<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.ox.security/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.ox.security/resources/</loc>
		<lastmod>2026-04-16T11:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resources/5-musts-for-building-a-software-supply-chain-security-strategy/</loc>
		<lastmod>2024-04-18T13:12:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/5-Musts-eBook-Resources-Graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/upcoming-aspm-mastery-elevating-application-security-beyond-the-basics/</loc>
		<lastmod>2024-09-30T12:15:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/with-time-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/upcoming-decoding-appsec-reporting-from-metrics-to-meaningful-insights/</loc>
		<lastmod>2024-10-15T16:33:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/SW-Decoding-AppSec-Reporting-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/upcoming-collaborating-for-success-bridging-the-gap-between-developers-security-and-operations-teams/</loc>
		<lastmod>2024-10-30T17:11:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/seemplcity-webinar-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/revolutionizing-appsec-strategies-for-managing-open-source-risks-effectively/</loc>
		<lastmod>2024-12-24T15:46:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/24.12-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/from-foundation-to-maturity-how-to-build-a-solid-appsec-program-webinar/</loc>
		<lastmod>2025-03-19T15:23:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/webinar-card-for-li.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/the-science-behind-fatigue-in-security-teams-and-how-to-beat-it/</loc>
		<lastmod>2025-04-23T12:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/webinar-april-22-for-LI-Site-The-Science-Behind-Alert-Fatigue-in-Security-Teams-How-to-Beat-It.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-appsec-remediation-response/</loc>
		<lastmod>2025-05-15T08:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/AppSec-remediation-response-Bill-of-Materials-Overview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-multi-dependency-graph-in-ox/</loc>
		<lastmod>2025-05-15T08:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Multi-dependency-graph-in-OX.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-pipeline-workflows-in-ox-streamline-workflows-prevent-the-deployment-of-vulnerable-code/</loc>
		<lastmod>2025-05-15T08:58:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Solutions-for-financial-services-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-cloud-bill-of-materials-overview/</loc>
		<lastmod>2025-05-15T08:59:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Cloud-Bill-of-Materials-Overview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-solutions-for-financial-services-where-ox-security-shines-in-software-compliance/</loc>
		<lastmod>2025-05-15T08:59:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Solutions-for-financial-services.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/datasheet-solutions-for-hospitality-where-ox-security-shines-in-software-compliance/</loc>
		<lastmod>2025-05-15T08:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/NIST-Cybersecurity-Framework-2.0-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-developer-experience-in-ox/</loc>
		<lastmod>2025-05-15T08:59:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Developer-experience-in-OX.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-integrated-software-composition-analysis-sca-better-insight-fewer-false-positives/</loc>
		<lastmod>2025-05-15T08:59:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Integrated-software-composition-analysis-SCA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/the-ox-active-aspm-platform-solution-brief/</loc>
		<lastmod>2025-05-15T09:01:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/The-OX-Active-ASPM-Platform-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/appsec-vulnerability-prioritization-by-ox-from-alert-fatigue-to-action/</loc>
		<lastmod>2025-05-15T09:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/SOLUTION-BRIEF.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/securing-the-cloud-native-landscape-compliance-assurance-through-aspm-solution-brief/</loc>
		<lastmod>2025-05-15T09:02:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/solution-brief-companice-assurnce-through-aspm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/webinar-the-art-of-vibe-coding-and-staying-secure-a-practical-guide/</loc>
		<lastmod>2025-06-30T08:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/webinar-The-Art-of-Vibe-Coding-and-Staying-Secure-A-Practical-Guide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/in-github-we-trust-10-ways-you-could-get-pwned/</loc>
		<lastmod>2025-08-27T09:15:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/Untitled-1200-x-628-px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-ox-security-scanning-public-images-unmask-hidden-risks-in-your-software-supply-chain/</loc>
		<lastmod>2025-09-02T11:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/OX-Security_-Scanning-Public-Images_-Unmask-hidden-risks-in-your-software-supply-chain.-1-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/data-sheet-ox-securitys-ide-extension-real-time-risk-detection-and-developer-first-security/</loc>
		<lastmod>2025-09-07T12:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/OX-Securitys-IDE-Extension-Real-time-Risk-Detection-and-Developer-first-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/the-cisos-appsec-dilemma-what-matters-most-in-the-age-of-ai/</loc>
		<lastmod>2025-10-27T14:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/The-CISOs-AppSec-Dilemma_%E2%80%A8What-Matters-Most-in-the-Age-of-AI-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/buyers-guide-how-to-not-screw-up-application-security/</loc>
		<lastmod>2025-11-07T15:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/BuyersGuide-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/ebook-the-kev-illusion-separating-true-threats-from-pretend-critical-risks/</loc>
		<lastmod>2025-11-07T15:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Mockup-2-v2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/nist-cybersecurity-framework-2-0-improve-application-security-in-todays-threat-landscape-2/</loc>
		<lastmod>2025-11-07T16:04:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/NIST-Cybersecurity-Framework-2.0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/vibing-with-caution-how-ai-code-generation-challenges-application-security/</loc>
		<lastmod>2025-11-07T16:08:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/The-OX-Active-ASPM-Platform-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/recourse-arms-race-appsec-vs-the-world/</loc>
		<lastmod>2025-11-07T16:10:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/The-OX-Active-ASPM-Platform-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/modern-application-security-platforms-fix-what-matters-esg-resources/</loc>
		<lastmod>2025-11-07T16:16:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/The-OX-Active-ASPM-Platform-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/appsec-uncomplicated-by-ox-everything-you-need-to-know-about-aspm-lp/</loc>
		<lastmod>2025-11-07T16:18:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/AppSec-uncomplicated-Everything-you-need-to-know-about-ASPM-and-more.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/eight-reasons-why-a-data-fabric-will-improve-your-appsec-e-book/</loc>
		<lastmod>2025-11-07T16:19:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/Eight-Reasons-Why-a-Data-Fabric-Will-Improve-Your-AppSec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/whitepaper-how-aspm-solutions-help-organizations-prepare-for-the-eus-dora/</loc>
		<lastmod>2025-11-07T16:26:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/CISO-ENDURANCE-GUIDE-SERIES-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/what-you-need-to-know-about-application-detection-and-response/</loc>
		<lastmod>2025-11-07T16:27:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/CISO-ENDURANCE-GUIDE-SERIES-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/key-performance-indicators-for-application-security-lessons-from-leading-cisos/</loc>
		<lastmod>2025-11-07T16:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/CISO-ENDURANCE-GUIDE-SERIES.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/ebook-are-ai-app-builders-secure-we-tested-lovable-base44-and-bolt-to-find-out/</loc>
		<lastmod>2025-11-18T12:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/Are-AI-App%E2%80%A8Builders-Secure_-We-Tested-Lovable-Base44-and-Bolt-to-Find-Out.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/code-to-exposure-and-back-again-how-ai-powered-defenders-outpace-ai-driven-threats/</loc>
		<lastmod>2025-11-30T11:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/How-AI-Powered-Defenders-Outpace-AI-Driven-Threats-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/iwcontext-is-key-empowering-developers-with-the-right-security-insights/</loc>
		<lastmod>2026-01-19T12:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Untitled-design-49.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/threat-intelligence-update-whats-been-working-for-hackers-and-what-have-the-good-guys-been-doing/</loc>
		<lastmod>2026-01-28T09:36:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/1200x628-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/why-ox-was-named-code-to-cloud-leader-and-cloud-security-innovator/</loc>
		<lastmod>2026-02-10T15:47:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/OX_Final-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/the-2026-guide-to-securing-ai-generated-code-at-scale/</loc>
		<lastmod>2026-02-23T12:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/james-and-boaz-watch-now.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/frost-sullivan-names-ox-security-as-leader-in-application-security-posture-management-aspm/</loc>
		<lastmod>2026-03-18T09:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/frost-and-sull-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/swisscom/</loc>
		<lastmod>2026-03-27T14:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/swisscom-logo-case-study.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/from-zero-visibility-to-a-fully-secured-supply-chain-kalturas-journey-with-ox/</loc>
		<lastmod>2026-03-27T14:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/Kaltura-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/navigating-vulnerability-prioritization-with-ox/</loc>
		<lastmod>2026-03-27T14:21:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Case-Study.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/kalturas-journey-to-streamlined-development-with-ox-security/</loc>
		<lastmod>2026-03-27T14:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/kultura.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/888-holdings-bets-on-a-new-approach-with-active-aspm/</loc>
		<lastmod>2026-03-27T14:22:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/888.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/doubleverify-gains-control-and-efficiency-with-ox-security/</loc>
		<lastmod>2026-03-27T14:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/doubleverify.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/eblu-secures-a-healthier-future-with-ox-security/</loc>
		<lastmod>2026-03-27T14:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/eblu-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/case-studies/auditboard/</loc>
		<lastmod>2026-04-14T09:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/auditboard.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->