<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.softwaresecured.com</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/portal</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/book-a-consultation</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/ai-pentesting</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/training</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/external-network-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/hardware-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/internal-network-pentest</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/iot-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/mobile-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/penetration-testing-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/red-teaming</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/secure-cloud-review</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/secure-code-review</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/social-engineering-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/service/web-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/industry/ai-pentesting</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/industry/saas-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/industry/sectech-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/industry/fintech-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/industry/healthcare-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/compliance/gdpr-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/compliance/hipaa-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/compliance/iso-27001-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/compliance/pci-dss-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/compliance/soc-2-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/our-customers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/news-and-press</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/legal-overview</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/blog</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/partners</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/careers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/events-and-recordings</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/book-partner-call</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/meeting-booked</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/cookie-banner</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/partner-meeting-booked</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/get-a-sample-report</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/pentest-prep-toolkit</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/pentesting-for-ai-and-llms</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/secure-code-review</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/pentesting-for-hardware</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/pentesting-for-iot</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/referral-program</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/ethical-hacking-services-overview</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/ai-penetration-testing-services</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/api-penetration-testing-steps</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/architecture-security-review-checklist</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/aws-penetration-testing-guidelines</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/cloud-attack-surface-assessment</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/continuous-penetration-testing-pipeline</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/cvss-vs-dread-comparison</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/devsecops-best-practices</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/hardware-security-research</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/ios-vs-android-security-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/mobile-app-penetration-testing-checklist</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/mobile-penetration-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/owasp-top-10-api-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/pci-dss-internal-vs-external-pentest</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/pci-dss-penetration-testing-rules</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/pci-penetration-testing-scoping</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/penetration-testing-cost</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/penetration-testing-methodology</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/penetration-testing-report-template</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/penetration-testing-roi-metrics</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/penetration-testing-service-providers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/present-pen-test-results-to-the-board</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/prompt-injection-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/security-gates-in-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/soc-2-penetration-testing-checklist</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/soc-2-penetration-testing-frequency</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/soc-2-penetration-testing-requirements</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/stride-threat-modelling-examples</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/threat-modelling-in-agile</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/vulnerability-prioritization-framework</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/vulnerability-remediation-sla</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/subtopic/web-application-penetration-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/ai-security-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/api-web-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/cloud-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/devsecops-shift-left-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/mobile-app-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/pci-dss-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/penetration-test-reports-roi</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/penetration-testing-services</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/security-research</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/soc-2-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/threat-modelling-secure-design</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/topic/vulnerability-management-scoring</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/20-cybersecurity-statistics-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/2026-top-10-vciso</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/4-reasons-why-penetration-testing-is-becoming-a-business-requirement</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/4-ways-security-leaders-uses-penetration-testing-to-elevate-their-security-programs</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/5-ways-penetration-testing-reduces-overall-security-costs</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/7-agile-software-development-habits-that-produce-security-concerns</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/7-steps-to-comprehensive-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/ai-pentesting-is-not-just-jailbreaking-the-model</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/assessing-the-risk-sub-domain-takeover-via-ec2-ip-takeover</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/aws-privilege-escalation-iam-risks-service-based-attacks-and-new-ai-driven-bedrock-agentcore-vectors</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/basics-of-patch-management-policies</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/best-ai-penetration-testing-services</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/best-iot-hardware-penetration-testing-companies</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/black-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/blockchain-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/burp-versus-zap</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/common-security-misconfiguration-habits</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/comparison-of-stride-dread-pasta</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/continuous-pentesting-vs-pentesting-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/crowdsourced-pentesters-vs-fulltime-pentesters</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/cybersecurity-laws-and-regulations-in-canada</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/default-configurations-in-embedded-systems</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/do-you-need-penetration-testing-for-compliance</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/ethical-hacking-vs-pentesting</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/evil-cookie</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/exploiting-less-js-to-achieve-remote-code-execution-rce</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/external-pen-test-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/guide-to-mobile-apps-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-1-acquiring-the-hardware</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-2-mobile-and-p2p-exploits</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-3-chip-off-and-persistence</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-4-debugging-deviceids-and-dev-tools</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-5-exploiting-ble</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-6-the-finale</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-the-meatmeet-bbq-probe---part-1</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-the-meatmeet-bbq-probe---part-2</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/hacking-the-meatmeet-bbq-probe3</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/healthcare-cybersecurity-stack</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-a-pre-assessment-checklist-helps-with-preparing-for-a-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-hackers-use-css-injection-to-hack-with-style</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-penetration-testing-can-make-your-development-team-more-productive</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-penetration-testing-increases-your-roi-of-iso-27001-compliance</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-start-ups-can-build-a-data-driven-culture</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-threat-modeling-adds-value-to-a-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-build-the-most-effective-organizational-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-make-the-most-of-a-devastating-penetration-test-report</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-overcome-the-biggest-barriers-to-selling-security-internally</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-properly-secure-your-jwts</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-propose-a-security-investment-to-your-cfo</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/how-to-ship-fast-without-shipping-risk-the-security-of-ai-assisted-software-development</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/if-soc-2-isnt-accelerating-sales-youre-doing-it-wrong</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/imagemagick-rce-take-2</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/improving-communication-between-your-security-and-dev-teams-so-everybody-wins</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/internal-vs-external-network-pentesting</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/internal-vs-external-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/introduction-to-cryptographic-failures</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/is-the-price-always-right-a-comprehensive-guide-to-penetration-testing-costs</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/lessons-from-incident-responses</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/mastering-slas-4-ways-to-meet-your-deadlines</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/mobile-penetration-tests-the-3-major-mobile-security-controls</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/multi-step-clickjacking-prevention-guide</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/nist-sp-800-115-and-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/penetration-testing-cost</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/penetration-testing-for-pci-dss</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/penetration-testing-roi-5-metrics-to-communicate-real-value</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/pentesting-in-a-production-environment</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/pros-and-cons-of-switching-pentest-vendors</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/reentrancy-flash-loans-and-the-real-threat-model-for-web3-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/risk-of-broken-access-control</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/risk-of-security-and-monitoring-logging-failures</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/risks-and-benefits-of-biometrics-in-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/security-theater-when-is-a-critical-really-a-critical</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/soc-2-reports-and-penetration-tests</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/social-engineering-service-providers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/software-penetration-enhanced-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/static-application-security-testing-sast-the-good-the-bad-and-the-ugly</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/stride-threat-modelling</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/the-7-hats-of-hacking</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/the-best-secure-code-review-providers-in-2026</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/the-domino-effect-chaining-medium-and-low-vulnerabilities-is-the-path-to-critical-breaches</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/the-security-liabilities-of-3rd-party-libraries</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/the-ultimate-security-code-review-checklist</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-10-cloud-security-assessment-companies</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-10-credential-based-attacks</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-10-fintech-penetration-testing-provider</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-10-penetration-testing-vendors</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-10-web-application-pentesting-services</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-pentesting-options-comparison</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/top-vulnerabilities-found-in-apis-via-manual-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/types-of-xss-attacks</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/understanding-your-attack-surface-how-to-measure-endpoints-in-your-application</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/weakness-in-modern-api-web-application-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/website-vs-web-application-pentesting</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-are-the-differences-between-different-open-source-fuzzing-tools</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-do-sast-dast-iast-and-rasp-mean-to-developers</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-privilege-escalation-types-examples-prevention-in-web-applications</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-sql-injection-examples-risks-prevention-strategies</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-the-difference-between-a-high-quality-and-low-quality-pentest</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-the-fine-for-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-is-threat-modeling-why-is-it-underestimated</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/what-to-do-when-you-dont-agree-with-your-penetration-test-report</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/when-is-it-okay-to-accept-risk</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/white-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-annual-penetration-testing-is-essential-for-your-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-common-vulnerability-scoring-systems-suck</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-developer-security-awareness-is-more-than-just-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-pentests-break-engineering-workflows</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-social-engineering-testing-is-crucial-for-security</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-wafs-are-not-enough</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/why-you-shouldnt-deal-with-low-hanging-fruit-before-a-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/post/worried-penetration-testing-will-derail-your-sprint-cycle</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/aembit</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/ai-penetration-testing-case-study-giatec</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/alara</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/ariglad</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/blindside</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/blubyrd</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/cira</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/coderbyte</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/company-cam</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/encircle-vanta</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/growing-saas-provider</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/hydrolix</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/klipfolio</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/knak</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/knot-api</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/leostream-corporation</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/motiva</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/movespring</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/okendo</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/pentesting-for-mission-critical-saas-solace</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/perusall</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/protecting-the-protector-how-rewind-uses-pentesting-to-secure-backup-data</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/qurrent</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/securing-event-intelligence-how-vendelux-ensured-a-safe-transition-to-microservices</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/securing-hybrid-blockchains-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/sware</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/take-command</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/thrivecart</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/titus</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/trust-and-will</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/trustradius</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/vroozi</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/welbi</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/case-studies/zafin</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/legal/secure-engineering-policy</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/legal/security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/legal/vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/career/intermediate-pentester</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/career/offensive-security-lead</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/elbsides-conference-2026</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/ensuring-secure-software-in-highly-regulated-industries</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/how-do-your-security-decisions-impact-your-enterprise-sales-deals</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/intro-to-secure-architecture-design-principles-for-full-stack-development</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/sast-vs-dast-the-ultimate-appsec-showdown</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/soc2-compliance-what-is-it-and-how-can-pre-seed-companies-prepare-for-it</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/talk-bsides-vancouver-2026</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/women-in-tech-panel-1-breaking-barriers-when-entering-the-tech-industry</loc>
    </url>
    <url>
        <loc>https://www.softwaresecured.com/event/women-in-tech-panel-2-empowering-the-job-search</loc>
    </url>
</urlset>