<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.securemango.com</loc>
<lastmod>2026-04-06T19:39:20.129Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management</loc>
<lastmod>2026-03-27T21:49:34.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security</loc>
<lastmod>2026-03-27T21:49:34.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture</loc>
<lastmod>2026-03-27T21:49:34.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security</loc>
<lastmod>2026-03-27T21:49:34.163Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam</loc>
<lastmod>2026-03-27T21:49:34.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment</loc>
<lastmod>2026-03-27T21:49:34.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations</loc>
<lastmod>2026-03-27T21:49:34.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security</loc>
<lastmod>2026-03-27T21:49:34.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security</loc>
<lastmod>2026-03-27T21:49:34.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/designing-for-failure-is-not-pessimism-its-the-only-architecture-that-survives</loc>
<lastmod>2025-09-20T10:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/mfa-fatigue-attacks-work-because-your-mfa-implementation-is-lazy</loc>
<lastmod>2025-09-13T10:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security/your-api-is-your-perimeter-now-and-youre-securing-it-like-its-2015</loc>
<lastmod>2025-09-06T10:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment/red-team-reports-that-collect-dust-why-your-organization-learns-nothing</loc>
<lastmod>2025-08-30T10:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management/your-dr-plan-has-a-4-hour-rto-on-paper-and-a-4-day-rto-in-reality</loc>
<lastmod>2026-04-04T12:59:28.114Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/flat-networks-are-a-gift-to-attackers-and-you-probably-still-have-one</loc>
<lastmod>2026-04-04T13:32:34.681Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/your-terraform-state-file-is-the-most-dangerous-object-in-your-aws-account</loc>
<lastmod>2026-04-04T03:15:53.303Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations/threat-hunting-without-a-hypothesis-is-just-browsing-logs-with-extra-steps</loc>
<lastmod>2026-04-04T02:56:12.135Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/threat-modeling-is-not-a-diagram-its-the-conversation-around-the-diagram</loc>
<lastmod>2026-04-04T03:06:01.248Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security/that-decommissioned-laptop-still-has-your-customer-database-on-it</loc>
<lastmod>2026-04-03T22:09:28.066Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/active-directory-is-still-the-keys-to-your-kingdom-and-youre-still-not-watching-it</loc>
<lastmod>2026-04-04T02:46:13.734Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management/security-policies-nobody-reads-and-the-governance-theater-that-produces-them</loc>
<lastmod>2026-04-04T12:59:28.118Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment/the-vulnerability-management-treadmill-why-youre-patching-everything-and-fixing-nothing</loc>
<lastmod>2026-04-03T19:52:29.147Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/your-wireless-network-assessment-is-missing-the-attack-surface-that-matters</loc>
<lastmod>2026-04-03T22:09:45.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/lambda-functions-are-not-firewalled-stop-treating-them-like-they-are</loc>
<lastmod>2026-04-03T22:09:47.780Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security/your-package-json-is-an-attack-surface-and-npm-audit-wont-save-you</loc>
<lastmod>2026-04-03T18:03:07.733Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security/your-endpoint-security-stack-has-more-agents-than-a-cia-field-office</loc>
<lastmod>2026-04-03T22:09:54.300Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/encryption-at-rest-doesnt-mean-what-you-think-it-means</loc>
<lastmod>2026-04-04T04:56:37.570Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/why-your-sso-implementation-is-giving-attackers-a-skeleton-key</loc>
<lastmod>2026-04-03T22:09:32.249Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/container-escape-is-not-a-hypothetical-its-your-tuesday-afternoon</loc>
<lastmod>2026-04-04T04:26:26.491Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations/your-incident-response-plan-wont-survive-first-contact</loc>
<lastmod>2026-04-03T22:09:35.647Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/tls-certificate-management-is-a-ticking-time-bomb-in-your-infrastructure</loc>
<lastmod>2026-04-03T22:09:42.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-risk-management/your-risk-register-is-a-lie-and-everyone-knows-it</loc>
<lastmod>2026-04-04T12:59:28.124Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-assessment/penetration-testing-reports-that-actually-get-vulnerabilities-fixed</loc>
<lastmod>2026-04-03T17:59:35.621Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/asset-security/why-your-data-classification-program-is-just-a-spreadsheet-nobody-updates</loc>
<lastmod>2026-04-03T22:09:52.330Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/software-development-security/sast-vs-dast-vs-iast-which-one-actually-finds-the-bugs-that-matter</loc>
<lastmod>2026-03-30T17:15:37.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-architecture/why-your-zero-trust-implementation-is-probably-just-a-vpn-with-extra-steps</loc>
<lastmod>2026-04-04T04:06:04.413Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/cloud-platform-security/s3-bucket-misconfigurations-the-gift-that-keeps-on-giving</loc>
<lastmod>2026-04-03T18:46:03.036Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/iam/why-service-account-sprawl-is-your-biggest-iam-blind-spot</loc>
<lastmod>2026-03-30T17:15:23.898Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/network-security/how-dns-tunneling-actually-works-and-why-your-firewall-wont-save-you</loc>
<lastmod>2026-04-03T17:54:58.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.securemango.com/security-operations/what-is-security-information-event-management-sys</loc>
<lastmod>2026-04-04T04:37:05.497Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
