<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://www.strixsoft.com</loc>
<image:image>
<image:loc>https://www.strixsoft.com/og-image.png</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.strixsoft.com/servicios</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.strixsoft.com/servicios/desarrollo-software</loc>
<image:image>
<image:loc>https://www.strixsoft.com/servicios/desarrollo-software/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.strixsoft.com/servicios/ethical-hacking</loc>
<image:image>
<image:loc>https://www.strixsoft.com/servicios/ethical-hacking/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.strixsoft.com/servicios/inteligencia-artificial</loc>
<image:image>
<image:loc>https://www.strixsoft.com/servicios/inteligencia-artificial/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.strixsoft.com/servicios/cumplimiento-datos</loc>
<image:image>
<image:loc>https://www.strixsoft.com/servicios/cumplimiento-datos/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.strixsoft.com/sobre-nosotros</loc>
<image:image>
<image:loc>https://www.strixsoft.com/og-image.png</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.strixsoft.com/casos-de-exito</loc>
<image:image>
<image:loc>https://www.strixsoft.com/og-image.png</image:loc>
</image:image>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.strixsoft.com/politica-de-privacidad</loc>
<lastmod>2026-02-18T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ethical-hacking-chile-empresas-pentesting</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ethical-hacking-chile-empresas-pentesting/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/desarrollo-software-medida-vs-enlatado-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/desarrollo-software-medida-vs-enlatado-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/pentesting-web-vulnerabilidades-comunes-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/pentesting-web-vulnerabilidades-comunes-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/caso-exito-desarrollo-software-retail-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/caso-exito-desarrollo-software-retail-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/como-adoptar-inteligencia-artificial-empresa-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/como-adoptar-inteligencia-artificial-empresa-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-08T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ciberseguridad-empresas-chile-guia-completa</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ciberseguridad-empresas-chile-guia-completa/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ley-proteccion-datos-chile-empresas</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ley-proteccion-datos-chile-empresas/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/cuanto-cuesta-desarrollo-software-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/cuanto-cuesta-desarrollo-software-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/diferencia-pentesting-ethical-hacking</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/diferencia-pentesting-ethical-hacking/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ia-generativa-pyme-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ia-generativa-pyme-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-08T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/owasp-top-10-vulnerabilidades-web</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/owasp-top-10-vulnerabilidades-web/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ley-21719-vs-gdpr-diferencias</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ley-21719-vs-gdpr-diferencias/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/mejores-practicas-seguridad-aplicaciones-web</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/mejores-practicas-seguridad-aplicaciones-web/opengraph-image</image:loc>
</image:image>
<lastmod>2026-02-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/automatizacion-procesos-python-ia</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/automatizacion-procesos-python-ia/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/delegado-proteccion-datos-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/delegado-proteccion-datos-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-25T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/como-elegir-empresa-desarrollo-software-chile</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/como-elegir-empresa-desarrollo-software-chile/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-22T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/red-team-vs-blue-team-empresas</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/red-team-vs-blue-team-empresas/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/machine-learning-empresas-casos-uso</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/machine-learning-empresas-casos-uso/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/integracion-apis-guia-empresas</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/integracion-apis-guia-empresas/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.strixsoft.com/blog/ciberseguridad-pymes-chile-2026</loc>
<image:image>
<image:loc>https://www.strixsoft.com/blog/ciberseguridad-pymes-chile-2026/opengraph-image</image:loc>
</image:image>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
