<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.securemango.com</loc>
<lastmod>2026-04-03T15:34:35.570Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management</loc>
<lastmod>2026-03-27T21:49:34.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security</loc>
<lastmod>2026-03-27T21:49:34.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture</loc>
<lastmod>2026-03-27T21:49:34.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security</loc>
<lastmod>2026-03-27T21:49:34.163Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam</loc>
<lastmod>2026-03-27T21:49:34.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment</loc>
<lastmod>2026-03-27T21:49:34.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations</loc>
<lastmod>2026-03-27T21:49:34.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security</loc>
<lastmod>2026-03-27T21:49:34.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security</loc>
<lastmod>2026-03-27T21:49:34.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security/your-package-json-is-an-attack-surface-and-npm-audit-wont-save-you</loc>
<lastmod>2026-03-30T17:14:48.073Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security/your-endpoint-security-stack-has-more-agents-than-a-cia-field-office</loc>
<lastmod>2026-03-30T17:14:47.961Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/encryption-at-rest-doesnt-mean-what-you-think-it-means</loc>
<lastmod>2026-03-30T17:14:47.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/why-your-sso-implementation-is-giving-attackers-a-skeleton-key</loc>
<lastmod>2026-03-30T17:14:47.757Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/container-escape-is-not-a-hypothetical-its-your-tuesday-afternoon</loc>
<lastmod>2026-03-30T17:14:47.567Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations/your-incident-response-plan-wont-survive-first-contact</loc>
<lastmod>2026-03-30T17:14:47.529Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/tls-certificate-management-is-a-ticking-time-bomb-in-your-infrastructure</loc>
<lastmod>2026-03-30T17:15:22.676Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management/your-risk-register-is-a-lie-and-everyone-knows-it</loc>
<lastmod>2026-03-30T17:15:03.090Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment/penetration-testing-reports-that-actually-get-vulnerabilities-fixed</loc>
<lastmod>2026-03-30T17:15:36.566Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security/why-your-data-classification-program-is-just-a-spreadsheet-nobody-updates</loc>
<lastmod>2026-03-30T17:15:21.543Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security/sast-vs-dast-vs-iast-which-one-actually-finds-the-bugs-that-matter</loc>
<lastmod>2026-03-30T17:15:37.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/why-your-zero-trust-implementation-is-probably-just-a-vpn-with-extra-steps</loc>
<lastmod>2026-03-30T17:15:21.867Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/s3-bucket-misconfigurations-the-gift-that-keeps-on-giving</loc>
<lastmod>2026-03-30T17:15:39.158Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/why-service-account-sprawl-is-your-biggest-iam-blind-spot</loc>
<lastmod>2026-03-30T17:15:23.898Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/how-dns-tunneling-actually-works-and-why-your-firewall-wont-save-you</loc>
<lastmod>2026-03-30T17:15:22.622Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations/what-is-security-information-event-management-sys</loc>
<lastmod>2026-03-30T17:15:38.108Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
