<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.methods.co.uk/en/all-insights/leading-through-a-cyber-crisis</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20crisis.png</image:loc><image:caption>Warningsignsoncubesfromredtogreentoshowcyberrisklevels</image:caption><image:title>Cybercrisis</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/sam-wigley</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Sam-Wigley.png</image:loc><image:caption>Samwigleyphoto</image:caption><image:title>AFCpageSamWigley</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/making-technology-work-for-justice</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Lauren%20Tombs%20Justice%20Quote.png</image:loc><image:caption>Avoidthetemptationtoadoptnewtechnologiessimplybecausetheyretrendingandstayfocusedontherealproblemsyouretryingtosolve</image:caption><image:title>LaurenTombsJusticeQuote</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-06-24</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/the-uk-national-shielding-service-supporting-vulnerable-people</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_National%20shielding%20service.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSNationalshieldingservice</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/controlling-the-controllables-key-takeaways-from-cyberuk</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/stand.jpg</image:loc><image:caption>PhotoofMethodsstandatCYBERUK25</image:caption><image:title>stand</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/evolving-your-cyber-security-strategy</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/exploring-innovation-with-robotic-process-automation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_Leveraging%20RPA%20.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSLeveragingRPA</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/blog/copilot-for-microsoft-365</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/image-png.png</image:loc><image:caption>imagepng</image:caption><image:title>imagepng</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20How%20your%20business%20can%20benefit%20from%20Azure%20Virtual%20Desktop%20in%202023.jpg</image:loc><image:caption>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:caption><image:title>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure%20~%20Copilot%20Infographic-01.png</image:loc><image:caption>CoreAzureCopilotInfographic01</image:caption><image:title>CoreAzureCopilotInfographic01</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20Azure%20Virtual%20Desktop%20vs%20Windows%20365%20Which%20is%20right%20for%20your%20business.jpg</image:loc><image:caption>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:caption><image:title>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/qa-series-alison-palmer</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/12.jpg</image:loc><image:caption>12</image:caption><image:title>12</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/employee-spotlight-alex-learning-and-adapting-as-a-user-researcher</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Alex%20Trimble%20blog%20post-1.jpg</image:loc><image:caption>AlexTrimbleblogpost1</image:caption><image:title>AlexTrimbleblogpost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-09-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/one-you-mental-health-how-are-you-quiz</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_One%20you%20%E2%80%93%20mental%20health%20%E2%80%93%20How%20Are%20You%20quiz.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSOneyoumentalhealthHowAreYouquiz</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/mw25-qa-series-helen</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/simulated-attacks-exposing-the-gaps-fortifying-digital-defences</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/nicole-sutton</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Nicole-Sutton.png</image:loc><image:caption>NicoleSuttonphoto</image:caption><image:title>AFCpageNicoleSutton</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-vocational-education-in-the-united-kingdom</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/gareth-jones-nominated-as-ciso-of-the-year-at-the-ospas</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Gareth%20Jones%20CISO%20of%20the%20Year%20nomination.png</image:loc><image:caption>GarethJonesnominatedasCISOoftheYearattheOSPAs</image:caption><image:title>GarethJonesCISOoftheYearnomination</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/empowering-security-operations-to-identify-critical-threats</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Education%20CS%20%20Empowering%20security%20operations.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEducationCSEmpoweringsecurityoperations</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-operations-with-an-erp-system-upgrade</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Energy%2c%20Commodity%2c%20and%20Utilitie%20CS_Transforming%20operations%20with%20an%20ERP%20system%20upgrade.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnergyCommodityandUtilitieCSTransformingoperationswithanERPsystemupgrade</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/moving-from-reactive-to-resilient-winning-the-speed-race</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CISA_BLOGPOST-1.png</image:loc><image:caption>FromDisclosuretoDisasterAn11DayWakeUpCallforOurIndustry</image:caption><image:title>CISABLOGPOST1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-10-31</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/coreazure-wins-outstanding-corporate-member-award-at-ucisa</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure%20wins%20at%20UCISA.png</image:loc><image:caption>CoreAzurewinsOutstandingCorporateMemberawardatUCISA</image:caption><image:title>CoreAzurewinsatUCISA</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/key-takeaways-from-ukhsa-conference</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/ukhsa%20cover.jpeg</image:loc><image:caption>ukhsacover</image:caption><image:title>ukhsacover</image:title></image:image><lastmod>2025-04-17</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/it-service-desk-transformation-enhancing-operational-flexibility</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Decorative%20photo%20of%20Methods%20employees%20in%20Methods%20office-2.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice2</image:caption><image:title>DecorativephotoofMethodsemployeesinMethodsoffice2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/delivering-the-prison-technology-transformation-programme</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice-2_CS_Delivering-the-Prison-Technology-Transformation-Programme.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJustice2CSDeliveringthePrisonTechnologyTransformationProgramme</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/cyber-resolutions-2024</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/New-Years-Resolution-blog-graphic-min-1086x1536.png</image:loc><image:caption>Keepyourdatasafein2024withasuperheroimage</image:caption><image:title>NewYearsResolutionbloggraphicmin1086x1536</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/cyber%20awarness%20.png</image:loc><image:caption>Cyberawarenesssuperherocartoonimage</image:caption><image:title>cyberawarness</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-29d5f7a1-0511-40e9-9161-eb5a80b8a4b1</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods/blog-post-title-number-1-0-0-0</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Case-studies.jpg</image:loc><image:caption>Casestudies</image:caption><image:title>Casestudies</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/josh-kime</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Josh%20Kime%20AFC%20image.jpg</image:loc><image:caption>JoshKimephoto</image:caption><image:title>JoshKimeAFCimage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/modernising-government-digital-connectivity</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Home_affairs_CS_UK%20first%20Cloud%20migration.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHomeaffairsCSUKfirstCloudmigration</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-our-remarkable-women-a-year-of-breaking-barriers-and-driving-innovation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Celebrating%20the%20extraordinary%20achievements%20of%20our%20people%20this%20International%20Womens%20Day-1.png</image:loc><image:caption>Celebratingourremarkablewomenayearofbreakingbarriersanddrivinginnovation</image:caption><image:title>CelebratingtheextraordinaryachievementsofourpeoplethisInternationalWomensDay1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-03-17</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-cf99f75c-ead5-49fe-b3f2-722dfedf3591</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/from-disclosure-to-disaster-an-11-day-wake-up-call-for-our-industry</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CISA_BLOGPOST-1.png</image:loc><image:caption>FromDisclosuretoDisasterAn11DayWakeUpCallforOurIndustry</image:caption><image:title>CISABLOGPOST1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/building-a-resilient-digital-future-enhancing-ot-resilience</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Enhancing%20OT%20Resilience%20Padlock%20Graphic.png</image:loc><image:caption>EnhancingOTResilienceandpadlockgraphic</image:caption><image:title>EnhancingOTResiliencePadlockGraphic</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-04-28</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/effective-cyber-risk-management-in-the-age-of-ai-driven-threats</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Citizen%20centric%20AI%20.png</image:loc><image:caption>Robothandandhumanhandmakingaheart</image:caption><image:title>CitizencentricAI</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-06-24</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/introducing-agile-user-centred-teams</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/agile%20teams.png</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>agileteams</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/60-seconds-of-accessibility-with-our-accessibility-champions</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/GAAD%202025.png</image:loc><image:caption>GlobalAccessibilityAwarenessDay2025</image:caption><image:title>GAAD2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/ian-ronald</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Ian-Ronald-Photo.png</image:loc><image:caption>Ianronaldphoto</image:caption><image:title>AFCpageIanRonaldPhoto</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-new-wave-of-ai-browser-agents</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/The%20New%20Wave%20of%20AI%20Browser%20Agents.jpg</image:loc><image:caption>NewwaveofAIBrowserAgentsArticleImage</image:caption><image:title>TheNewWaveofAIBrowserAgents</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/william-keogh</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC%20page_William%20Keogh%20Military%20Photo.png</image:loc><image:caption>WilliamKeoghphoto</image:caption><image:title>AFCpageWilliamKeoghMilitaryPhoto</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/future-ready-greenwich-universities-cloud-first-leap-toward-2030</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Future-ready-%20University%20of%20Greenwich%20cloud-first%20leap%20toward%202030.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSFuturereadyUniversityofGreenwichcloudfirstleaptoward2030</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-07-22</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-service-management</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Climate-change-adaptation-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSClimatechangeadaptation1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/fully-local-pdf-qa-chatbot-no-cloud-no-api-keys-no-compromise</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AI%20processing.jpg</image:loc><image:caption>SymbolrepresentingprivateAIprocessingofdocuments</image:caption><image:title>AIprocessing</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-07-10</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/from-concept-to-delivery-in-3-months</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Local-Government-CS_From%20concept%20to%20delivery%20in%203%20months.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorLocalGovernmentCSFromconcepttodeliveryin3months</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/transforming-data-analytics-microsoft-fabric-makes-ai-driven-insights-accessible-to-all</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/blog%20post.png</image:loc><image:caption>blogpost</image:caption><image:title>blogpost</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-helen-dickens</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading.png</image:loc><image:caption>CopyofAddaheading</image:caption><image:title>CopyofAddaheading</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(7).png</image:loc><image:caption>CopyofAddaheading7</image:caption><image:title>CopyofAddaheading7</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(4).gif</image:loc><image:caption>CopyofAddaheading4</image:caption><image:title>CopyofAddaheading4</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(3).png</image:loc><image:caption>CopyofAddaheading3</image:caption><image:title>CopyofAddaheading3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/how-to-design-accessible-forms-in-10-steps</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Userdesign-forms1.png</image:loc><image:caption>Contactformexample</image:caption><image:title>Userdesignforms1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Userdesignforms-password.png</image:loc><image:caption>Contactformexample</image:caption><image:title>Userdesignformspassword</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/fields.png</image:loc><image:caption>Contactusformexample</image:caption><image:title>fields</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Labels.png</image:loc><image:caption>Formexampleoflocations</image:caption><image:title>Labels</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/cardnumber-forms.png</image:loc><image:caption>Contactformexample</image:caption><image:title>cardnumberforms</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/password.png</image:loc><image:caption>Contactformexample</image:caption><image:title>password</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Userdesign%20forms.png</image:loc><image:caption>Contactformexample</image:caption><image:title>Userdesignforms</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/enhancing-operational-efficiency</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Enhancing%20operational%20efficiency.jpg</image:loc><image:caption>CSEnhancingoperationalefficiency</image:caption><image:title>CSEnhancingoperationalefficiency</image:title></image:image><lastmod>2025-10-15</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-to-exhibit-at-apm-conference-2025-in-coventry</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/APM%20social%20post.png</image:loc><image:caption>WeareattendingAPMConference2025onthe1112JuneinCoventry</image:caption><image:title>APMsocialpost</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-05-21</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/how-the-updated-ncsc-caf-3.2-can-help-improve-cyber-security-posture</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20posture%20.png</image:loc><image:caption>AIimageofacitywithdatasecuritysymbolsinthesky</image:caption><image:title>Cyberposture</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/automated-qr-code-system</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/join-us-for-an-inspiring-evening-of-business-analysis</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/IIBA%20BA%20Book%20Club-1.png</image:loc><image:caption>IIBABookClubregisternowtoattend</image:caption><image:title>IIBABABookClub1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-06-25</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-success-university-of-huddersfields-enterprise-mobility-programme</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Uni-of-Huddersfield-Methods-scaled.jpg</image:loc><image:caption>UniofHuddersfieldMethodsscaled</image:caption><image:title>UniofHuddersfieldMethodsscaled</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/accelerating-cyber-defence-the-need-for-resilience-by-design</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20-%20launch%20email%20banner-1.png</image:loc><image:caption>CyberUK2026launchemailbanner1</image:caption><image:title>CyberUK2026launchemailbanner1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/smoke-and-mirrors-labours-63bn-investment-summit-leaves-more-questions-than-answers</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Smoke%20and%20mirrors%20.png</image:loc><image:caption>Poundcoinsfalling</image:caption><image:title>Smokeandmirrors</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/qa-series-ramola</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Ramola%20Quote%20(2).png</image:loc><image:caption>IabsolutelylovewhatIdoKnowingyouaremakingaslightdifferencetopeoplethroughyourworkisinvaluableandbeingatthehelmoftechnologyandchangeisanopportunityIwillalwaysbegratefulfor</image:caption><image:title>RamolaQuote2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/from-armed-forces-to-cyber-security</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Armedforce%20cybersecurity.png</image:loc><image:caption>ArmedForcesWeekcelebration</image:caption><image:title>Armedforcecybersecurity</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-42ea0d1a-055a-4337-bcd4-dee2e5eb5a30</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-f471d8b9-9f4b-4d01-bf43-0759a35322d2</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/modernising-and-migrating-existing-systems-to-a-modern-cloud-based-platform</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/innovations-in-justice-highlights-from-the-modernising-justice-conference</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Image-17-min-1024x768.jpg</image:loc><image:caption>Image17min1024x768</image:caption><image:title>Image17min1024x768</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/quishing-is-the-new-phishing</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Quishing%20.png</image:loc><image:caption>QRcodesayingscanmeamobilehonethenarobbercomingoutofthephonewithabankcardandmoneybaginhishand</image:caption><image:title>Quishing</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-ab8f10c7-a194-4b67-8ed5-17af02fa1eeb</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/elevating-benefits-maturity</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Decorative%20photo%20of%20Methods%20employees%20in%20Methods%20office-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>DecorativephotoofMethodsemployeesinMethodsoffice1</image:title></image:image><lastmod>2025-03-17</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/employee-spotlight-solly-collaboration-and-growth-as-a-senior-user-researcher</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Employee%20Spotlight%20Blog%20post-1.png</image:loc><image:caption>EmployeeSpotlightBlogpost1</image:caption><image:title>EmployeeSpotlightBlogpost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/David%20Maddy%20Blog%20Post-1.jpg</image:loc><image:caption>DavidMaddyBlogPost1</image:caption><image:title>DavidMaddyBlogPost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Hattie%20blog%201.png</image:loc><image:caption>DecorativephotoofaMethodsemployeeandblogtitle</image:caption><image:title>Hattieblog1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Solly%20Blog%20post-2-1.jpg</image:loc><image:caption>SollyBlogpost21</image:caption><image:title>SollyBlogpost21</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-09-16</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-katie-jackson</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading.png</image:loc><image:caption>CopyofAddaheading</image:caption><image:title>CopyofAddaheading</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(9).gif</image:loc><image:caption>CopyofAddaheading9</image:caption><image:title>CopyofAddaheading9</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(3).png</image:loc><image:caption>CopyofAddaheading3</image:caption><image:title>CopyofAddaheading3</image:title></image:image><lastmod>2024-11-05</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/employee-spotlight-liz-growing-and-thriving-as-a-senior-product-manager</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Employee%20Spotlight%20Blog%20post-1.png</image:loc><image:caption>EmployeeSpotlightBlogpost1</image:caption><image:title>EmployeeSpotlightBlogpost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/black-history-month</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Blackhistory%20month.png</image:loc><image:caption>Werecelebratingblackhistorymonth</image:caption><image:title>Blackhistorymonth</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-celebrates-success-at-midlands-women-in-tech-awards-2024</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MWIT-Mission-min.png</image:loc><image:caption>Themissionoftheawardsonbigscreen</image:caption><image:title>MWITMissionmin</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Methods-Team-MWIT-min-1024x679.png</image:loc><image:caption>MethodsTeamMWITmin1024x679</image:caption><image:title>MethodsTeamMWITmin1024x679</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Lauren-T-min-1024x675.png</image:loc><image:caption>LaurenTmin1024x675</image:caption><image:title>LaurenTmin1024x675</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Nukey-P.png</image:loc><image:caption>NukeyP</image:caption><image:title>NukeyP</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Helen-D-on-stage.png</image:loc><image:caption>HelenDonstage</image:caption><image:title>HelenDonstage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MWIT-3-Finalists.jpg</image:loc><image:caption>NukeyLaurenandHelenattheMWITawards2024photo</image:caption><image:title>MWIT3Finalists</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Helen-D.png</image:loc><image:caption>HelenD</image:caption><image:title>HelenD</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Nukey-P-on-stage-min.png</image:loc><image:caption>NukeyProctoronstage</image:caption><image:title>NukeyPonstagemin</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MWIT24-Sign-min.png</image:loc><image:caption>MWIT24lights</image:caption><image:title>MWIT24Signmin</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/enhancing-online-safety</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/External-Blog-10-4.png</image:loc><image:caption>Staysafewithcybercardsforinternetsafetyday</image:caption><image:title>ExternalBlog104</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/uksaferinternetday.png</image:loc><image:caption>UKsaferinternetday</image:caption><image:title>uksaferinternetday</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/External-Blog-10-5.png</image:loc><image:caption>Whyarethesetoolsimportantwithsomequotesfrompeople</image:caption><image:title>ExternalBlog105</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/coreazure-announce-strategic-partnership-with-freshworks</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Photo%20of%20Freshworks%20Launch.jpeg</image:loc><image:caption>MethodsatFreshworksoffices</image:caption><image:title>PhotoofFreshworksLaunch</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-04-15</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/supporting-armed-forces-leavers-with-career-transition-advice</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Armed%20Forces.png</image:loc><image:caption>decorativestockphoto</image:caption><image:title>ArmedForces</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/as-connected-devices-multiply-one-overlooked-vulnerability-could-cascade-into-chaos</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/partnering-with-hmcts-to-deliver-the-new-judicial-fees-expenses-service</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/HMCTS%20News%20Announcement-2.png</image:loc><image:caption>HMCTSNewsAnnouncementMethodsispleasedtobepartneringwithHMCTStodeliverthenewJudicialFeesandExpensesService</image:caption><image:title>HMCTSNewsAnnouncement2</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-is-proudly-going-for-gold-with-the-armed-forces-covenant</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Ministry-of-Defence-Employer-Recognition-Scheme-ERS-Gold-Award-1-300x169.jpg</image:loc><image:caption>MinistryofDefenceEmployerRecognitionSchemeERSGoldAward1300x169</image:caption><image:title>MinistryofDefenceEmployerRecognitionSchemeERSGoldAward1300x169</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hitchhikers-guide-to-jupyter-part-1/n</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/hithchikerpart1.png</image:loc><image:caption>AIgeneratedimageofaRobotonacomputer</image:caption><image:title>hithchikerpart1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/employee-spotlight-david-learning-teamwork-and-growing-as-a-user-researcher-at-methods</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Hattie%20blog%201.png</image:loc><image:caption>DecorativephotoofaMethodsemployeeandblogtitle</image:caption><image:title>Hattieblog1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/David%20Maddy%20Blog%20Post-1.jpg</image:loc><image:caption>DavidMaddyBlogPost1</image:caption><image:title>DavidMaddyBlogPost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Employee%20Spotlight%20Blog%20post-1.png</image:loc><image:caption>EmployeeSpotlightBlogpost1</image:caption><image:title>EmployeeSpotlightBlogpost1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-10-06</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/accelerating-justice-decision-making-with-ai-powered-guidance</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Accelerating%20justice%20decision-making%20with%20AI-powered%20guidance.jpg</image:loc><image:caption>CSAcceleratingjusticedecisionmakingwithAIpoweredguidance</image:caption><image:title>CSAcceleratingjusticedecisionmakingwithAIpoweredguidance</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/parole%20board%20.png</image:loc><image:caption>paroleboard</image:caption><image:title>paroleboard</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/theres-no-evidence-that-personal-data-has-been-compromised</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/All%20systems%20secure%20concept.jpg</image:loc><image:caption>Magnifyingglassovercleanorganiseddatawithnoredflagsorwarningssecuritydashboardshowingallgreenstatusindicatorscleanminimalistrepresentationofdatawithprotectivebarriersandanemptythreatdetectednotificationoralertbox</image:caption><image:title>Allsystemssecureconcept</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-07-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-and-hmcts-expand-professional-development-programme-with-new-masterclass-series</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Emmy%20Nukey%20and%20Vian%20Photograph%20on%20a%20Teams%20call.jpg</image:loc><image:caption>NukeyEmmyandVianonaTeamscall</image:caption><image:title>EmmyNukeyandVianPhotographonaTeamscall</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-01-21</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-ramola-nadkarni</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading.png</image:loc><image:caption>CopyofAddaheading</image:caption><image:title>CopyofAddaheading</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading.gif</image:loc><image:caption>CopyofAddaheading</image:caption><image:title>CopyofAddaheading</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(3).png</image:loc><image:caption>CopyofAddaheading3</image:caption><image:title>CopyofAddaheading3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><lastmod>2024-10-30</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-flood-risk-management</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Transforming%20flood%20risk%20management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSTransformingfloodriskmanagement</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/from-framework-to-recognition</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Home_Office-Logo.wine.png</image:loc><image:caption>HomeOfficeLogowine</image:caption><image:title>HomeOfficeLogowine</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_From%20framework%20to%20recognition%20empowering%20Business%20Analysts%20for%20reward%20and%20retention%20success%E2%80%8B-1.jpg</image:loc><image:caption>CSFromframeworktorecognitionempoweringBusinessAnalystsforrewardandretentionsuccess1</image:caption><image:title>CSFromframeworktorecognitionempoweringBusinessAnalystsforrewardandretentionsuccess1</image:title></image:image><lastmod>2025-06-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-the-remarkable-finalists-of-the-midlands-women-in-tech-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/WIT%20Awards%20Banner-1.png</image:loc><image:caption>MidlandsWomenintechawardsphotofromorganiser</image:caption><image:title>WITAwardsBanner1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/configuring-salesforce</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/delivering-excellence-in-specialist-resourcing-and-solutions</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Financial_CS_-Delivering-excellence-in-specialist-resourcing-and-solutions-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorFinancialCSDeliveringexcellenceinspecialistresourcingandsolutions1</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/blog</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure%20~%20Copilot%20Infographic-01.png</image:loc><image:caption>CoreAzureCopilotInfographic01</image:caption><image:title>CoreAzureCopilotInfographic01</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20How%20your%20business%20can%20benefit%20from%20Azure%20Virtual%20Desktop%20in%202023.jpg</image:loc><image:caption>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:caption><image:title>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-an%20ALTEN%20company_White%20with%20Colour-1.png</image:loc><image:caption>MethodsanALTENcompanyWhitewithColour1</image:caption><image:title>MethodsanALTENcompanyWhitewithColour1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Microsoft%20solution.png</image:loc><image:caption>Microsoftsolution</image:caption><image:title>Microsoftsolution</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20Azure%20Virtual%20Desktop%20vs%20Windows%20365%20Which%20is%20right%20for%20your%20business.jpg</image:loc><image:caption>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:caption><image:title>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/protecting-our-digital-core</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Digital%20Supply%20Chains%20Quote.jpg</image:loc><image:caption>DigitalSupplyChainsQuote</image:caption><image:title>DigitalSupplyChainsQuote</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-04-29</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hitchhikers-guide-to-jupyter-part-3/n</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Data-Table.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>DataTable</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Hitchhiker%20.png</image:loc><image:caption>AIgeneratedimageofarobotatacomputer</image:caption><image:title>Hitchhiker</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Correlation-Table.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>CorrelationTable</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Correlation-Table-2.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>CorrelationTable2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/climate-change-adaptation</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hitchhikers-guide-to-jupyter-part-2/n</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/hitchhikerpart2.png</image:loc><image:caption>AIgeneratedimageofrustylookingrobotssittingtogether</image:caption><image:title>hitchhikerpart2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/hitchhiker%20part2.1.png</image:loc><image:caption>AIgeneratedimageofarobotpaintingapictureofaman</image:caption><image:title>hitchhikerpart21</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-rise-and-growth-of-girls-football</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Girls_Football_blog.png</image:loc><image:caption>Girlsfootballteamphoto</image:caption><image:title>GirlsFootballblog</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/world-password-day-2025</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/World%20Password%20Day.jpg</image:loc><image:caption>Dontprovideanopendoortoyourinformationgraphic</image:caption><image:title>WorldPasswordDay</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-05-01</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-95652e5e-f613-4ecc-8e48-0fb89fc3cc4b</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hidden-cyber-war-underreported-attacks-and-rising-risks-in-the-uk</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20attack%20image%20with%20UK%20outline-1.png</image:loc><image:caption>CyberattackimagewithUKoutline1</image:caption><image:title>CyberattackimagewithUKoutline1</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/servicenow-csdm-implementation-and-cmdb-reimplementation</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-alison-palmer</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Mina-Manik.png</image:loc><image:caption>MinaManik</image:caption><image:title>MinaManik</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/12.jpg</image:loc><image:caption>12</image:caption><image:title>12</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/11-1.jpg</image:loc><image:caption>111</image:caption><image:title>111</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><lastmod>2024-11-21</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-launches-its-first-business-analysis-academy</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/BA-Cohort-March-24-300x225.jpg</image:loc><image:caption>BACohortMarch24300x225</image:caption><image:title>BACohortMarch24300x225</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/beware-of-qr-code-phishing</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/qrcode%20phishing.png</image:loc><image:caption>CartoonimageofabrokenupQRcode</image:caption><image:title>qrcodephishing</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/tackling-research-it-challenges-with-loome</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Loome.jpg</image:loc><image:caption>SolvingResearchITChallengesinHigherEducation</image:caption><image:title>Loome</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-08-05</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/managing-sustainable-and-cost-effective-it-services</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Home_affairs_CS_Managing-sustainable-and-cost-effective-IT-services-.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHomeaffairsCSManagingsustainableandcosteffectiveITservices</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/gravitate-launches-its-second-cyber-academy</loc><video:video><video:thumbnail_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Methods%20GRAVITATE%20video.mp4/medium.jpg</video:thumbnail_loc><video:title>Methods Cyber Academy</video:title><video:description>Video of methods people talking about leaving the armed forces and taking on methods cyber programme</video:description><video:content_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Methods%20GRAVITATE%20video.mp4</video:content_loc><video:duration>373</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20Gravitate.png</image:loc><image:caption>ScreenshotoftheGRAVITATEvideo</image:caption><image:title>CyberGravitate</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/gravitate-empowering-diverse-talent-in-tech</loc><video:video><video:thumbnail_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Methods%20GRAVITATE%20video.mp4/medium.jpg</video:thumbnail_loc><video:title>Methods Cyber Academy</video:title><video:description>Video of methods people talking about leaving the armed forces and taking on methods cyber programme</video:description><video:content_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Methods%20GRAVITATE%20video.mp4</video:content_loc><video:duration>373</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20Gravitate.png</image:loc><image:caption>ScreenshotoftheGRAVITATEvideo</image:caption><image:title>CyberGravitate</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-nasrin-ahmed</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(3).png</image:loc><image:caption>CopyofAddaheading3</image:caption><image:title>CopyofAddaheading3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(7)-1.gif</image:loc><image:caption>CopyofAddaheading71</image:caption><image:title>CopyofAddaheading71</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(7).png</image:loc><image:caption>CopyofAddaheading7</image:caption><image:title>CopyofAddaheading7</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><lastmod>2024-11-05</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/building-the-digital-backbone-of-uk-defence-methods-at-dsei-2025</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Defence%20DSEI%20Article-1.png</image:loc><image:caption>DefenceDSEIArticle1</image:caption><image:title>DefenceDSEIArticle1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-08-08</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/achieving-the-ministry-of-defence-employer-recognition-scheme-gold-award</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Ministry-of-Defence-Employer-Recognition-Scheme-ERS-Gold-Award-1-300x169.jpg</image:loc><image:caption>MinistryofDefenceEmployerRecognitionSchemeERSGoldAward1300x169</image:caption><image:title>MinistryofDefenceEmployerRecognitionSchemeERSGoldAward1300x169</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-02-11</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/designing-a-vision-for-the-road-ahead</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Designing-a-vision-for-the-road-ahead.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSDesigningavisionfortheroadahead</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-bdt-named-as-a-supplier-on-crown-commercial-services-back-office-software-2-framework</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Project%20wins%20announcement.png</image:loc><image:caption>MethodsisdelightedtobenamedasasupplieronCrownCommercialServicesBackOfficeSoftware2framework</image:caption><image:title>Projectwinsannouncement</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-03-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/securing-education-cyber-resilience-penetration-testing</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/empowering-users-at-the-moj-with-power-platform</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MoJ-logo.jpg</image:loc><image:caption>MoJlogo</image:caption><image:title>MoJlogo</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Empowering%20users%20at%20the%20MoJ%20with%20Power%20Platform.jpg</image:loc><image:caption>CSEmpoweringusersattheMoJwithPowerPlatform</image:caption><image:title>CSEmpoweringusersattheMoJwithPowerPlatform</image:title></image:image><lastmod>2025-05-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/building-better-projects-conversations-from-the-apm-conference-floor</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods%20at%20APM%20Conference%202025.jpg</image:loc><image:caption>MethodspeopleattheAPMconference2025</image:caption><image:title>MethodsatAPMConference2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-06-26</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-0ab8b521-a4a3-4815-811d-f2ad292ea1b9</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-5949b47f-4a06-44d3-9d49-cf92a0957fa2</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/finding-solutions-for-tomorrow</loc><video:video><video:thumbnail_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Environment%20Agency%20and%20Methods%20Bespoke%20and%20Emerging%20Projects%20Case%20Study.mp4/medium.jpg</video:thumbnail_loc><video:title>Environment Agency and Methods Bespoke and Emerging Projects Case Study</video:title><video:description>Environment Agency and Methods Bespoke and Emerging Projects Case Study</video:description><video:content_loc>https://www.methods.co.uk/hubfs/Videos%20for%20MW25/Environment%20Agency%20and%20Methods%20Bespoke%20and%20Emerging%20Projects%20Case%20Study.mp4</video:content_loc><video:duration>432</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Finding%20solutions%20for%20tomorrow%20%E2%80%93%20initiating%20a%20transformative%20shift%20in%20project%20delivery%20to%20combat%20the%20impact%20of%20climate%20change.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSFindingsolutionsfortomorrowinitiatingatransformativeshiftinprojectdeliverytocombattheimpactofclimatechange</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/blog/key-considerations-and-best-practices-for-successful-cloud-assessment</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20Azure%20Virtual%20Desktop%20vs%20Windows%20365%20Which%20is%20right%20for%20your%20business.jpg</image:loc><image:caption>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:caption><image:title>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20How%20your%20business%20can%20benefit%20from%20Azure%20Virtual%20Desktop%20in%202023.jpg</image:loc><image:caption>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:caption><image:title>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure%20~%20Copilot%20Infographic-01.png</image:loc><image:caption>CoreAzureCopilotInfographic01</image:caption><image:title>CoreAzureCopilotInfographic01</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Decorative%20photo%20of%20Methods%20employees%20in%20Methods%20office-2.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice2</image:caption><image:title>DecorativephotoofMethodsemployeesinMethodsoffice2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_From%20framework%20to%20recognition%20empowering%20Business%20Analysts%20for%20reward%20and%20retention%20success%E2%80%8B-1.jpg</image:loc><image:caption>CSFromframeworktorecognitionempoweringBusinessAnalystsforrewardandretentionsuccess1</image:caption><image:title>CSFromframeworktorecognitionempoweringBusinessAnalystsforrewardandretentionsuccess1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Transforming%20NHS%20Case%20Management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSTransformingNHSCaseManagement</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice_CS_Navigating-complex-IT-updates.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJusticeCSNavigatingcomplexITupdates</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Energy%2c-Commodity%2c-and-Utilitie-CS_Digital-business-identity-discovery_2025.jpg.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnergyCommodityandUtilitieCSDigitalbusinessidentitydiscovery2025jpg</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Defence%20CS_Designing%2c%20developing%2c%20and%20implementing%20a%20self-service%20reporting%20capability_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorDefenceCSDesigningdevelopingandimplementingaselfservicereportingcapability2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_enabling_design_delivery.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSenablingdesigndelivery</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Building%20product%20management%20capability%20at%20HMCTS.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSBuildingproductmanagementcapabilityatHMCTS</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice-2_CS_Enhancing-operational-efficiency-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJustice2CSEnhancingoperationalefficiency1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice-2_CS_Delivering-the-Prison-Technology-Transformation-Programme.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJustice2CSDeliveringthePrisonTechnologyTransformationProgramme</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Local-Government-CS_Designing%20a%20new%20Digital%20Strategy_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorLocalGovernmentCSDesigninganewDigitalStrategy2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Implementing%20a%20Cyber%20Security%20Management%20System.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSImplementingaCyberSecurityManagementSystem</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_Leveraging%20RPA%20.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSLeveragingRPA</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Empowering%20users%20at%20the%20MoJ%20with%20Power%20Platform.jpg</image:loc><image:caption>CSEmpoweringusersattheMoJwithPowerPlatform</image:caption><image:title>CSEmpoweringusersattheMoJwithPowerPlatform</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Securing%20education%20-%20cyber%20resilience%20penetration%20testing_v2.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSSecuringeducationcyberresiliencepenetrationtestingv2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Climate-change-adaptation_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSClimatechangeadaptation2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Home_affairs_CS_Managing-sustainable-and-cost-effective-IT-services-.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHomeaffairsCSManagingsustainableandcosteffectiveITservices</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_ServiceNow%20CSDM%20implementation%20and%20CMDB%20reimplementation_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSServiceNowCSDMimplementationandCMDBreimplementation2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Configuring-Salesforce_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSConfiguringSalesforce2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Local-Government-CS_From-4-hours-to-15-minutes.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorLocalGovernmentCSFrom4hoursto15minutes</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Accelerating%20justice%20decision-making%20with%20AI-powered%20guidance.jpg</image:loc><image:caption>CSAcceleratingjusticedecisionmakingwithAIpoweredguidance</image:caption><image:title>CSAcceleratingjusticedecisionmakingwithAIpoweredguidance</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Incorporating%20%E2%80%98Natural%20Capital%E2%80%99%20approaches%20into%20government%20decision%20making_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSIncorporatingNaturalCapitalapproachesintogovernmentdecisionmaking2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Understanding-the-condition-of-natural-capital-ecosystems.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSUnderstandingtheconditionofnaturalcapitalecosystems</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Unlocking%20change-%20a%20maturity%20model%20for%20impact.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSUnlockingchangeamaturitymodelforimpact</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Modernising-and-migrating-existing-systems-to-a-modern-cloud-based-platform_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSModernisingandmigratingexistingsystemstoamoderncloudbasedplatform2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Enhancing%20operational%20efficiency.jpg</image:loc><image:caption>CSEnhancingoperationalefficiency</image:caption><image:title>CSEnhancingoperationalefficiency</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Local-Government-CS_From%20concept%20to%20delivery%20in%203%20months.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorLocalGovernmentCSFromconcepttodeliveryin3months</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Strategic%20transformation%20-%20a%20journey%20towards%20harmonised%20and%20efficient%20operations.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSStrategictransformationajourneytowardsharmonisedandefficientoperations</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Project%20Management%20support.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSProjectManagementsupport</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_One%20you%20%E2%80%93%20mental%20health%20%E2%80%93%20How%20Are%20You%20quiz.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSOneyoumentalhealthHowAreYouquiz</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Financial_CS_-Delivering-excellence-in-specialist-resourcing-and-solutions-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorFinancialCSDeliveringexcellenceinspecialistresourcingandsolutions1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Tax%20and%20Welfare%20CS_Strategic%20procurement%20transformation-2.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTaxandWelfareCSStrategicprocurementtransformation2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Financial_CS_Building%20a%20robust%20Cloud%20Centre%20of%20Excellence.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorFinancialCSBuildingarobustCloudCentreofExcellence</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Transforming%20flood%20risk%20management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSTransformingfloodriskmanagement</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Simulated%20attacks%2c%20exposing%20the%20gaps%20-%20fortifying%20digital%20defences-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSSimulatedattacksexposingthegapsfortifyingdigitaldefences1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Climate-change-adaptation-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSClimatechangeadaptation1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Finding%20solutions%20for%20tomorrow%20%E2%80%93%20initiating%20a%20transformative%20shift%20in%20project%20delivery%20to%20combat%20the%20impact%20of%20climate%20change.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSFindingsolutionsfortomorrowinitiatingatransformativeshiftinprojectdeliverytocombattheimpactofclimatechange</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Future-ready-%20University%20of%20Greenwich%20cloud-first%20leap%20toward%202030.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSFuturereadyUniversityofGreenwichcloudfirstleaptoward2030</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Energy%2c%20Commodity%2c%20and%20Utilitie%20CS_Transforming%20operations%20with%20an%20ERP%20system%20upgrade.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnergyCommodityandUtilitieCSTransformingoperationswithanERPsystemupgrade</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_National%20shielding%20service.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSNationalshieldingservice</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_Transforming%20NHS%20Case%20Management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSTransformingNHSCaseManagement</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Case%20Studies%20listing%20page_hero%20banner.png</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CaseStudieslistingpageherobanner</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Understanding%20the%20condition%20of%20natural%20capital%20ecosystems.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSUnderstandingtheconditionofnaturalcapitalecosystems</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Designing-a-vision-for-the-road-ahead.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSDesigningavisionfortheroadahead</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Defence%20CS_Partnering%20with%20todays%20leaders.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorDefenceCSPartneringwithtodaysleaders</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Sector_Tax%20and%20Welfare%20CS_Reimagining%20Service%20Delivery.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorSectorTaxandWelfareCSReimaginingServiceDelivery</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Education%20CS%20%20Empowering%20security%20operations.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEducationCSEmpoweringsecurityoperations</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Implementing-a-Cyber-Security-Management-System.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSImplementingaCyberSecurityManagementSystem</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Decorative%20photo%20of%20Methods%20employees%20in%20Methods%20office-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>DecorativephotoofMethodsemployeesinMethodsoffice1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Home_affairs_CS_UK%20first%20Cloud%20migration.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHomeaffairsCSUKfirstCloudmigration</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Enhancing%20operational%20efficiency_2025.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSEnhancingoperationalefficiency2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Empowering%20MoJ%E2%80%99s%20technology%20future%20%E2%80%93%20a%20strategic%20partnership%20embedding%20the%20target%20operating%20model.jpg</image:loc><image:caption>DecorativephotoofMethodsemployees</image:caption><image:title>CSEmpoweringMoJstechnologyfutureastrategicpartnershipembeddingthetargetoperatingmodel</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_700%20servers%2c%20116%20days-%20Swansea%20Universitys%20race%20to%20the%20cloud.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CS700servers116daysSwanseaUniversitysracetothecloud</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/strategic-procurement-transformation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Tax%20and%20Welfare%20CS_Strategic%20procurement%20transformation-2.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTaxandWelfareCSStrategicprocurementtransformation2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/championing-digital-inclusion-at-methods</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Global%20Accessibility%20Day.png</image:loc><image:caption>Globalaccessibilityawarenessday</image:caption><image:title>GlobalAccessibilityDay</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hitchhikers-guide-to-jupyter-part-5/n</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Chatbot.png</image:loc><image:caption>Robotlookingbook</image:caption><image:title>Chatbot</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/boost-your-cyber-security-with-threat-modeling</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Threat%20modeling.png</image:loc><image:caption>Cybershieldcomputerisedimage</image:caption><image:title>Threatmodeling</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/incorporating-natural-capital-approaches-into-government-decision-making</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods/blog-post-title-number-1-0</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Case-studies.jpg</image:loc><image:caption>Casestudies</image:caption><image:title>Casestudies</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-4788bc1e-c257-4f52-b525-07ba3f600fb2</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/amanpreet-singh</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Amanpreet-Singh.png</image:loc><image:caption>AmanpreetSinghphoto</image:caption><image:title>AFCpageAmanpreetSingh</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/digital-business-identity-discovery</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-hitchhikers-guide-to-jupyter-part-4/n</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/RAG-Architecture.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>RAGArchitecture</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Security-Domains.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>SecurityDomains</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MLOps.png</image:loc><image:caption>Graphshowingthedataoftheoutput</image:caption><image:title>MLOps</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/HR%20staff%20data.png</image:loc><image:caption>Agraphshowingtheoutputofthedatamodel</image:caption><image:title>HRstaffdata</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/hitchhiker%20part4.png</image:loc><image:caption>AIgeneratedimageofrobotsholdingacomputerdisk</image:caption><image:title>hitchhikerpart4</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-defence-logistics-through-advanced-data-modelling</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Defence%20CS_Partnering%20with%20todays%20leaders.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorDefenceCSPartneringwithtodaysleaders</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/qa-series-katie</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Katie%20quote%20(3).png</image:loc><image:caption>Katiequote3</image:caption><image:title>Katiequote3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/designing-a-new-digital-strategy</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/why-managed-services-are-becoming-essential-for-resilience-in-uk-universities</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Post4-visual.png</image:loc><image:caption>Post4visual</image:caption><image:title>Post4visual</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-named-runner-up-for-advocate-of-the-year-at-2025-british-forces-in-business-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/British%20forces%20in%20business%20awards%202.webp</image:loc><image:caption>PhotoofmethodspeopleattheBritishForcesinBusinessAwards2025</image:caption><image:title>Britishforcesinbusinessawards2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/British%20forces%20in%20business%20awards%201.webp</image:loc><image:caption>PhotoofmethodspeopleattheBritishForcesinBusinessAwards2025</image:caption><image:title>Britishforcesinbusinessawards1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/British%20forces%20in%20business%20awards%202025%20photo.jpg</image:loc><image:caption>Britishforcesinbusinessawards2025photo</image:caption><image:title>Britishforcesinbusinessawards2025photo</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Forces%20in%20Business%20Awards%202025.jpg</image:loc><image:caption>PhotooftheawardsceremonyattheUKforcesinbusinessawards2025</image:caption><image:title>ForcesinBusinessAwards2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-06-30</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-a-remarkable-year-of-fundraising-with-the-trussell-trust</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/The%20Trussel%20Trust.jpg</image:loc><image:caption>thetrusselltrustlogo</image:caption><image:title>TheTrusselTrust</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/nottinghams-it-incident</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Nottingham%20Square.jpg</image:loc><image:caption>PhotoofNottinghamCityCentreSquare</image:caption><image:title>NottinghamSquare</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/coreazure-shortlisted-for-ucisa-awards-2025</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Award%20nomination%20.png</image:loc><image:caption>CoreAzurenominatedasanoutstandingcorporatememberbyUCISACoreazurewillbeatUCISAon1820march</image:caption><image:title>Awardnomination</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-enhances-public-sector-procurement</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/shutterstock_1289842174.jpg</image:loc><image:caption>decorativestockphoto</image:caption><image:title>shutterstock1289842174</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-new-nhs-cyber-reality</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20attack%20image%20with%20UK%20outline-1.png</image:loc><image:caption>CyberattackimagewithUKoutline1</image:caption><image:title>CyberattackimagewithUKoutline1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AIandML.png</image:loc><image:caption>Robotimagewithsecurityicons</image:caption><image:title>AIandML</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Medical%20Cyber%20image.jpg</image:loc><image:caption>MedicalCyberimage</image:caption><image:title>MedicalCyberimage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_WITH%20BORDER_PNG%2072ppi-01%201.png</image:loc><image:caption>Methodsanaltencompanylogo</image:caption><image:title>MethodsANALTENCOMPANYWITHBORDERPNG72ppi011</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-an%20ALTEN%20company_Full%20Colour%20(2).png</image:loc><image:caption>MethodsanALTENcompanyFullColour2</image:caption><image:title>MethodsanALTENcompanyFullColour2</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-ef7e5649-2118-4a4e-aa75-186eb46253cb</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/azure-vmware-solution-avs-boosting-university-productivity-flexibility-and-cost-efficiency</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Woman%20on%20a%20laptop%20with%20cloud%20solutions%20icons.jpg</image:loc><image:caption>Womanonalaptopwithcloudiconsaroundit</image:caption><image:title>Womanonalaptopwithcloudsolutionsicons</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-02-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-announces-2025-charity-partnership-with-action4youth</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Action4Youth.jpg</image:loc><image:caption>Action4Youth</image:caption><image:title>Action4Youth</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/dustin-laughlin</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Dustin-Laughlin-Photo.png</image:loc><image:caption>DustinLaughlinphoto</image:caption><image:title>AFCpageDustinLaughlinPhoto</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/adam-turner</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-page_Adam-Turner-Military-Photo-2.png</image:loc><image:caption>Adamturnerphoto</image:caption><image:title>AFCpageAdamTurnerMilitaryPhoto2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/driving-empowerment-and-collaboration</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Defraawards.png</image:loc><image:caption>Photoofmethodsatdefraconference</image:caption><image:title>Defraawards</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Defra-Awards-Breakout.jpg</image:loc><image:caption>Photoatdefraconference</image:caption><image:title>DefraAwardsBreakout</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Defra-Methods-Stand.jpg</image:loc><image:caption>Photoofmethodsstandatthedefraawards</image:caption><image:title>DefraMethodsStand</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/welcoming-cohort-2-to-the-gravitate-cyber-academy-fostering-diversity-and-excellence-in-cyber-security</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Cyber-Cohort-2-pic-1-scaled-e1719409220648-1024x518.jpg</image:loc><image:caption>CyberCohort2pic1scalede17194092206481024x518</image:caption><image:title>CyberCohort2pic1scalede17194092206481024x518</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-advantages-of-penetration-testing-why-its-essential-for-modern-cyber-security/</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20for%20Pen%20testing%20blog.png</image:loc><image:caption>Scriptonascreenwithalightpenetratingthoughwithapadlockandwallbeingbrokendown</image:caption><image:title>ImageforPentestingblog</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/building-a-robust-cloud-centre-of-excellence</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Financial_CS_Building%20a%20robust%20Cloud%20Centre%20of%20Excellence.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorFinancialCSBuildingarobustCloudCentreofExcellence</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-422a231d-b5d6-4fdb-bf5b-c47705d43b53</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-hannah-pinnock</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/12.jpg</image:loc><image:caption>12</image:caption><image:title>12</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/11-1.jpg</image:loc><image:caption>111</image:caption><image:title>111</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Mina-Manik.png</image:loc><image:caption>MinaManik</image:caption><image:title>MinaManik</image:title></image:image><lastmod>2024-11-21</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/hacktivists</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Russian%20Hacktivists%202026%2001%2020.jpg</image:loc><image:caption>RussianHacktivists20260120</image:caption><image:title>RussianHacktivists20260120</image:title></image:image><lastmod>2026-01-22</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-t-levels-success-our-partnership-with-the-department-for-education</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/T%20Levels%20Video%20Thumbnail.png</image:loc><image:caption>TlevelsvideoscreenshotofdavidscottfromDfE</image:caption><image:title>TLevelsVideoThumbnail</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/launching-met-vets-community-to-support-armed-forces-personnel-and-families</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Met-Vets-Logo-300x300.png</image:loc><image:caption>MetVetsLogo300x300</image:caption><image:title>MetVetsLogo300x300</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/reimaging-service-delivery</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Sector_Tax%20and%20Welfare%20CS_Reimagining%20Service%20Delivery.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorSectorTaxandWelfareCSReimaginingServiceDelivery</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/-</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Self-healing%20Defence%202026%2001%2030.jpg</image:loc><image:caption>SelfhealingDefence20260130</image:caption><image:title>SelfhealingDefence20260130</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/ai-for-transforming-public-services</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AI%20generated%20pothole%20image%20with%20AI%20fixing%20them.jpg</image:loc><image:caption>AIgeneratedpotholeimagewithAIfixingthem</image:caption><image:title>AIgeneratedpotholeimagewithAIfixingthem</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/meet-hattie-dawson-driving-culture-connection-and-change-at-methods</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Home%20Office%20AI%20Analysis%20Team%20Nominated%20for%20a%20Civil%20Service%20Award-1.jpg</image:loc><image:caption>HomeOfficeAIAnalysisTeamNominatedforaCivilServiceAward1</image:caption><image:title>HomeOfficeAIAnalysisTeamNominatedforaCivilServiceAward1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Hattie%20blog%201.png</image:loc><image:caption>DecorativephotoofaMethodsemployeeandblogtitle</image:caption><image:title>Hattieblog1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20Disasters%20600x338%20(600%20x%20338%20px).png</image:loc><image:caption>GarethJonesCyberDisasterBlogImage</image:caption><image:title>CyberDisasters600x338600x338px</image:title></image:image><lastmod>2025-12-03</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/delivering-digital-transformation-at-pace</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Transport-CS_Implementing-a-Cyber-Security-Management-System.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorTransportCSImplementingaCyberSecurityManagementSystem</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-achieves-ncsc-cyber-resilience-audit-cra-accreditation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/NCSC%20CRA%20Scheme.png</image:loc><image:caption>MethodsachievesNCSCCyberResilienceAuditCRAaccreditation</image:caption><image:title>NCSCCRAScheme</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-06-25</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/coreazureatucisa</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Awards.jpeg</image:loc><image:caption>Awards</image:caption><image:title>Awards</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/ncsc-releases-secure-by-demand</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/NCSC%20Guidelines%20Article%20Snapshot.jpg</image:loc><image:caption>NCSCGuidelinesArticleSnapshot</image:caption><image:title>NCSCGuidelinesArticleSnapshot</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-is-attending-sits</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Join%20us%20at%20SITS.png</image:loc><image:caption>JoinusatSITS</image:caption><image:title>JoinusatSITS</image:title></image:image><lastmod>2025-05-12</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/project-management-support</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Project%20Management%20support.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSProjectManagementsupport</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/strategic-transformation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Strategic%20transformation%20-%20a%20journey%20towards%20harmonised%20and%20efficient%20operations.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSStrategictransformationajourneytowardsharmonisedandefficientoperations</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-5755436c-c4ff-461e-a486-7863dc2b54ee</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-17aa1f9d-3b1f-449a-b4cd-17d2e9dad5a7</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/why-data-not-just-tech-drives-justice-transformation</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Rich%20Dakin%20Justice%20Quote.png</image:loc><image:caption>Sustainabletransformationinjusticeisevolutionarynotdisruptivefordisruptionssake</image:caption><image:title>RichDakinJusticeQuote</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-06-09</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/designing-developing-and-implementing-a-self-service-reporting-capability</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-fc42dd94-72a5-44b5-8790-c941ebc965d2</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-evolution-of-cyber-defence</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolution%20of%20cyber%20defense%20.png</image:loc><image:caption>Blackbackgroundtheniconsshowingtheevolutionofcybersecurityafirewalltoapadlockicon</image:caption><image:title>Evolutionofcyberdefense</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/cyber-disasters-dont-start-big-they-start-small</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/enhancing-cyber-security-within-your-organisation-with-ai-ops-and-ml-ops</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AIandML.png</image:loc><image:caption>Robotimagewithsecurityicons</image:caption><image:title>AIandML</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-achieves-key-cyber-security-milestones-chartered-principal-status</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/csc_master_logo-small-1.png</image:loc><image:caption>cscmasterlogosmall1</image:caption><image:title>cscmasterlogosmall1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-win-at-the-icips-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/161024019ICiPS-Methods-min-scaled.jpg</image:loc><image:caption>161024019ICiPSMethodsminscaled</image:caption><image:title>161024019ICiPSMethodsminscaled</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/Image-1.jpg</image:loc><image:caption>Image1</image:caption><image:title>Image1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-mina-manik</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Mina-Manik.png</image:loc><image:caption>MinaManik</image:caption><image:title>MinaManik</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/12.jpg</image:loc><image:caption>12</image:caption><image:title>12</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/11-1.jpg</image:loc><image:caption>111</image:caption><image:title>111</image:title></image:image><lastmod>2024-11-14</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Insights%20page_hero%20banner.png</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>Insightspageherobanner</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/understanding-the-condition-of-natural-capital-ecosystems</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Understanding%20the%20condition%20of%20natural%20capital%20ecosystems.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSUnderstandingtheconditionofnaturalcapitalecosystems</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-colleagues-are-icips-awards-finalists</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/training_provider.png</image:loc><image:caption>trainingprovider</image:caption><image:title>trainingprovider</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/aligning-ncea-with-the-sustainable-development-goals</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_Understanding-the-condition-of-natural-capital-ecosystems.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSUnderstandingtheconditionofnaturalcapitalecosystems</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/women-in-tech-series/qa-series-with-janine-mannell</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).gif</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(2).png</image:loc><image:caption>CopyofAddaheading2</image:caption><image:title>CopyofAddaheading2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading.png</image:loc><image:caption>CopyofAddaheading</image:caption><image:title>CopyofAddaheading</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(6).png</image:loc><image:caption>CopyofAddaheading6</image:caption><image:title>CopyofAddaheading6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(7).png</image:loc><image:caption>CopyofAddaheading7</image:caption><image:title>CopyofAddaheading7</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_NO%20BORDER_PNG%2072ppi.png</image:loc><image:caption>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:caption><image:title>MethodsANALTENCOMPANYNOBORDERPNG72ppi</image:title></image:image><lastmod>2024-10-30</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/inspiring-inclusion</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/womens%20day.png</image:loc><image:caption>IWD2024colleaguesmakingheartswiththeirhands</image:caption><image:title>womensday</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/White-And-Grey-Paper-Texture-Simple-Minimalist-Gallery-Photo-Collage-1-min.png</image:loc><image:caption>photosofmethodspeoplemakingheartsymbolsforIWD</image:caption><image:title>WhiteAndGreyPaperTextureSimpleMinimalistGalleryPhotoCollage1min</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-partners-with-school-of-code-for-an-inspiring-user-centred-design-week</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/shutterstock_1477470695.jpg</image:loc><image:caption>decorativestockphoto</image:caption><image:title>shutterstock1477470695</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/qa-series-helen</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Helen%20Quote.png</image:loc><image:caption>TheworldbelongstothosewhowanttomakeadifferenceandgenderisnobarrierThereisanewfoundconfidenceamongwomenasenseofselfbeliefthattheycanexcelinanydomainattainleadershippositionsandbecomerolemodelsforallIcelebratethatreligiously</image:caption><image:title>HelenQuote</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Copy%20of%20Add%20a%20heading%20(3).png</image:loc><image:caption>CopyofAddaheading3</image:caption><image:title>CopyofAddaheading3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-sponsors-the-home-office-women-in-tech-conference</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Home%20Office%20Women%20in%20Tech%20Conference.jpg</image:loc><image:caption>HomeOfficeWomenInTechConferenceLondon</image:caption><image:title>HomeOfficeWomeninTechConference</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/swansea-universitys-race-to-the-cloud</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_700%20servers%2c%20116%20days-%20Swansea%20Universitys%20race%20to%20the%20cloud.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CS700servers116daysSwanseaUniversitysracetothecloud</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods/blog-post-title-number-1</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Case-studies.jpg</image:loc><image:caption>Casestudies</image:caption><image:title>Casestudies</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/the-beautiful-games-digital-defence</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AI-Generated%20Media/Images/english%20football%20stadium%20with%20a%20football%20player%20kicking%20a%20cyber%20security%20padlock.jpeg</image:loc><image:caption>AIgeneratedimageofafootballplayerinastadiumkickingacybersecuritypadlock</image:caption><image:title>englishfootballstadiumwithafootballplayerkickingacybersecuritypadlock</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods/blog-post-title-number-1-0-0</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Case-studies.jpg</image:loc><image:caption>Casestudies</image:caption><image:title>Casestudies</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-11-28</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/celebrating-armed-forces-week-honouring-dual-service-at-methods</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%202.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%206.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork6</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%205.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork5</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%207.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork7</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%204.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork4</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%203.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%208.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork8</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sam%20Wigley%20Reservists%20Work%201.jpg</image:loc><image:caption>SamWigleyReservistsWorkphotoofArmedForcesDayparadeinKettering2025</image:caption><image:title>SamWigleyReservistsWork1</image:title></image:image><lastmod>2025-06-30</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-741fd750-3ae3-405d-abbd-a8082d5927d8</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/proudly-sponsoring-ukgovcamp</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/UKGovCamp-300x241.png</image:loc><image:caption>UKGovCamp300x241</image:caption><image:title>UKGovCamp300x241</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-shortlisted-for-innovation-at-the-usw-supplier-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/USW%20shortlist%20award%20banner.jpg</image:loc><image:caption>Shortlistedfora2024USWSupplieraward</image:caption><image:title>USWshortlistawardbanner</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/what-ukgovcamp26-reminded-us-about-building-better-public-service</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/govcamp%20image.jpeg</image:loc><image:caption>govcampimage</image:caption><image:title>govcampimage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2026-01-20</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/transforming-nhs-case-management</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Transforming%20NHS%20Case%20Management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSTransformingNHSCaseManagement</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/navigating-complex-it-updates</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice_CS_Navigating-complex-IT-updates.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJusticeCSNavigatingcomplexITupdates</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/vertical-methods/blog-post-title-number-1-0-0-0-0</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Case-studies.jpg</image:loc><image:caption>Casestudies</image:caption><image:title>Casestudies</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/benoit-taylor</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Benoit%20Taylor%20AFC%20image.jpg</image:loc><image:caption>BenoitTaylorphoto</image:caption><image:title>BenoitTaylorAFCimage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/data-privacy-day-2024</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Dataprivacyday.png</image:loc><image:caption>InternationalDataPrivacyDay2024</image:caption><image:title>Dataprivacyday</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Data-Privacy_with-title.jpg</image:loc><image:caption>Aninfographicadvisingondataprivacytips</image:caption><image:title>DataPrivacywithtitle</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-shortlisted-at-the-tiara-recruitment-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Baz-Talent-Recruitment-Awards-2024-EDITED-2028.jpg</image:loc><image:caption>decorativestockphoto</image:caption><image:title>BazTalentRecruitmentAwards2024EDITED2028</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/staying-vigilant-understanding-cookie-hijacking-in-the-digital-age/</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Screenshot%202024-12-05%20at%2011.24.50.png</image:loc><image:caption>Cookiehijacking</image:caption><image:title>Screenshot20241205at112450</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/leadership-mindset-for-cyber-resilience</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/protecting-research-from-cyber-threats</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/How-can-we-help.png</image:loc><image:caption>DiagramshoeinghowMethodssupportsorganisationssubjectmatterexpertsModernisationprogrammesselfsufficiencycrossorganisationalbenefit</image:caption><image:title>Howcanwehelp</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure-Customer-Stories.png</image:loc><image:caption>TwocasestudysnippettextboxesforUniofGreenwichandAbertayUni</image:caption><image:title>CoreAzureCustomerStories</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/foreignstates-cyber%20security.png</image:loc><image:caption>AIimageofaforeignstatedataandsecuritysymbolsinthesky</image:caption><image:title>foreignstatescybersecurity</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/what-is-neurodiversity-celebration-week</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/wesupport%20neurodiversity.png</image:loc><image:caption>Wesupportneurodiversitycelebrationweek</image:caption><image:title>wesupportneurodiversity</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/neurodiversity.png</image:loc><image:caption>Puzzlepiecesshowingabraintoshowcaseneurodiversity</image:caption><image:title>neurodiversity</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-achieves-prestigious-ncsc-assured-service-status-for-audit-and-review</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Achieves%20NCSC%20assured%20service%20status%20for%20Audit%20and%20Review.png</image:loc><image:caption>MethodsachievesprestigiousNCSCAssuredservicestatusforAuditandReview</image:caption><image:title>AchievesNCSCassuredservicestatusforAuditandReview</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-08-08</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/introduction-and-maturity-of-the-hmcts-dts-service-desk</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Justice-2_CS_Enhancing-operational-efficiency-1.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorJustice2CSEnhancingoperationalefficiency1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-02</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/getting-ai-ready-key-takeaways-from-sits-2025</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods%20at%20SITS.jpeg</image:loc><image:caption>MethodsatSITS</image:caption><image:title>MethodsatSITS</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/october-marks-cyber-security-awareness-month</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyberimage.jpeg</image:loc><image:caption>Cyberimage</image:caption><image:title>Cyberimage</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/top-5-cyber-security-threats-you-need-to-know-about</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Top%205%20Security%20Trends.png</image:loc><image:caption>Top5securitytrends</image:caption><image:title>Top5SecurityTrends</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/why-data-foundations-matter-more-than-ever-for-uk-universities-in-2026</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/3-Feb-03-2026-12-24-28-6484-PM.png</image:loc><image:caption>3Feb0320261224286484PM</image:caption><image:title>3Feb0320261224286484PM</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/pioneering-cyber-security-training</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods%20Cyber%20Academy%20Cohort%202%20Photo.jpg</image:loc><image:caption>Methodscybercohortinmethodsoffice</image:caption><image:title>MethodsCyberAcademyCohort2Photo</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/implementing-a-cyber-security-management-system</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/WrightBus%20colour%20logo.jpg</image:loc><image:caption>WrightBuscolourlogo</image:caption><image:title>WrightBuscolourlogo</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Homepage-CS_Implementing%20a%20Cyber%20Security%20Management%20System.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>HomepageCSImplementingaCyberSecurityManagementSystem</image:title></image:image><lastmod>2025-05-28</lastmod></url><url><loc>https://blog.methods.co.uk/blog/are-you-getting-the-most-value-from-your-cloud-investment</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20Azure%20Virtual%20Desktop%20vs%20Windows%20365%20Which%20is%20right%20for%20your%20business.jpg</image:loc><image:caption>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:caption><image:title>ImageAzureVirtualDesktopvsWindows365Whichisrightforyourbusiness</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Image%20~%20How%20your%20business%20can%20benefit%20from%20Azure%20Virtual%20Desktop%20in%202023.jpg</image:loc><image:caption>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:caption><image:title>ImageHowyourbusinesscanbenefitfromAzureVirtualDesktopin2023</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CoreAzure%20~%20Copilot%20Infographic-01.png</image:loc><image:caption>CoreAzureCopilotInfographic01</image:caption><image:title>CoreAzureCopilotInfographic01</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/accelerating-cyber-defence-the-need-for-resilience-by-design-clone</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-shortlisted-for-advocate-of-the-year-at-2025-british-forces-in-business-awards</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Advocate%20of%20the%20Year%20Finalist-1.png</image:loc><image:caption>methodsshortlistedforadvocateoftheyearat2025britishforcesinbusinessawards</image:caption><image:title>AdvocateoftheYearFinalist1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-05-20</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/from-service-to-cyber-ian-and-nicoles-journey-beyond-the-forces</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods%20Podcast%20Image%20Episode%2019.png</image:loc><image:caption>TheMethodspodcastFromServicetoCyberIanandNicolesjourneybeyondtheforces</image:caption><image:title>MethodsPodcastImageEpisode19</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-03-27</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/ai-driven-threat-detection</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/AIandML.png</image:loc><image:caption>Robotimagewithsecurityicons</image:caption><image:title>AIandML</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2026-03-09</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/modernising-infrastructure-through-cloud-migration</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Healthcare%20CS_Transforming%20NHS%20Case%20Management.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorHealthcareCSTransformingNHSCaseManagement</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/employer-recognition-scheme-gold-award-ceremony</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/AFC-Awards-The-room-Photo.jpg</image:loc><image:caption>AFCAwardsTheroomPhoto</image:caption><image:title>AFCAwardsTheroomPhoto</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/AFC-Awards-Organisations-with-awards-photo.jpg</image:loc><image:caption>AFCAwardsOrganisationswithawardsphoto</image:caption><image:title>AFCAwardsOrganisationswithawardsphoto</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/AFC-Awards-Mark-and-Karen-being-given-award-photo.jpg</image:loc><image:caption>AFCAwardsMarkandKarenbeinggivenawardphoto</image:caption><image:title>AFCAwardsMarkandKarenbeinggivenawardphoto</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AFC-Awards-Building-Photo.jpg</image:loc><image:caption>AFCawardsphoto</image:caption><image:title>AFCAwardsBuildingPhoto</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/methods-appoints-emma-clayton-jory-as-social-value-lead</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Leading%20our%20approach%20to%20social%20value-1.jpg</image:loc><image:caption>Leadingourapproachtosocialvalue1</image:caption><image:title>Leadingourapproachtosocialvalue1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-10-08</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/unlocking-change-a-maturity-model-for-impact</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Environment-Agency-Logo.jpeg</image:loc><image:caption>EnvironmentAgencyLogo</image:caption><image:title>EnvironmentAgencyLogo</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Unlocking%20change-%20a%20maturity%20model%20for%20impact.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSUnlockingchangeamaturitymodelforimpact</image:title></image:image><lastmod>2025-07-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/from-policy-to-practice-implementing-sdg</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Defrablog-1.png</image:loc><image:caption>Thenumber15lifeonlandandnumber14lifebelowwatersymbolsoftheUNsSDGs</image:caption><image:title>Defrablog1</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/enabling-a-customer-approach-to-design-and-delivery</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Sector_Environment_CS_enabling_design_delivery.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>SectorEnvironmentCSenablingdesigndelivery</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/identity-and-data-protection-in-an-age-of-sprawl-and-oversharing</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Cyber%20attack%20image%20with%20UK%20outline-1.png</image:loc><image:caption>CyberattackimagewithUKoutline1</image:caption><image:title>CyberattackimagewithUKoutline1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/AIandML.png</image:loc><image:caption>Robotimagewithsecurityicons</image:caption><image:title>AIandML</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-04-02</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/building-product-management-capability-at-hmcts</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Building%20product%20management%20capability%20at%20HMCTS.jpg</image:loc><image:caption>DecorativephotoofMethodsemployeesinMethodsoffice</image:caption><image:title>CSBuildingproductmanagementcapabilityatHMCTS</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-f91f2d7a-8651-477f-8ebe-ed36b94d4620</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-3571f709-67b1-4b2d-8437-1b880e46e604</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/23e98936-06d5-43be-a18f-9feebf950d11</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-an%20ALTEN%20company_Full%20Colour%20(2).png</image:loc><image:caption>MethodsanALTENcompanyFullColour2</image:caption><image:title>MethodsanALTENcompanyFullColour2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY_WITH%20BORDER_PNG%2072ppi-01%201.png</image:loc><image:caption>Methodsanaltencompanylogo</image:caption><image:title>MethodsANALTENCOMPANYWITHBORDERPNG72ppi011</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/qa-series-hannah-pinnock</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/11-1.jpg</image:loc><image:caption>111</image:caption><image:title>111</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/windsor-fellowship-event-inspires-future-professionals-in-stem</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/WF-Networking-Event-1.jpeg</image:loc><image:caption>WFNetworkingEvent1</image:caption><image:title>WFNetworkingEvent1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/WF-Networking-Event-3.jpeg</image:loc><image:caption>WFNetworkingEvent3</image:caption><image:title>WFNetworkingEvent3</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/WF-Networking-Event-4-e1728380538206.jpg</image:loc><image:caption>WFNetworkingEvent4e1728380538206</image:caption><image:title>WFNetworkingEvent4e1728380538206</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MW25%20All%20Insight%20Images/WF-Networking-Event-2.jpeg</image:loc><image:caption>WFNetworkingEvent2</image:caption><image:title>WFNetworkingEvent2</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/what-microsofts-2025-pricing-update-means-for-your-enterprise-agreement</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CSP%20Microsoft%20Blog-1.png</image:loc><image:caption>CSPtoEAblogMicrosoftintroduction</image:caption><image:title>CSPMicrosoftBlog1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-2e75a670-19bb-4b2d-a43c-00f2e1a361f1</loc><lastmod>2025-03-26</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/responsible-ai-in-action-home-office-ai-team-earns-civil-service-award-nomination</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Home%20Office%20AI%20Analysis%20Team%20Nominated%20for%20a%20Civil%20Service%20Award-1.jpg</image:loc><image:caption>HomeOfficeAIAnalysisTeamNominatedforaCivilServiceAward1</image:caption><image:title>HomeOfficeAIAnalysisTeamNominatedforaCivilServiceAward1</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://blog.methods.co.uk/case-studies/empowering-mojs-technology-future</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/CS_Empowering%20MoJ%E2%80%99s%20technology%20future%20%E2%80%93%20a%20strategic%20partnership%20embedding%20the%20target%20operating%20model.jpg</image:loc><image:caption>DecorativephotoofMethodsemployees</image:caption><image:title>CSEmpoweringMoJstechnologyfutureastrategicpartnershipembeddingthetargetoperatingmodel</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/MoJ-logo.jpg</image:loc><image:caption>MoJlogo</image:caption><image:title>MoJlogo</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-06-05</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-8f87c75f-d030-430c-bea3-052b56927f97</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/8-minute-breach-why-your-detect-and-respond-strategy-is-officially-too-slow</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/8%20minute%20breach%20%20%202026%2002%2006.jpg</image:loc><image:caption>8minutebreach20260206</image:caption><image:title>8minutebreach20260206</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://blog.methods.co.uk/5c0aa066-068e-4bbb-b77f-b2fd1f43444c/-temporary-slug-b97a0219-7fc0-4dc3-a57f-52bc74cd9597</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://blog.methods.co.uk/en/all-insights/gravitate-cyber-academy-earns-prestigious-ospa-nomination</loc><image:image><image:loc>https://www.methods.co.uk/hubfs/Pen%20Testing%20Cyber%20Attack%20Simulation.jpg</image:loc><image:caption>PenTestingCyberAttackSimulationgraphic</image:caption><image:title>PenTestingCyberAttackSimulation</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/CyberUK%202026%20blog%20header.jpg</image:loc><image:caption>CyberUK2026blogheader</image:caption><image:title>CyberUK2026blogheader</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/OSPA%20Finalist%202025.jpg</image:loc><image:caption>OSPAFinalist2025andlogo</image:caption><image:title>OSPAFinalist2025</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Evolving%20your%20cyber%20strategy.png</image:loc><image:caption>Handdiallingupaknoboncybersecurityboardtomax</image:caption><image:title>Evolvingyourcyberstrategy</image:title></image:image><image:image><image:loc>https://www.methods.co.uk/hubfs/Methods-AN%20ALTEN%20COMPANY%20Logo%20200x45-03%20SVG.svg</image:loc><image:caption>MethodsAnAltenCompanyLogo200x45SVG</image:caption><image:title>MethodsANALTENCOMPANYLogo200x4503SVG</image:title></image:image><lastmod>2025-01-14</lastmod></url></urlset>