<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://fleak.ai/</loc></url>
<url><loc>https://fleak.ai/deprecated/old-home</loc></url>
<url><loc>https://fleak.ai/deprecated/alpha-test</loc></url>
<url><loc>https://fleak.ai/deprecated/terms-and-conditions</loc></url>
<url><loc>https://fleak.ai/terms-and-conditions</loc></url>
<url><loc>https://fleak.ai/deprecated/privacy-policy</loc></url>
<url><loc>https://fleak.ai/privacy-policy</loc></url>
<url><loc>https://fleak.ai/deprecated/cookie-policy</loc></url>
<url><loc>https://fleak.ai/cookie-policy</loc></url>
<url><loc>https://fleak.ai/deprecated/sign-up-successful</loc></url>
<url><loc>https://fleak.ai/deprecated/success</loc></url>
<url><loc>https://fleak.ai/image</loc></url>
<url><loc>https://fleak.ai/image-2</loc></url>
<url><loc>https://fleak.ai/old-home</loc></url>
<url><loc>https://fleak.ai/concepts/lukas-home</loc></url>
<url><loc>https://fleak.ai/company</loc></url>
<url><loc>https://fleak.ai/use-cases</loc></url>
<url><loc>https://fleak.ai/deprecated/use-cases</loc></url>
<url><loc>https://fleak.ai/contact</loc></url>
<url><loc>https://fleak.ai/contact-success</loc></url>
<url><loc>https://fleak.ai/pricing</loc></url>
<url><loc>https://fleak.ai/partners</loc></url>
<url><loc>https://fleak.ai/blog</loc></url>
<url><loc>https://fleak.ai/lottie</loc></url>
<url><loc>https://fleak.ai/ocsf</loc></url>
<url><loc>https://fleak.ai/audit</loc></url>
<url><loc>https://fleak.ai/v2/home</loc></url>
<url><loc>https://fleak.ai/use-cases/case-study-cyber-company</loc></url>
<url><loc>https://fleak.ai/use-cases/case-study-airline-company</loc></url>
<url><loc>https://fleak.ai/blog/the-intelligence-upgrade-how-ai-native-data-fabrics-are-solving-security-s-core-data-problem</loc></url>
<url><loc>https://fleak.ai/blog/(siem)-the-data-normalization-problem-nobody-talks-about</loc></url>
<url><loc>https://fleak.ai/blog/breaking-the-%E2%80%98intelligence-ceiling%E2%80%99-how-gruve-and-fleak-achieved-tier-3-threat-detection-fidelity</loc></url>
<url><loc>https://fleak.ai/blog/the-observability-interpretation-layer-decoupling-routing-from-intelligence</loc></url>
<url><loc>https://fleak.ai/blog/the-first-mile-gap-why-your-autonomous-systems-know-everything-but-understand-nothing</loc></url>
<url><loc>https://fleak.ai/blog/an-engineering-approach-to-ocsf-log-normalization</loc></url>
<url><loc>https://fleak.ai/blog/fleak-revolutionizes-splunk-cim-compliance</loc></url>
<url><loc>https://fleak.ai/blog/my-apache-flink-pains</loc></url>
<url><loc>https://fleak.ai/blog/iot-data-integration</loc></url>
<url><loc>https://fleak.ai/blog/the-data-format-problem-killing-your-security-ai-performance</loc></url>
<url><loc>https://fleak.ai/blog/ai-ready-security-data-is-a-data-engineering-problem</loc></url>
<url><loc>https://fleak.ai/blog/a-step-by-step-guide-from-okta-logs-to-ocsf-in-databricks</loc></url>
<url><loc>https://fleak.ai/blog/the-owasp-llm-top-10-for-2025-a-practical-security-guide-for-engineering-teams</loc></url>
<url><loc>https://fleak.ai/blog/ocsf-to-s3-streaming-with-kinesis-firehose-and-zephflow</loc></url>
<url><loc>https://fleak.ai/blog/from-vpc-logs-to-ocsf-a-streaming-pipeline-with-kinesis-and-zephflow</loc></url>
<url><loc>https://fleak.ai/blog/a-practical-guide-to-building-real-time-log-parsing-pipelines</loc></url>
<url><loc>https://fleak.ai/blog/ocsf-anatomy</loc></url>
<url><loc>https://fleak.ai/blog/ocsf-an-introduction-to-the-open-cybersecurity-schema-framework</loc></url>
<url><loc>https://fleak.ai/blog/ocsf-mapping</loc></url>
<url><loc>https://fleak.ai/blog/mcp-intelligence</loc></url>
<url><loc>https://fleak.ai/blog/announcing-zephflow-a-lightweight-data-processing-framework-now-open-source</loc></url>
<url><loc>https://fleak.ai/blog/adaptive-processing-architecture-ai-driven-self-healing-systems</loc></url>
</urlset>