del-metaverso</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2028990734.jpg</image:loc><image:caption>shutterstock2028990734</image:caption><image:title>shutterstock2028990734</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/es/transformacion-digital-hospitales</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2191880035.jpg</image:loc><image:caption>shutterstock2191880035</image:caption><image:title>shutterstock2191880035</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-08-27</lastmod></url><url><loc>https://blog.la.nec.com/es/grandes-provedores-impactados-positivamente-adopcion-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2183020827.jpg</image:loc><image:caption>Shutterstock2183020827</image:caption><image:title>Shutterstock2183020827</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-02-19</lastmod></url><url><loc>https://blog.la.nec.com/ataque-zero-day</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ataque_Zero_Day.jpg</image:loc><image:caption>AtaqueZeroDay</image:caption><image:title>AtaqueZeroDay</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/privacidade-de-dados-na-era-da-biometria-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/softwares-de-seguranca-atualizados-sistema-seguro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/os-tipos-de-ataques-mais-explorados-por-hackers-na-crise-da-covid-19</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/beneficios-de-contar-com-a-nec-para-automacao-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20redes%20com%20NEC.jpg</image:loc><image:caption>automaçãoderedescomNEC</image:caption><image:title>automaçãoderedescomNEC</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://blog.la.nec.com/licoes-que-o-japao-pode-ensinar-sobre-tecnologia-aplicada-a-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1944295474.jpg</image:loc><image:caption>shutterstock1944295474</image:caption><image:title>shutterstock1944295474</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/redes-privadas-e-iot-no-ambiente-5g-automacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1930294040.png</image:loc><image:caption>shutterstock1930294040</image:caption><image:title>shutterstock1930294040</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/desafios-de-otimizacao-de-data-center</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_667393135.jpg</image:loc><image:caption>shutterstock667393135</image:caption><image:title>shutterstock667393135</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://blog.la.nec.com/como-automacao-transforma-planejamento-de-capex</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Smart%20CAPEX.jpg</image:loc><image:caption>SmartCAPEX</image:caption><image:title>SmartCAPEX</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Planejamento%20de%20CAPEX.jpg</image:loc><image:caption>PlanejamentodeCAPEX</image:caption><image:title>PlanejamentodeCAPEX</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede-1.jpg</image:loc><image:caption>automaçãoderede1</image:caption><image:title>automaçãoderede1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><lastmod>2024-11-26</lastmod></url><url><loc>https://blog.la.nec.com/cyberwar-onde-o-brasil-esta</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/tecnologias-aplicadas-a-diferentes-acontecimentos-no-espaco</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1933374386.png</image:loc><image:caption>shutterstock1933374386</image:caption><image:title>shutterstock1933374386</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologia-en-la-lucha-contra-el-cambio-climatico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1471868963%20(1).jpg</image:loc><image:caption>iStock14718689631</image:caption><image:title>iStock14718689631</image:title></image:image><lastmod>2025-07-24</lastmod></url><url><loc>https://blog.la.nec.com/dia-da-internet-segura-como-se-proteger-dos-cibercriminosos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/qu%C3%A3o-seguras-est%C3%A3o-nossas-informa%C3%A7%C3%B5es-pessoais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Quo_seguras_esto_nossas_informaes_pessoais.jpg</image:loc><image:caption>Quosegurasestonossasinformaespessoais</image:caption><image:title>Quosegurasestonossasinformaespessoais</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/transformacao-digital-hospitais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2191880035.jpg</image:loc><image:caption>shutterstock2191880035</image:caption><image:title>shutterstock2191880035</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2117396804.jpg</image:loc><image:caption>Shutterstock2117396804</image:caption><image:title>Shutterstock2117396804</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475.jpg</image:loc><image:caption>shutterstock2304284475</image:caption><image:title>shutterstock2304284475</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-promove-seguranca-infantil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_711788974.jpg</image:loc><image:caption>Shutterstock711788974</image:caption><image:title>Shutterstock711788974</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/es/sensores-conectados-en-las-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2158285185%20(1).jpg</image:loc><image:caption>iStock21582851851</image:caption><image:title>iStock21582851851</image:title></image:image><lastmod>2025-07-08</lastmod></url><url><loc>https://blog.la.nec.com/a-industria-na-mira-do-cibercrime</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/cryptojacking-nas-corporacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/integracao-de-dados-elevando-a-saude-a-um-novo-patamar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2026-01-22</lastmod></url><url><loc>https://blog.la.nec.com/integracao-multivendor-e-multidominio-por-que-a-escolha-estrategica-de-parceiros-impulsiona-a-transformacao-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2073120226.jpg</image:loc><image:caption>iStock2073120226</image:caption><image:title>iStock2073120226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/homem-tocando-icones-de-elementos-de-negocios-na-tela.jpg</image:loc><image:caption>homemtocandoiconesdeelementosdenegociosnatela</image:caption><image:title>homemtocandoiconesdeelementosdenegociosnatela</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1454998892%20(1).jpg</image:loc><image:caption>iStock14549988921</image:caption><image:title>iStock14549988921</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/023ba563-edc2-4583-974f-f027144cfc70-1.jpg</image:loc><image:caption>023ba563edc24583974ff027144cfc701</image:caption><image:title>023ba563edc24583974ff027144cfc701</image:title></image:image><lastmod>2026-01-13</lastmod></url><url><loc>https://blog.la.nec.com/previsoes-de-seguranca-da-informacao-para-2016</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Previses_de_Segurana_da_Informao_para_2016-artigo.jpg</image:loc><image:caption>PrevisesdeSeguranadaInformaopara2016artigo</image:caption><image:title>PrevisesdeSeguranadaInformaopara2016artigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/voce-e-responsavel-pela-seguranca-das-suas-informacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/integracion-multiproveedor-y-multidominio-por-que-la-eleccion-estrategica-de-socios-impulsa-la-transformacion-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/homem-tocando-icones-de-elementos-de-negocios-na-tela-1.jpg</image:loc><image:caption>homemtocandoiconesdeelementosdenegociosnatela1</image:caption><image:title>homemtocandoiconesdeelementosdenegociosnatela1</image:title></image:image><lastmod>2026-01-13</lastmod></url><url><loc>https://blog.la.nec.com/6-razoes-para-ter-sgs</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/transformacao-digital-no-setor-financeiro-o-futuro-acontecendo-hoje</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1770.jpg</image:loc><image:caption>shutterstock1770</image:caption><image:title>shutterstock1770</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/es/visibilidad-monitoreo-unificados-centros-datos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/two-people-data-center-with-server-background.jpg</image:loc><image:caption>twopeopledatacenterwithserverbackground</image:caption><image:title>twopeopledatacenterwithserverbackground</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://blog.la.nec.com/o-futuro-dos-data-centers-5-tendencias-para-os-proximos-anos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-infografico-futuro-data-centers-blog-v2.jpg</image:loc><image:caption>necinfograficofuturodatacentersblogv2</image:caption><image:title>necinfograficofuturodatacentersblogv2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1664592358.png</image:loc><image:caption>shutterstock1664592358</image:caption><image:title>shutterstock1664592358</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-11-29</lastmod></url><url><loc>https://blog.la.nec.com/glossario-basico-de-cibersegurancas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/como-garantir-mais-seguranca-e-escalabilidade-no-trafego-de-dados-para-uma-atuacao-mais-eficiente-e-financeiramente-relevante</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><lastmod>2025-10-16</lastmod></url><url><loc>https://blog.la.nec.com/aspectos-de-seguranca-com-office-365</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/o-que-considerar-ao-avaliar-uma-solucao-de-siem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Log_Files_-_CLI_expanded.jpg</image:loc><image:caption>LogFilesCLIexpanded</image:caption><image:title>LogFilesCLIexpanded</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/sexta-feira-do-terror-licoes-de-um-ataque-de-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/br/transforma%C3%A7%C3%A3o-da-mobilidade-urbana-uma-vis%C3%A3o-tecnol%C3%B3gica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://blog.la.nec.com/gestao-de-expectativas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.la.nec.com/voce-precisa-de-alguem-que-te-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/piramide-maslow.jpg</image:loc><image:caption>piramidemaslow</image:caption><image:title>piramidemaslow</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/seriam-os-dados-pessoais-o-novo-petroleo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/5-dicas-para-proteger-os-dados-corporativos-de-ameacas-internas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/decifrando-a-rede-mirai</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/seguran%C3%A7a-na-era-da-exposicao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/spam-esteja-sempre-alerta</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/quais-criterios-devem-ser-considerados-na-hora-de-escolher-meu-provedor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/como-os-hackers-usam-estrategias-de-protecao-em-ataques</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/7-requisitos-obrigatorios-ao-escolher-um-mssp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/redes-privadas-4g-5g-beneficios-reded-movel-dentro-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Rede%20m%C3%B3vel%205G%20minimalista.png</image:loc><image:caption>Redemóvel5Gminimalista</image:caption><image:title>Redemóvel5Gminimalista</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Redes%20privadas%204G%20e%205G%20Os%20benef%C3%ADcios%20da%20rede%20m%C3%B3vel%20dentro%20das%20sua%20empresas.jpg</image:loc><image:caption>Redesprivadas4Ge5GOsbenefíciosdaredemóveldentrodassuaempresas</image:caption><image:title>Redesprivadas4Ge5GOsbenefíciosdaredemóveldentrodassuaempresas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/cidades-inteligentes-fortalece-relacao-governo-cidadao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1126391770%20(1).jpg</image:loc><image:caption>iStock11263917701</image:caption><image:title>iStock11263917701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1256952995%20(1).jpg</image:loc><image:caption>iStock12569529951</image:caption><image:title>iStock12569529951</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2091028289%20(1).jpg</image:loc><image:caption>iStock20910282891</image:caption><image:title>iStock20910282891</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-597232780%20(1).jpg</image:loc><image:caption>iStock5972327801</image:caption><image:title>iStock5972327801</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2025-08-29</lastmod></url><url><loc>https://blog.la.nec.com/a-arma-das-empresas-contra-ciberataques-nas-olimpiada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/arco-e-flecha.jpg</image:loc><image:caption>arcoeflecha</image:caption><image:title>arcoeflecha</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/business-email-compromise</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/como-a-criptografia-fortalece-a-protecao-dos-dados-de-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1813101946.jpg</image:loc><image:caption>shutterstock1813101946</image:caption><image:title>shutterstock1813101946</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/temp/asdasdasas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_763512988.jpg</image:loc><image:caption>shutterstock763512988</image:caption><image:title>shutterstock763512988</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-04-29</lastmod></url><url><loc>https://blog.la.nec.com/o-firewall-nosso-de-cada-dia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/digital-firewall.jpg</image:loc><image:caption>digitalfirewall</image:caption><image:title>digitalfirewall</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/legisla%C3%A7%C3%A3o-brasileira-e-o-gdpr</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1726031935.jpg</image:loc><image:caption>shutterstock1726031935</image:caption><image:title>shutterstock1726031935</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_598614410.jpg</image:loc><image:caption>Shutterstock598614410</image:caption><image:title>Shutterstock598614410</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2238834443.jpg</image:loc><image:caption>shutterstock2238834443</image:caption><image:title>shutterstock2238834443</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ilumina%C3%A7%C3%A3o%20p%C3%BAblica%20inteligente.jpg</image:loc><image:caption>Iluminaçãopúblicainteligente</image:caption><image:title>Iluminaçãopúblicainteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/5g-ia-pagamento-low-touch</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2179380685.jpg</image:loc><image:caption>Shutterstock2179380685</image:caption><image:title>Shutterstock2179380685</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-de-dados-ameacas-e-riscos-para-bancos-na-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20nos%20bancos.jpg</image:loc><image:caption>segurançadedadosnosbancos</image:caption><image:title>segurançadedadosnosbancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><lastmod>2025-04-02</lastmod></url><url><loc>https://blog.la.nec.com/es/ciberseguridad-banca-servicios-gestionados-zero-trust</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/standard-quality-control-collage-concept%20(1).jpg</image:loc><image:caption>standardqualitycontrolcollageconcept1</image:caption><image:title>standardqualitycontrolcollageconcept1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://blog.la.nec.com/hiddenwasp-o-mais-recente-malware-que-afeta-o-linux-e-que-permite-controle-total</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/metaverso-na-industria-financeira-restabelecendo-o-relacionamento-na-era-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2123775530.jpg</image:loc><image:caption>shutterstock2123775530</image:caption><image:title>shutterstock2123775530</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/grandes-provedores-impactados-positivamente-adocao-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2183020827-1.jpg</image:loc><image:caption>Shutterstock21830208271</image:caption><image:title>Shutterstock21830208271</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2024-03-26</lastmod></url><url><loc>https://blog.la.nec.com/como-as-coisas-ocorrem-na-pratica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como%20as%20coisas%20s%C3%A3o%20na%20pr%C3%A1tica.jpg</image:loc><image:caption>Comoascoisassãonaprática</image:caption><image:title>Comoascoisassãonaprática</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/siem-vale-quanto-processa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/os-ciberataques-mais-famosos-dos-ultimos-tempos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/o-desenvolvimento-das-redes-m%C3%B3veis-no-brasil-rumo-ao-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1182183595.jpg</image:loc><image:caption>shutterstock1182183595</image:caption><image:title>shutterstock1182183595</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/mobilidade-inteligente-como-a-ia-reduz-acidentes-e-automatiza-a-deteccao-de-infracoes-de-transito</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/autonomous-vehicles-data-visualizations-are-crucial-smart-cities-urban-life-improvement-aig62.jpg</image:loc><image:caption>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:caption><image:title>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://blog.la.nec.com/es/el-aeropuerto-japones-quiere-embarque-sin-contacto-en-todos-los-vuelos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1456783511.jpg</image:loc><image:caption>shutterstock1456783511</image:caption><image:title>shutterstock1456783511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.la.nec.com/o-que-todo-gestor-de-ti-deveria-conhecer-sobre-monitoracao-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Gestor_TI_deveria_conhecer_Monitoracao__Seguranca.jpg</image:loc><image:caption>GestorTIdeveriaconhecerMonitoracaoSeguranca</image:caption><image:title>GestorTIdeveriaconhecerMonitoracaoSeguranca</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/recomendac%C3%B5es-para-aumentar-a-eficiencia-em-si</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/conscientizar-para-poupar-riscos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/desenvolvendo-na-nuvem-sem-filas-e-com-falsos-positivos-inferiores-a-1</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1438196492.png</image:loc><image:caption>shutterstock1438196492</image:caption><image:title>shutterstock1438196492</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/tendencias-e-solucoes-relacionados-ao-5g-na-telefonia-movel</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_763512988.jpg</image:loc><image:caption>shutterstock763512988</image:caption><image:title>shutterstock763512988</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.la.nec.com/siem-6-armadilhas-na-implantacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/o-futuro-do-5g-no-brasil-desafios-e-possibilidades-para-integrar-uma-cobertura-maior-dos-servicos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1419289790.png</image:loc><image:caption>shutterstock1419289790</image:caption><image:title>shutterstock1419289790</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-11-24</lastmod></url><url><loc>https://blog.la.nec.com/es/banking-as-a-service-nuevo-modelo-de-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2295846305.jpg</image:loc><image:caption>shutterstock2295846305</image:caption><image:title>shutterstock2295846305</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/como-os-servicos-de-mss-podem-proteger-empresas-na-era-do-serverless</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/visao-de-seguranca-para-profissionais-de-ti</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/11-dicas-para-seu-programa-de-gerenciamento-de-vulnerabilidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagem01_artigo_Arcon-blog.jpg</image:loc><image:caption>Imagem01artigoArconblog</image:caption><image:title>Imagem01artigoArconblog</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/5-impactos-que-as-olimpiadas-podem-trazer-para-a-seguranca-das-empresas-brasileiras</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/2.jpg</image:loc><image:caption>2</image:caption><image:title>2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/quais-sao-os-quatro-tipos-de-arquivos-mais-perigosos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/inovacao-em-bancos-com-automacao-de-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20processos%20banc%C3%A1rios.jpg</image:loc><image:caption>automaçãoderedeemprocessosbancários</image:caption><image:title>automaçãoderedeemprocessosbancários</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2025-02-11</lastmod></url><url><loc>https://blog.la.nec.com/es/que-considerar-para-proteger-los-ambientes-de-centros-de-datos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-07-23</lastmod></url><url><loc>https://blog.la.nec.com/5-estrategias-para-aumentar-a-seguranca-dos-dados-corporativos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/por-que-preciso-de-um-antivirus-pago</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Por_que_preciso_de_um_antivirus_pago.jpg</image:loc><image:caption>Porqueprecisodeumantiviruspago</image:caption><image:title>Porqueprecisodeumantiviruspago</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/plataforma-citysensai</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2025-03-05</lastmod></url><url><loc>https://blog.la.nec.com/escolha-a-solucao-certa-para-mitigar-os-riscos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/voce-nao-sabe-mas-seu-smartphone-pode-estar-infectado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/voce%20nao%20sabe%20mas%20seu%20smatphone.jpg</image:loc><image:caption>vocenaosabemasseusmatphone</image:caption><image:title>vocenaosabemasseusmatphone</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/fraude-online-conheca-os-5-golpes-mais-comuns</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/sgs-saiba-por-que-sua-empresa-precisa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/virtualizacao-com-seguranca-de-ti</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Virtualiza%C3%A7%C3%A3o%20com%20Seguran%C3%A7a.jpg</image:loc><image:caption>VirtualizaçãocomSegurança</image:caption><image:title>VirtualizaçãocomSegurança</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/malware-na-era-da-iot</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/opencare-5g-o-projeto-que-abrira-fronteiras-na-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1635078349.jpg</image:loc><image:caption>shutterstock1635078349</image:caption><image:title>shutterstock1635078349</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/nec-vislumbra-um-futuro-mais-digital-colaborativo-e-sustentavel-baseado-no-uso-inteligente-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Design%20sem%20nome%20(16)-1.png</image:loc><image:caption>Designsemnome161</image:caption><image:title>Designsemnome161</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/o-endpoint-nao-e-o-melhor-lugar-para-bloquear-ameacas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/o-uso-indevido-de-informacoes-privilegiadas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/INFOMRACOES_INDEVIDAS.jpg</image:loc><image:caption>INFOMRACOESINDEVIDAS</image:caption><image:title>INFOMRACOESINDEVIDAS</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://blog.la.nec.com/es/integraciones-tecnologicas-redes-moviles-de-quinta-generacion</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/20210813062400_3580_03.png</image:loc><image:caption>20210813062400358003</image:caption><image:title>20210813062400358003</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/blockchain-economia-de-confianca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/convergindo-seguranca-cibernetica-com-a-seguranca-fisica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/imaginando-as-smart-cities-como-as-tecnologias-estao-sendo-integradas-nos-centros-urbanos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1092586049.jpg</image:loc><image:caption>shutterstock1092586049</image:caption><image:title>shutterstock1092586049</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://blog.la.nec.com/prevencao-e-o-melhor-remedio-inclusive-para-o-segmento-de-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/como-las-tecnologias-ayudan-en-la-aplicacion-de-esg-en-las-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Artigo%20ESG%20-%20NEC.png</image:loc><image:caption>ArtigoESGNEC</image:caption><image:title>ArtigoESGNEC</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-06-26</lastmod></url><url><loc>https://blog.la.nec.com/mss-pontos-criticos-na-adocao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/sua-empresa-e-madura</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-10-09</lastmod></url><url><loc>https://blog.la.nec.com/cloud-computing-tudo-o-que-voce-precisava-saber</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/ddos-atencao-redobrada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/5g-sera-crucial-para-liberar-todo-o-potencial-do-metaverso</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2028990734.jpg</image:loc><image:caption>shutterstock2028990734</image:caption><image:title>shutterstock2028990734</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://blog.la.nec.com/5g-redes-abertas-transformacoes-em-diferentes-segmentos-de-mercado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1448536100.png</image:loc><image:caption>shutterstock1448536100</image:caption><image:title>shutterstock1448536100</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/citysensai-retornos-financieros-en-ciudades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-478016552%20(1).jpg</image:loc><image:caption>iStock4780165521</image:caption><image:title>iStock4780165521</image:title></image:image><lastmod>2025-08-25</lastmod></url><url><loc>https://blog.la.nec.com/compliance-um-desafio-constante</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/compliance.jpg</image:loc><image:caption>compliance</image:caption><image:title>compliance</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/nec-mostra-futuro-de-edificios-inteligentes-para-um-mundo-pos-covid-19</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_307219181.jpg</image:loc><image:caption>shutterstock307219181</image:caption><image:title>shutterstock307219181</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/como-saber-o-nivel-de-maturidade-em-seguranca-da-informacao-da-minha-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como_saber_o_nvel_de_maturidade_em_Segurana_da_Informao_da_minha_empresa.jpg</image:loc><image:caption>ComosaberonveldematuridadeemSeguranadaInformaodaminhaempresa</image:caption><image:title>ComosaberonveldematuridadeemSeguranadaInformaodaminhaempresa</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/qual-%C3%A9-seu-n%C3%ADvel-de-ciberseguran%C3%A7a-hoje</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/5g-con-redes-abiertas-trae-transformaciones-en-diferentes-segmentos-de-mercado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/1-4_GettyImages-462012665.jpg</image:loc><image:caption>14GettyImages462012665</image:caption><image:title>14GettyImages462012665</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/ja</loc><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.la.nec.com/o-impacto-do-5g-na-rotina-do-sistema-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1393653353.jpg</image:loc><image:caption>shutterstock1393653353</image:caption><image:title>shutterstock1393653353</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><lastmod>2021-05-28</lastmod></url><url><loc>https://blog.la.nec.com/5g-aplicado-saude-com-a-nec-do-japao-para-o-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1653612769.jpg</image:loc><image:caption>shutterstock1653612769</image:caption><image:title>shutterstock1653612769</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/as-aplicacoes-sairam-do-ar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagem%20artigo.png</image:loc><image:caption>Imagemartigo</image:caption><image:title>Imagemartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-02-28</lastmod></url><url><loc>https://blog.la.nec.com/gestao-de-riscos-ciberneticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/vulnerability-management-por-onde-comecar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/microchips-sao-utilizados-para-se-infiltrar-nos-eua</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/3-erros-cometidos-ao-identificar-comportamentos-atipicos-no-ambiente-de-nuvem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_593983367.png</image:loc><image:caption>shutterstock593983367</image:caption><image:title>shutterstock593983367</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/como-a-medicina-esta-usando-a-tecnologia-para-prevenir-doencas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_381900487.png</image:loc><image:caption>shutterstock381900487</image:caption><image:title>shutterstock381900487</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/es/lecciones-que-japon-puede-ensenar-sobre-tecnologia-aplicada-a-la-salud</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-blog-1.png</image:loc><image:caption>necblog1</image:caption><image:title>necblog1</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/internet-das-coisas-aplicada-a-operadoras-e-cidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://blog.la.nec.com/a-complexa-jornada-de-transforma%C3%A7%C3%A3o-digital-do-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imagem-artigo.png</image:loc><image:caption>imagemartigo</image:caption><image:title>imagemartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-02-23</lastmod></url><url><loc>https://blog.la.nec.com/a-repeticao-gera-o-aprendizado-ou-nao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/cyber-security-principais-ameacas-e-aplicacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/se-uma-violacao-ja-aconteceu-o-que-fazer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/violao_aconteceu.jpg</image:loc><image:caption>violaoaconteceu</image:caption><image:title>violaoaconteceu</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/por-que-a-sustentabilidade-e-importante-para-voce</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1607926483.jpg</image:loc><image:caption>shutterstock1607926483</image:caption><image:title>shutterstock1607926483</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-12-06</lastmod></url><url><loc>https://blog.la.nec.com/import%C3%A2ncia-e-desafios-do-programa-de-gerenciamento-de-vulnerabilidades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/VM.jpg</image:loc><image:caption>VM</image:caption><image:title>VM</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/update.jpg</image:loc><image:caption>update</image:caption><image:title>update</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-11</lastmod></url><url><loc>https://blog.la.nec.com/personalizacao-de-servicos-financeiros-ponto-chave-na-fidelizacao-de-clientes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1504571756.jpg</image:loc><image:caption>shutterstock1504571756</image:caption><image:title>shutterstock1504571756</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://blog.la.nec.com/o-ponto-onde-a-tecnologia-e-o-valor-social-se-encontram</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1592860219.jpg</image:loc><image:caption>shutterstock1592860219</image:caption><image:title>shutterstock1592860219</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><lastmod>2021-10-26</lastmod></url><url><loc>https://blog.la.nec.com/es/conectividad-hibrida-y-multicloud-la-clave-para-ia-y-nube-de-alta-velocidad</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/v617-bb-10-technology.jpg</image:loc><image:caption>v617bb10technology</image:caption><image:title>v617bb10technology</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://blog.la.nec.com/acesso-remoto-para-os-cibercriminosos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/proteccion-y-ciberseguridad-retos-y-soluciones-para-el-mundo-hibrido</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-blog-2%20-%20c%C3%B3pia.png</image:loc><image:caption>necblog2cópia</image:caption><image:title>necblog2cópia</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/cibercrimes-rendem-filmes-ou-vice-versa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_753780232.jpg</image:loc><image:caption>shutterstock753780232</image:caption><image:title>shutterstock753780232</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/programa-de-pagamentos-por-biometria-e-destaque-na-nec-visionary-week-2022</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1734843473.jpg</image:loc><image:caption>shutterstock1734843473</image:caption><image:title>shutterstock1734843473</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-11-22</lastmod></url><url><loc>https://blog.la.nec.com/para-onde-vamos-3/4</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-02-04</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologia-sector-salud</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-07-16</lastmod></url><url><loc>https://blog.la.nec.com/migracao-da-rede-para-a-nuvem-e-acesso-remoto-de-endpoints-s%C3%A3o-tend%C3%AAncias-que-exigem-cuidados-com-a-ciberseguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2164910349.jpg</image:loc><image:caption>shutterstock2164910349</image:caption><image:title>shutterstock2164910349</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/a-transformacao-da-conectividade-empresarial-do-wi-fi-7-na-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1454998892%20(1).jpg</image:loc><image:caption>iStock14549988921</image:caption><image:title>iStock14549988921</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://blog.la.nec.com/ransomware-a-industria-do-sequestro-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Locky.jpg</image:loc><image:caption>Locky</image:caption><image:title>Locky</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/proteja-os-dados-sensiveis-da-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/inteligencia-artificial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-11-03</lastmod></url><url><loc>https://blog.la.nec.com/como-garantir-a-operacionalidade-de-um-data-center-em-todos-os-per%C3%ADodos-do-ano</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><lastmod>2022-03-16</lastmod></url><url><loc>https://blog.la.nec.com/como-a-tecnologia-esta-transformando-a-mobilidade-das-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia%20e%20mobilidade%20das%20cidades%20inteligentes.jpg</image:loc><image:caption>tecnologiaemobilidadedascidadesinteligentes</image:caption><image:title>tecnologiaemobilidadedascidadesinteligentes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/como-funcionarios-remotos-podem-ajudar-a-seguranca-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2174654959.jpg</image:loc><image:caption>shutterstock2174654959</image:caption><image:title>shutterstock2174654959</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/inteligencia-artificial-na-personalizacao-de-servicos-financeiros</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_701349340.jpg</image:loc><image:caption>shutterstock701349340</image:caption><image:title>shutterstock701349340</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/seis-dicas-para-nao-cair-nos-golpes-do-whatsapp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/ciberseguranca-bancaria-servicos-gerenciados-zero-trust</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/standard-quality-control-collage-concept%20(1).jpg</image:loc><image:caption>standardqualitycontrolcollageconcept1</image:caption><image:title>standardqualitycontrolcollageconcept1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://blog.la.nec.com/importancia-e-beneficios-do-virtual-patching</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/a-lista-de-seguranca-do-cio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_4_v1.jpg</image:loc><image:caption>artigo4v1</image:caption><image:title>artigo4v1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/nec-construindo-o-futuro-das-telecomunicacoes-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1431418019.jpg</image:loc><image:caption>Shutterstock1431418019</image:caption><image:title>Shutterstock1431418019</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/o-uso-de-tecnologias-no-agronegocio-como-aliadas-na-transformacao-no-campo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1569043051.jpg</image:loc><image:caption>shutterstock1569043051</image:caption><image:title>shutterstock1569043051</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1820232536.jpg</image:loc><image:caption>shutterstock1820232536</image:caption><image:title>shutterstock1820232536</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1919699384.jpg</image:loc><image:caption>shutterstock1919699384</image:caption><image:title>shutterstock1919699384</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ind%C3%BAstria-e-agroneg%C3%B3cio.jpg</image:loc><image:caption>Indústriaeagronegócio</image:caption><image:title>Indústriaeagronegócio</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2309189217.jpg</image:loc><image:caption>Shutterstock2309189217</image:caption><image:title>Shutterstock2309189217</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/en</loc><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.la.nec.com/sensores-iot-nas-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1356118511%20(1).jpg</image:loc><image:caption>iStock13561185111</image:caption><image:title>iStock13561185111</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2025-07-08</lastmod></url><url><loc>https://blog.la.nec.com/o-que-podemos-aprender-com-reporte-da-verizon-dbir-2016</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/grafico1_-_Verizon.png</image:loc><image:caption>grafico1Verizon</image:caption><image:title>grafico1Verizon</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/grafico_4_verizon.png</image:loc><image:caption>grafico4verizon</image:caption><image:title>grafico4verizon</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/grafico_3_verizon.png</image:loc><image:caption>grafico3verizon</image:caption><image:title>grafico3verizon</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/verizon_no_blog.png</image:loc><image:caption>verizonnoblog</image:caption><image:title>verizonnoblog</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Grafico2_verizon.png</image:loc><image:caption>Grafico2verizon</image:caption><image:title>Grafico2verizon</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/5-alertas-antes-de-contratar-um-servico-de-monitoracao-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/como-aumentar-a-seguranca-na-nuvem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Como%20aumentar%20a%20seguran%C3%A7a%20na%20nuvem.jpg</image:loc><image:caption>Comoaumentarasegurançananuvem</image:caption><image:title>Comoaumentarasegurançananuvem</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/es/identificacon-biometrica-para-el-sector-medico</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-06-11</lastmod></url><url><loc>https://blog.la.nec.com/substituir-ou-manter-os-custos-e-desafios-do-sistema-legado-para-o-setor-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_699442570.png</image:loc><image:caption>shutterstock699442570</image:caption><image:title>shutterstock699442570</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/byod-bring-your-own-device-ou-breaking-your-own-defenses</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/como-administrar-ataques-direcionados-as-suas-informacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Fev_06_Como_as_empresas_podem_melhor_administrar_os_ciberataques_direcionados_s_suas_informaes.jpg</image:loc><image:caption>Fev06Comoasempresaspodemmelhoradministrarosciberataquesdirecionadosssuasinformaes</image:caption><image:title>Fev06Comoasempresaspodemmelhoradministrarosciberataquesdirecionadosssuasinformaes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/a-percepc%C3%A3o-do-valor-da-seguranca-cibernetica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/futuro-das-cidades-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2188190771-1.jpg</image:loc><image:caption>Shutterstock21881907711</image:caption><image:title>Shutterstock21881907711</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://blog.la.nec.com/es/la-seguridad-en-el-ciclo-de-desarollo-de-aplicaciones-acelera-tu-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2102457385.jpg</image:loc><image:caption>Shutterstock2102457385</image:caption><image:title>Shutterstock2102457385</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-02-19</lastmod></url><url><loc>https://blog.la.nec.com/praticas-simples-mas-fundamentais</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/pr%C3%A1ticas%20simples%20mas%20fundamentais.jpg</image:loc><image:caption>práticassimplesmasfundamentais</image:caption><image:title>práticassimplesmasfundamentais</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-05-09</lastmod></url><url><loc>https://blog.la.nec.com/es/colaboracion-5g-y-una-correcta-direccion-del-uso-de-la-tecnologia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/colaborac%CC%A7a%CC%83o%2c%20redes%20de%20dados%20abertas%20e%20vetorizac%CC%A7a%CC%83o%20.jpeg</image:loc><image:caption>colaboracaoredesdedadosabertasevetorizacao</image:caption><image:title>colaboracaoredesdedadosabertasevetorizacao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.la.nec.com/ranswomware-devo-temer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/socs-do-futuro-o-que-se-espera-dos-servicos-de-monitoramento-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/actionable-threat-intelligence</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/conhece.png</image:loc><image:caption>conhece</image:caption><image:title>conhece</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/ataques-ciberneticos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/futuro-de-las-ciudades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2188190771-1.jpg</image:loc><image:caption>Shutterstock21881907711</image:caption><image:title>Shutterstock21881907711</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-06-13</lastmod></url><url><loc>https://blog.la.nec.com/es/union-sector-publico-y-privado-para-construir-ciudades-inteligetes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2284848389-1.jpg</image:loc><image:caption>shutterstock22848483891</image:caption><image:title>shutterstock22848483891</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/ciberwar-acho-que-ja-vi-esse-filme</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/es/analisis-sistematico-de-datos-ayudara-copenhague-a-disminuir-a-cero-las-emisiones</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ana%CC%81lise%20sistema%CC%81tica%20de%20dados.jpg</image:loc><image:caption>analisesistematicadedados</image:caption><image:title>analisesistematicadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/es/amenazas-y-riesgos-para-la-seguridad-de-los-datos-en-los-bancos-de-am%C3%A9rica-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20nos%20bancos.jpg</image:loc><image:caption>segurançadedadosnosbancos</image:caption><image:title>segurançadedadosnosbancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-04-02</lastmod></url><url><loc>https://blog.la.nec.com/identificacao-biometrica-neonatal-desafios-e-licoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/nec-imagem-neonatal.png</image:loc><image:caption>necimagemneonatal</image:caption><image:title>necimagemneonatal</image:title></image:image><lastmod>2023-01-31</lastmod></url><url><loc>https://blog.la.nec.com/o-alto-custo-de-nao-ter-uma-si-adequada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/ransom-o-que</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/MAI_16_Rans..._o_que3.jpg</image:loc><image:caption>MAI16Ransoque3</image:caption><image:title>MAI16Ransoque3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-publica-baseada-em-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1256952995%20(1).jpg</image:loc><image:caption>iStock12569529951</image:caption><image:title>iStock12569529951</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1173279965%20(1).jpg</image:loc><image:caption>iStock11732799651</image:caption><image:title>iStock11732799651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><lastmod>2025-07-29</lastmod></url><url><loc>https://blog.la.nec.com/banking-as-a-service-novo-modelo-de-negocio</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Banking%20as%20a%20Service.jpg</image:loc><image:caption>BankingasaService</image:caption><image:title>BankingasaService</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-04-30</lastmod></url><url><loc>https://blog.la.nec.com/analise-automatica-de-codigo-ganhos-na-produtividade-e-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2083362610.jpg</image:loc><image:caption>shutterstock2083362610</image:caption><image:title>shutterstock2083362610</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><lastmod>2023-08-03</lastmod></url><url><loc>https://blog.la.nec.com/qual-o-lugar-da-mulher-no-ambiente-corporativo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2120828153.jpg</image:loc><image:caption>shutterstock2120828153</image:caption><image:title>shutterstock2120828153</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-11-29</lastmod></url><url><loc>https://blog.la.nec.com/es</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/3.webp</image:loc><image:caption>3</image:caption><image:title>3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami-1.jpg</image:loc><image:caption>ImagenblogMurakami1</image:caption><image:title>ImagenblogMurakami1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/023ba563-edc2-4583-974f-f027144cfc70.jpg</image:loc><image:caption>023ba563edc24583974ff027144cfc70</image:caption><image:title>023ba563edc24583974ff027144cfc70</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/two-people-data-center-with-server-background.jpg</image:loc><image:caption>twopeopledatacenterwithserverbackground</image:caption><image:title>twopeopledatacenterwithserverbackground</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/v617-bb-10-technology.jpg</image:loc><image:caption>v617bb10technology</image:caption><image:title>v617bb10technology</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199.jpg</image:loc><image:caption>iStock1255236199</image:caption><image:title>iStock1255236199</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico-1.jpg</image:loc><image:caption>representacaoconceitocensodemografico1</image:caption><image:title>representacaoconceitocensodemografico1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/homem-tocando-icones-de-elementos-de-negocios-na-tela-1.jpg</image:loc><image:caption>homemtocandoiconesdeelementosdenegociosnatela1</image:caption><image:title>homemtocandoiconesdeelementosdenegociosnatela1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/standard-quality-control-collage-concept%20(1).jpg</image:loc><image:caption>standardqualitycontrolcollageconcept1</image:caption><image:title>standardqualitycontrolcollageconcept1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.webp</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto-1.webp</image:loc><image:caption>segurancatrabalhoremoto1</image:caption><image:title>segurancatrabalhoremoto1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/autonomous-vehicles-data-visualizations-are-crucial-smart-cities-urban-life-improvement-aig62.jpg</image:loc><image:caption>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:caption><image:title>autonomousvehiclesdatavisualizationsarecrucialsmartcitiesurbanlifeimprovementaig62</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.la.nec.com/segmento-financeiro-na-mira-do-cibercrime</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/inteligencia-artificial-en-el-mundo-de-las-finanzas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_795758674.jpg</image:loc><image:caption>Shutterstock795758674</image:caption><image:title>Shutterstock795758674</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://blog.la.nec.com/lgpd-automatizacao-de-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2353094007.png</image:loc><image:caption>Shutterstock2353094007</image:caption><image:title>Shutterstock2353094007</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><lastmod>2024-06-04</lastmod></url><url><loc>https://blog.la.nec.com/o-desafio-de-manter-a-iso-27001</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Auditoria2.jpg</image:loc><image:caption>Auditoria2</image:caption><image:title>Auditoria2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/papel-lideres-globais-avanco-sustentabilidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2146798615%20(1).jpg</image:loc><image:caption>Shutterstock21467986151</image:caption><image:title>Shutterstock21467986151</image:title></image:image><lastmod>2023-04-25</lastmod></url><url><loc>https://blog.la.nec.com/a-inteligencia-artificial-como-motor-de-transformacao-digital-na-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1530386477.jpg</image:loc><image:caption>shutterstock1530386477</image:caption><image:title>shutterstock1530386477</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/o-que-considerar-para-proteger-ambientes-de-data-centers</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1394035226.jpg</image:loc><image:caption>shutterstock1394035226</image:caption><image:title>shutterstock1394035226</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2024-07-23</lastmod></url><url><loc>https://blog.la.nec.com/como-cisco-e-nec-levam-automacao-para-ambientes-complexos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Navegando%20pela%20gest%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Navegandopelagestãoderedes</image:caption><image:title>Navegandopelagestãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><lastmod>2023-05-15</lastmod></url><url><loc>https://blog.la.nec.com/es/resiliencia-empresarial-con-integracion-redes-hibridas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1300138249%20(1).jpg</image:loc><image:caption>iStock13001382491</image:caption><image:title>iStock13001382491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1245943050%20(1).jpg</image:loc><image:caption>iStock12459430501</image:caption><image:title>iStock12459430501</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://blog.la.nec.com/uso-de-dados-em-cidades-inteligentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2037557162.png</image:loc><image:caption>Shutterstock2037557162</image:caption><image:title>Shutterstock2037557162</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><lastmod>2024-04-09</lastmod></url><url><loc>https://blog.la.nec.com/gestao-de-projetos-de-seguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://blog.la.nec.com/a-nec-e-o-wi-fi-7-acelerando-a-conectividade-na-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/023ba563-edc2-4583-974f-f027144cfc70-1.jpg</image:loc><image:caption>023ba563edc24583974ff027144cfc701</image:caption><image:title>023ba563edc24583974ff027144cfc701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1454998892%20(1).jpg</image:loc><image:caption>iStock14549988921</image:caption><image:title>iStock14549988921</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/homem-tocando-icones-de-elementos-de-negocios-na-tela.jpg</image:loc><image:caption>homemtocandoiconesdeelementosdenegociosnatela</image:caption><image:title>homemtocandoiconesdeelementosdenegociosnatela</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2073120226.jpg</image:loc><image:caption>iStock2073120226</image:caption><image:title>iStock2073120226</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://blog.la.nec.com/es/semana-de-la-movilidad-entienda-como-la-tecnologia-transforma-la-gestion-del-transito-en-las-ciudades</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-592033988.jpg</image:loc><image:caption>iStock592033988</image:caption><image:title>iStock592033988</image:title></image:image><lastmod>2025-09-19</lastmod></url><url><loc>https://blog.la.nec.com/malware-rouba-as-informacoes-de-preenchimento-automatico-do-navegador</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/gestao-inteligente-data-center-automacao-analise-dados</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Vector_2652.jpg</image:loc><image:caption>Vector2652</image:caption><image:title>Vector2652</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20blog_Murakami.jpg</image:loc><image:caption>ImagenblogMurakami</image:caption><image:title>ImagenblogMurakami</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/repairman-mainframes.jpg</image:loc><image:caption>repairmanmainframes</image:caption><image:title>repairmanmainframes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/23324.jpg</image:loc><image:caption>23324</image:caption><image:title>23324</image:title></image:image><lastmod>2026-02-19</lastmod></url><url><loc>https://blog.la.nec.com/codigos-maliciosos-a-ameaca-sem-fim</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/voce-sabe-o-que-esta-acontecendo-na-sua-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/tudo-esta-bem-quando-termina-bem</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2019-03-12</lastmod></url><url><loc>https://blog.la.nec.com/brechas-na-seguranca-da-sua-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/inovacao-da-robotica-o-uso-da-tecnologia-com-a-inteligencia-artificial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1987497002-1.jpg</image:loc><image:caption>shutterstock19874970021</image:caption><image:title>shutterstock19874970021</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/classifica%C3%A7%C3%A3o-e-divulga%C3%A7%C3%A3o-de-sonhos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/redes_sociais.png</image:loc><image:caption>redessociais</image:caption><image:title>redessociais</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/5-motivos-para-ter-um-chief-security-officer</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5%20motivos%20para%20ter%20um%20cso.jpg</image:loc><image:caption>5motivosparaterumcso</image:caption><image:title>5motivosparaterumcso</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://blog.la.nec.com/como-usar-a-automacao-para-ampliar-a-previsibilidade-de-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede.jpg</image:loc><image:caption>automaçãoderede</image:caption><image:title>automaçãoderede</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/intelig%C3%AAncia%20artificial%20na%20automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>inteligênciaartificialnaautomaçãoderedes</image:caption><image:title>inteligênciaartificialnaautomaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/um-dia-calmo-no-soc</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/saiba-como-a-tecnologia-pode-resolver-a-vacinacao-infantil-em-paises-em-desenvolvimento</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC_img_blog_julho.png</image:loc><image:caption>NECimgblogjulho</image:caption><image:title>NECimgblogjulho</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/protegendo-sua-privacidade-parte-2</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/mobilidade-inteligente-e-planejamento-integrado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-597232780%20(1).jpg</image:loc><image:caption>iStock5972327801</image:caption><image:title>iStock5972327801</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1126391770%20(1).jpg</image:loc><image:caption>iStock11263917701</image:caption><image:title>iStock11263917701</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-592033988.jpg</image:loc><image:caption>iStock592033988</image:caption><image:title>iStock592033988</image:title></image:image><lastmod>2025-07-18</lastmod></url><url><loc>https://blog.la.nec.com/o-custo-dos-vazamentos-de-dados-para-as-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/artigo_5.jpg</image:loc><image:caption>artigo5</image:caption><image:title>artigo5</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/impactos-financeiros-estrategicos-da-nao-automacao-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://blog.la.nec.com/d%C3%BAvidas-sobre-seguran%C3%A7a-pergunte-ao-especialista-parte-1</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://blog.la.nec.com/cidades-inteligentes-desafios-mobilidade-urbana-america-latina</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC_CON_Blog_DGDF_M%C3%AAs_05_%20Artigo%20%2302%20PT.png</image:loc><image:caption>NECCONBlogDGDFMês05Artigo02PT</image:caption><image:title>NECCONBlogDGDFMês05Artigo02PT</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1011441936.jpg</image:loc><image:caption>iStock1011441936</image:caption><image:title>iStock1011441936</image:title></image:image><lastmod>2025-07-03</lastmod></url><url><loc>https://blog.la.nec.com/linha-de-base-baseada-em-que</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/linhas_de_base.jpg</image:loc><image:caption>linhasdebase</image:caption><image:title>linhasdebase</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/a-importancia-da-seguranca-digital-no-desenvolvimento-de-aplicacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/using-mobile-app-4Y66N2S.jpg</image:loc><image:caption>usingmobileapp4Y66N2S</image:caption><image:title>usingmobileapp4Y66N2S</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/impactos-da-identificacao-digital-na-interacao-humana</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Digital%20identification.jpg</image:loc><image:caption>Digitalidentification</image:caption><image:title>Digitalidentification</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://blog.la.nec.com/es/como-utilizar-la-automatizacion-para-ampliar-la-previsibilidad-de-la-red</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/intelig%C3%AAncia%20artificial%20na%20automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>inteligênciaartificialnaautomaçãoderedes</image:caption><image:title>inteligênciaartificialnaautomaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede.jpg</image:loc><image:caption>automaçãoderede</image:caption><image:title>automaçãoderede</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2024-09-27</lastmod></url><url><loc>https://blog.la.nec.com/quando-um-virus-pede-o-seu-emprego</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/mosca-branca-e-os-riscos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/mosca_branca.jpg</image:loc><image:caption>moscabranca</image:caption><image:title>moscabranca</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/o-que-voce-precisa-saber-sobre-deteccao-de-incidentes-de-ciberseguranca</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/mon.jpg</image:loc><image:caption>mon</image:caption><image:title>mon</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/a-proxima-parada-do-5g-no-brasil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1926546164-1.jpg</image:loc><image:caption>shutterstock19265461641</image:caption><image:title>shutterstock19265461641</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://blog.la.nec.com/como-funciona-um-time-de-respostas-a-incidentes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/tendencias-5g-no-mercado-movel-agora-e-no-futuro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1934207456.jpg</image:loc><image:caption>shutterstock1934207456</image:caption><image:title>shutterstock1934207456</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-05-31</lastmod></url><url><loc>https://blog.la.nec.com/os-cuidados-com-as-transacoes-financeiras-durante-a-pandemia-fique-atento</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.la.nec.com/conectividade-e-protecao-de-dados-qual-o-impacto-da-experiencia-nas-smart-cities</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/1-6_GettyImages-498009299.png</image:loc><image:caption>16GettyImages498009299</image:caption><image:title>16GettyImages498009299</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/empresa-tecnologia-parceira-cidade-inteligente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Cidade%20Inteligente.jpg</image:loc><image:caption>CidadeInteligente</image:caption><image:title>CidadeInteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-07-12</lastmod></url><url><loc>https://blog.la.nec.com/novo-alerta-de-ataque-de-ransomware-uiwix-e-malware-monero-mining</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://blog.la.nec.com/meltdown-e-spectre-vulnerabilidades-afetam-processadores-intel-amd-e-arm</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/o-papel-de-um-security-advisor</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Security_Advisor.jpg</image:loc><image:caption>SecurityAdvisor</image:caption><image:title>SecurityAdvisor</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/temp</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_763512988.jpg</image:loc><image:caption>shutterstock763512988</image:caption><image:title>shutterstock763512988</image:title></image:image><lastmod>2021-04-29</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologia-seguridad-recien-nacidos-ninos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1968250909.jpg</image:loc><image:caption>Shutterstock1968250909</image:caption><image:title>Shutterstock1968250909</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smartsacnn%201.png</image:loc><image:caption>smartsacnn1</image:caption><image:title>smartsacnn1</image:title></image:image><lastmod>2024-04-03</lastmod></url><url><loc>https://blog.la.nec.com/es-ec</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://blog.la.nec.com/caso-apple-e-fbi-vis%C3%A3o-t%C3%A9cnica</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/AppleFBI.jpg</image:loc><image:caption>AppleFBI</image:caption><image:title>AppleFBI</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seg.png</image:loc><image:caption>seg</image:caption><image:title>seg</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/a-importancia-da-segmentacao-da-rede-na-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/segmenta%C3%A7%C3%A3o%20de%20rede.jpg</image:loc><image:caption>segmentaçãoderede</image:caption><image:title>segmentaçãoderede</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/o-antiv%C3%ADrus-est%C3%A1-mesmo-acabado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/018_dicascuriosidades_materia.jpg</image:loc><image:caption>018dicascuriosidadesmateria</image:caption><image:title>018dicascuriosidadesmateria</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/planejar-e-preciso-2/4</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-03-12</lastmod></url><url><loc>https://blog.la.nec.com/es/la-inteligencia-artificial-como-motor-de-transformacion-digital-en-la-salud</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1530386477.jpg</image:loc><image:caption>shutterstock1530386477</image:caption><image:title>shutterstock1530386477</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-08-17</lastmod></url><url><loc>https://blog.la.nec.com/como-fintechs-e-bancos-tradicionais-est%C3%A3o-transformando-o-mercado-financeiro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_512201887.jpg</image:loc><image:caption>shutterstock512201887</image:caption><image:title>shutterstock512201887</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.la.nec.com/redes-moveis-privadas-agro-4-0</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ind%C3%BAstria-e-agroneg%C3%B3cio.jpg</image:loc><image:caption>Indústriaeagronegócio</image:caption><image:title>Indústriaeagronegócio</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2309189217.jpg</image:loc><image:caption>Shutterstock2309189217</image:caption><image:title>Shutterstock2309189217</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1569043051.jpg</image:loc><image:caption>shutterstock1569043051</image:caption><image:title>shutterstock1569043051</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1919699384.jpg</image:loc><image:caption>shutterstock1919699384</image:caption><image:title>shutterstock1919699384</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://blog.la.nec.com/tecnologia-lowtouch-destaca-se-na-retomada-das-atividades-no-varejo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/_t20_xXG1jg.jpg</image:loc><image:caption>t20xXG1jg</image:caption><image:title>t20xXG1jg</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://blog.la.nec.com/como-as-tecnologias-low-touch-estao-revolucionando-o-setor-financeiro-na-nova-normalidade</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_724249336.png</image:loc><image:caption>shutterstock724249336</image:caption><image:title>shutterstock724249336</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://blog.la.nec.com/es/tecnologia-favorece-seguridad-infantil</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_711788974.jpg</image:loc><image:caption>Shutterstock711788974</image:caption><image:title>Shutterstock711788974</image:title></image:image><lastmod>2024-03-05</lastmod></url><url><loc>https://blog.la.nec.com/ataque-fileless-uma-ameaca-ardilosa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/4-exemplos-em-que-a-tecnologia-tem-sido-utilizada-por-governos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_599424164.png</image:loc><image:caption>shutterstock599424164</image:caption><image:title>shutterstock599424164</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/clientes-conectados-no-varejo-a-nova-experi%C3%AAncia-do-cliente-ampliada-pelo-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Clientes_conectados_no_varejo_A_nova_experiencia_do_cliente_ampliada_pelo_5G.jpg</image:loc><image:caption>ClientesconectadosnovarejoAnovaexperienciadoclienteampliadapelo5G</image:caption><image:title>ClientesconectadosnovarejoAnovaexperienciadoclienteampliadapelo5G</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/mas-alla-de-la-contrasena-por-que-la-biometria-multimodal-es-la-solucion-para-transacciones-bancarias-seguras</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/freepik__talk__29818.png</image:loc><image:caption>freepiktalk29818</image:caption><image:title>freepiktalk29818</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2026-01-06</lastmod></url><url><loc>https://blog.la.nec.com/resiliencia-de-negocios-com-redes-hibridas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1409136751%20(1).jpg</image:loc><image:caption>iStock14091367511</image:caption><image:title>iStock14091367511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico.jpg</image:loc><image:caption>representacaoconceitocensodemografico</image:caption><image:title>representacaoconceitocensodemografico</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2163547048%20(2).jpg</image:loc><image:caption>iStock21635470482</image:caption><image:title>iStock21635470482</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://blog.la.nec.com/es/cidades-inteligentes-tecnologia-promove-qualidade-vida-sociedade-0</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_650092282.jpg</image:loc><image:caption>Shutterstock650092282</image:caption><image:title>Shutterstock650092282</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-09-28</lastmod></url><url><loc>https://blog.la.nec.com/es/seguridad-publica-y-tecnologia-en-las-ciudades-latinoamericanas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/ParadaSeguraMinima.jpg</image:loc><image:caption>ParadaSeguraMinima</image:caption><image:title>ParadaSeguraMinima</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1095482408%20(1).jpg</image:loc><image:caption>iStock10954824081</image:caption><image:title>iStock10954824081</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://blog.la.nec.com/varejo-e-alvo-de-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/2_ransomware.png</image:loc><image:caption>2ransomware</image:caption><image:title>2ransomware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/varejo__alvo.png</image:loc><image:caption>varejoalvo</image:caption><image:title>varejoalvo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://blog.la.nec.com/es/ciudades-inteligentes-mejoran-relacion-gobierno-ciudadanos</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-687480112.jpg</image:loc><image:caption>iStock687480112</image:caption><image:title>iStock687480112</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1126391770%20(1).jpg</image:loc><image:caption>iStock11263917701</image:caption><image:title>iStock11263917701</image:title></image:image><lastmod>2025-08-29</lastmod></url><url><loc>https://blog.la.nec.com/es/beneficios-de-contar-en-un-nec-para-la-automatizacion-de-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20redes%20com%20NEC.jpg</image:loc><image:caption>automaçãoderedescomNEC</image:caption><image:title>automaçãoderedescomNEC</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://blog.la.nec.com/infraestrutura-redes-submarinas-do-futuro-inteligencia-artificial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1085652248.png</image:loc><image:caption>shutterstock1085652248</image:caption><image:title>shutterstock1085652248</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://blog.la.nec.com/resposta-a-incidentes-sua-empresa-est%C3%A1-preparada</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Imagen%20Blog_Columna%20de%20Murakami_Integraci%C3%B3n%20de%20Datos.jpg</image:loc><image:caption>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:caption><image:title>ImagenBlogColumnadeMurakamiIntegracióndeDatos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>Automaçãoderedes</image:caption><image:title>Automaçãoderedes</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Dilbert.png</image:loc><image:caption>Dilbert</image:caption><image:title>Dilbert</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/graph.png</image:loc><image:caption>graph</image:caption><image:title>graph</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2380147357.jpg</image:loc><image:caption>Shutterstock2380147357</image:caption><image:title>Shutterstock2380147357</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Automa%C3%A7%C3%A3o%20e%20Opera%C3%A7%C3%A3o%20de%20redes.jpg</image:loc><image:caption>AutomaçãoeOperaçãoderedes</image:caption><image:title>AutomaçãoeOperaçãoderedes</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/extorsoes-online-e-ransomware-lideram-os-ciberataques</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/inbound_template_blog_1309_vs1-640x240.png</image:loc><image:caption>inboundtemplateblog1309vs1640x240</image:caption><image:title>inboundtemplateblog1309vs1640x240</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imagem-2_trend.jpg</image:loc><image:caption>imagem2trend</image:caption><image:title>imagem2trend</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imagem-1trend.jpg</image:loc><image:caption>imagem1trend</image:caption><image:title>imagem1trend</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/imagem-3_trend.jpg</image:loc><image:caption>imagem3trend</image:caption><image:title>imagem3trend</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/consideracoes-para-a-seguranca-de-dispositivos-iot</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/mobilidade-e-transacoes-digitais-redes-resilientes-moldam-o-futuro-dos-negocios</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-2163547048%20(2).jpg</image:loc><image:caption>iStock21635470482</image:caption><image:title>iStock21635470482</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/representacao-conceito-censo-demografico.jpg</image:loc><image:caption>representacaoconceitocensodemografico</image:caption><image:title>representacaoconceitocensodemografico</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1409136751%20(1).jpg</image:loc><image:caption>iStock14091367511</image:caption><image:title>iStock14091367511</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://blog.la.nec.com/es/gestion-inteligente-centros-datos-automatizacion-analisis</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/data-center-male-it-technician-running-maintenance-programme-laptop-controls-operational-server-rack-optimal-functioning-modern-hightech-telecommunications-operational-super-computer.jpg</image:loc><image:caption>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:caption><image:title>datacentermaleittechnicianrunningmaintenanceprogrammelaptopcontrolsoperationalserverrackoptimalfunctioningmodernhightechtelecommunicationsoperationalsupercomputer</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/repairman-mainframes.jpg</image:loc><image:caption>repairmanmainframes</image:caption><image:title>repairmanmainframes</image:title></image:image><lastmod>2026-02-19</lastmod></url><url><loc>https://blog.la.nec.com/es/salud-identificacion-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475-1.jpg</image:loc><image:caption>shutterstock23042844751</image:caption><image:title>shutterstock23042844751</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://blog.la.nec.com/os-7-principais-tipos-de-vulnerabilidades-em-uma-empresa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/o-papel-das-tics-na-economia-verde</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1905273403%20(1).jpg</image:loc><image:caption>Shutterstock19052734031</image:caption><image:title>Shutterstock19052734031</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><lastmod>2023-03-28</lastmod></url><url><loc>https://blog.la.nec.com/os-6-tipos-mais-assustadores-de-ransomware</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fig4.png</image:loc><image:caption>fig4</image:caption><image:title>fig4</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fig3.png</image:loc><image:caption>fig3</image:caption><image:title>fig3</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fig2.png</image:loc><image:caption>fig2</image:caption><image:title>fig2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fig5.png</image:loc><image:caption>fig5</image:caption><image:title>fig5</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Os%206%20tipos%20mais%20assustadores%20de%20ransomware.png</image:loc><image:caption>Os6tiposmaisassustadoresderansomware</image:caption><image:title>Os6tiposmaisassustadoresderansomware</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Fig1.png</image:loc><image:caption>Fig1</image:caption><image:title>Fig1</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fig6.png</image:loc><image:caption>fig6</image:caption><image:title>fig6</image:title></image:image><lastmod>2023-05-29</lastmod></url><url><loc>https://blog.la.nec.com/a-iso/iec-27001-na-gestao-da-seguranca-da-informacao</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/la-migracion-de-red-a-la-nube-y-el-acceso-remoto-a-terminales-son-tendencias-que-requieren-atencion-de-ciberseguridad</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2164910349.jpg</image:loc><image:caption>shutterstock2164910349</image:caption><image:title>shutterstock2164910349</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/o-que-a-dark-web-pode-nos-ensinar-sobre-seguranca-empresarial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/mundo-pos-pandemia-como-o-reconhecimento-facial-pode-ajudar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Screen%20Shot%202020-08-20%20at%2018.31.38.png</image:loc><image:caption>ScreenShot20200820at183138</image:caption><image:title>ScreenShot20200820at183138</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-04-26</lastmod></url><url><loc>https://blog.la.nec.com/beneficios-e-riscos-da-iot-para-a-seguranca-dos-dados-das-empresas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/em-dia-com-as-boas-praticas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Em%20dia%20com%20as%20boas%20pr%C3%A1ticas.jpg</image:loc><image:caption>Emdiacomasboaspráticas</image:caption><image:title>Emdiacomasboaspráticas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/duvidas-sobre-engenharia-social-pergunte-ao-especialista</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/botnet</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/a-seguranca-no-setor-bancario</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/as-varreduras-femininas-enfrentam-usando-o-sistema-de-reconhecimento-facial-no-celular-para-identificacao-biometrica-futuro-oi-tecnologia-e-identificacao-de-rosto.jpg</image:loc><image:caption>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:caption><image:title>asvarredurasfemininasenfrentamusandoosistemadereconhecimentofacialnocelularparaidentificacaobiometricafuturooitecnologiaeidentificacaoderosto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/financas.jpg</image:loc><image:caption>financas</image:caption><image:title>financas</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/automa%C3%A7%C3%A3o%20de%20rede%20em%20bancos.jpg</image:loc><image:caption>automaçãoderedeembancos</image:caption><image:title>automaçãoderedeembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/setor-da-aviacao-prioriza-seguranca-para-garantir-retomada-no-mundo</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_745544953.png</image:loc><image:caption>shutterstock745544953</image:caption><image:title>shutterstock745544953</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://blog.la.nec.com/por-que-comunicar</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20como%20propulsor%20de%20receita%20das%20operadoras%20na%20Am%C3%A9rica%20Latina.jpg</image:loc><image:caption>5GcomopropulsordereceitadasoperadorasnaAméricaLatina</image:caption><image:title>5GcomopropulsordereceitadasoperadorasnaAméricaLatina</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2261354073.jpg</image:loc><image:caption>Shutterstock2261354073</image:caption><image:title>Shutterstock2261354073</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/comunicao.jpg</image:loc><image:caption>comunicao</image:caption><image:title>comunicao</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Planejamento%20de%20CAPEX.jpg</image:loc><image:caption>PlanejamentodeCAPEX</image:caption><image:title>PlanejamentodeCAPEX</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/krack-key-reinstallation-attacks-falha-no-protocolo-wpa</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://blog.la.nec.com/firewall-tradicional-vs.-next-generation-firewall</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/fw.jpg</image:loc><image:caption>fw</image:caption><image:title>fw</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/ceo-da-nec-aponta-caminhos-para-o-futuro-da-sociedade-com-apoio-tecnologia</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/IMG.jpg</image:loc><image:caption>IMG</image:caption><image:title>IMG</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-29</lastmod></url><url><loc>https://blog.la.nec.com/estruturas-conectadas-5g-iot-big-data</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/estruturas%20conectadas%20-%205g%20big%20data.jpeg</image:loc><image:caption>estruturasconectadas5gbigdata</image:caption><image:title>estruturasconectadas5gbigdata</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-11-04</lastmod></url><url><loc>https://blog.la.nec.com/a-invasao-da-internet-das-coisas</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/tecnologia-setor-de-saude.jpg</image:loc><image:caption>tecnologiasetordesaude</image:caption><image:title>tecnologiasetordesaude</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Solu%C3%A7%C3%B5es%20da%20NEC%20para%20setor%20financeiro.jpg</image:loc><image:caption>SoluçõesdaNECparasetorfinanceiro</image:caption><image:title>SoluçõesdaNECparasetorfinanceiro</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot2.jpg</image:loc><image:caption>iot2</image:caption><image:title>iot2</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguranca-trabalho-remoto.png</image:loc><image:caption>segurancatrabalhoremoto</image:caption><image:title>segurancatrabalhoremoto</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1483013789.jpg</image:loc><image:caption>iStock1483013789</image:caption><image:title>iStock1483013789</image:title></image:image><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.la.nec.com/es/sector-de-la-aviacion-prioriza-la-seguridad-para-garantizar-la-reanudacion-de-los-viajes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_745544953.png</image:loc><image:caption>shutterstock745544953</image:caption><image:title>shutterstock745544953</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://blog.la.nec.com/como-saber-se-sua-organiza%C3%A7%C3%A3o-est%C3%A1-recebendo-ataques-a-rede</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/The_Global_Risks_Landscape_2015.png</image:loc><image:caption>TheGlobalRisksLandscape2015</image:caption><image:title>TheGlobalRisksLandscape2015</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.la.nec.com/seguranca-deve-preservar-o-patrimonio-fisico-no-mundo-digital</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://blog.la.nec.com/es/c%C3%B3mo-ahorrar-energ%C3%ADa-con-el-alumbrado-p%C3%BAblico-inteligente</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Ilumina%C3%A7%C3%A3o%20p%C3%BAblica%20inteligente.jpg</image:loc><image:caption>Iluminaçãopúblicainteligente</image:caption><image:title>Iluminaçãopúblicainteligente</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1445614323.jpg</image:loc><image:caption>iStock1445614323</image:caption><image:title>iStock1445614323</image:title></image:image><lastmod>2025-04-24</lastmod></url><url><loc>https://blog.la.nec.com/como-criar-um-ambiente-de-colaboracao-em-que-o-5g-seja-usado-em-seu-maximo-potencial</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iot.jpg</image:loc><image:caption>iot</image:caption><image:title>iot</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1214405449%20(1).jpg</image:loc><image:caption>iStock12144054491</image:caption><image:title>iStock12144054491</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2241902509.png</image:loc><image:caption>Shutterstock2241902509</image:caption><image:title>Shutterstock2241902509</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/5G%20tecnologia%20estrat%C3%A9gia%20e%20transforma%C3%A7%C3%A3o%20digital.jpg</image:loc><image:caption>5Gtecnologiaestratégiaetransformaçãodigital</image:caption><image:title>5Gtecnologiaestratégiaetransformaçãodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1901688841.jpg</image:loc><image:caption>shutterstock1901688841</image:caption><image:title>shutterstock1901688841</image:title></image:image><lastmod>2021-12-15</lastmod></url><url><loc>https://blog.la.nec.com/quanto-um-ciberataque-pode-custar-para-as-organizacoes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1392499007.jpg</image:loc><image:caption>Shutterstock1392499007</image:caption><image:title>Shutterstock1392499007</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://blog.la.nec.com/como-atrair-profissionais-preparados-para-o-mercado</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/NEC%20artigo.png</image:loc><image:caption>NECartigo</image:caption><image:title>NECartigo</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/smart-cities.jpg</image:loc><image:caption>smartcities</image:caption><image:title>smartcities</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2078751763-1.png</image:loc><image:caption>Shutterstock20787517631</image:caption><image:title>Shutterstock20787517631</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2265508777.jpg</image:loc><image:caption>shutterstock2265508777</image:caption><image:title>shutterstock2265508777</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2063141855.jpg</image:loc><image:caption>Shutterstock2063141855</image:caption><image:title>Shutterstock2063141855</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://blog.la.nec.com/es/redes-moviles-privadas-para-el-agro</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_1919699384.jpg</image:loc><image:caption>Shutterstock1919699384</image:caption><image:title>Shutterstock1919699384</image:title></image:image><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.la.nec.com/criptografia-na-seguranca-de-software</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Data%20centers.jpg</image:loc><image:caption>Datacenters</image:caption><image:title>Datacenters</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados.jpg</image:loc><image:caption>segurançadedados</image:caption><image:title>segurançadedados</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/seguran%C3%A7a%20de%20dados%20em%20bancos.jpg</image:loc><image:caption>segurançadedadosembancos</image:caption><image:title>segurançadedadosembancos</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Voc_precisa_de_algum_que_te_d_segurana.jpg</image:loc><image:caption>Vocprecisadealgumquetedsegurana</image:caption><image:title>Vocprecisadealgumquetedsegurana</image:title></image:image><lastmod>2023-07-04</lastmod></url><url><loc>https://blog.la.nec.com/hackers-nao-tiram-ferias-ataques-a-redes</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Arcon_Hackers_nao_tiram_ferias.jpg</image:loc><image:caption>ArconHackersnaotiramferias</image:caption><image:title>ArconHackersnaotiramferias</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://blog.la.nec.com/identificacao-biometrica-para-a-area-da-saude</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2412588621.jpg</image:loc><image:caption>Shutterstock2412588621</image:caption><image:title>Shutterstock2412588621</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Shutterstock_2117396804.jpg</image:loc><image:caption>Shutterstock2117396804</image:caption><image:title>Shutterstock2117396804</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_2304284475.jpg</image:loc><image:caption>shutterstock2304284475</image:caption><image:title>shutterstock2304284475</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/futuro-de-la-medicina.png</image:loc><image:caption>futurodelamedicina</image:caption><image:title>futurodelamedicina</image:title></image:image><lastmod>2024-06-11</lastmod></url><url><loc>https://blog.la.nec.com/era-da-integracao-mundo-fisico-virtual-ai-big-data-5g</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/identificacao-digital.jpg</image:loc><image:caption>identificacaodigital</image:caption><image:title>identificacaodigital</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1175370265%20(1).jpg</image:loc><image:caption>iStock11753702651</image:caption><image:title>iStock11753702651</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/shutterstock_1888758457.png</image:loc><image:caption>shutterstock1888758457</image:caption><image:title>shutterstock1888758457</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/iStock-1255236199-1.jpg</image:loc><image:caption>iStock12552361991</image:caption><image:title>iStock12552361991</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/Tecnologia%20de%20identifica%C3%A7%C3%A3o%20criminal.jpg</image:loc><image:caption>Tecnologiadeidentificaçãocriminal</image:caption><image:title>Tecnologiadeidentificaçãocriminal</image:title></image:image><lastmod>2021-08-19</lastmod></url><url><loc>https://blog.la.nec.com/como-funciona-o-antispam</loc><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/x.png</image:loc><image:caption>x</image:caption><image:title>x</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/facebook.png</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/whatsapp.png</image:loc><image:caption>whatsapp</image:caption><image:title>whatsapp</image:title></image:image><image:image><image:loc>https://seguranca.nec.com.br/hubfs/social-sharing/linkedin.png</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-06</lastmod></url></urlset>