<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.ox.security/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.ox.security/</loc>
		<lastmod>2026-04-15T15:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/meta-HP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/book-a-demo-1/</loc>
		<lastmod>2024-03-12T13:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/cookie-policy/</loc>
		<lastmod>2024-04-01T11:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/beyond-static-application-security-unleashing-active-aspm/</loc>
		<lastmod>2024-04-01T12:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/meet-ox-at-basc-2024/</loc>
		<lastmod>2024-04-04T19:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/asset-risk-visibility-aspm/</loc>
		<lastmod>2024-04-15T11:42:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/assess-appsec-processes-ensure-compliance-ox-security/</loc>
		<lastmod>2024-04-15T11:43:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-22-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/production-integrity/</loc>
		<lastmod>2024-04-15T11:46:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-12-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/single-source-of-truthasoc/</loc>
		<lastmod>2024-04-15T11:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/09/222-150x150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/rsa-2024-ox-tails-happy-hour/</loc>
		<lastmod>2024-05-03T14:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/rsa-party-graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/start-free-2/</loc>
		<lastmod>2024-06-04T07:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/appsec-vulnerability-prioritization-by-ox/</loc>
		<lastmod>2024-06-26T17:24:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/oscr/</loc>
		<lastmod>2024-07-16T15:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/workshop-tools-to-support-your-daily-mental-health/</loc>
		<lastmod>2024-07-24T11:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/aspm-mastery-elevating-application-security-beyond-the-basics/</loc>
		<lastmod>2024-09-18T10:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/product/</loc>
		<lastmod>2024-09-30T11:07:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/oscr-in-the-wild-a-new-look-at-the-most-common-software-supply-chain-exposures/</loc>
		<lastmod>2024-09-30T11:13:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Frame-1000002271-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/contact-ox/</loc>
		<lastmod>2024-10-02T13:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/gartner-cool-vendor-2023/</loc>
		<lastmod>2024-10-02T13:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/espresso-endurance-unveiling-the-realities-of-aspm/</loc>
		<lastmod>2024-10-02T13:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/Espresso-Endurance-LinkedIn-Event-Graphic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-security-bay-area-dinner/</loc>
		<lastmod>2024-10-02T13:18:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/bay-area-dinner-graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/no-bull-just-context-oxs-approach-to-software-composition-analysis/</loc>
		<lastmod>2024-10-02T13:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Espresso-Endurance-LinkedIn-Event-Graphic-LinkedIn-Single-Image-Ad-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/understanding-and-implementing-saasboms-for-enhanced-resilience/</loc>
		<lastmod>2024-10-02T13:23:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/Social-Graphic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-active-aspm-with-ox-security-and-hcl-appscan/</loc>
		<lastmod>2024-10-02T13:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/HCL-Webinar-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/from-hidden-risks-to-complete-control-expanding-software-and-api-inventories-for-modern-compliance-and-visibility/</loc>
		<lastmod>2024-10-02T13:24:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/From-Hidden-Risks-to-Complete-Control-with-Extended-Pipeline-Bill-of-Materials-LinkedIn-Single-Image-Ad.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/think-like-an-adversary-identify-visualize-potential-breach-points-with-attack-path-analysis/</loc>
		<lastmod>2024-10-02T13:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Webinar-Graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-appsec-posture-management-assessment/</loc>
		<lastmod>2024-10-02T13:26:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/the-ox-active-aspm-platform/</loc>
		<lastmod>2024-10-22T19:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/cloud-providers/</loc>
		<lastmod>2024-11-10T23:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/careers-2/</loc>
		<lastmod>2024-11-11T11:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/5-musts-for-building-a-software-supply-chain-security-strategy/</loc>
		<lastmod>2024-11-14T15:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/solution-brief-ox-security-red-hat-advanced-cluster-security-for-kubernetes-_lp/</loc>
		<lastmod>2024-11-14T17:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/appsec-champion-quiz/</loc>
		<lastmod>2024-11-26T09:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/bh-eu-ox-clover-lunch/</loc>
		<lastmod>2024-11-26T11:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-building-security-in-the-journey-to-secure-by-design-in-a-dynamic-appsec-world/</loc>
		<lastmod>2024-11-28T14:55:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/page-webinar-revolutionizing-appsec-strategies-for-managing-open-source-risks-effectively/</loc>
		<lastmod>2024-12-09T13:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/raffle-black-hat-ps5-2024/</loc>
		<lastmod>2024-12-12T10:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/book-a-demo-thank-you-alternative-time/</loc>
		<lastmod>2024-12-12T21:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/collaborating-for-success-bridging-the-gap-between-developers-security-and-operations-teams/</loc>
		<lastmod>2024-12-12T21:56:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/decoding-appsec-reporting-from-metrics-to-meaningful-insights/</loc>
		<lastmod>2024-12-12T21:56:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/frost-sullivan-names-ox-security-company-of-the-year-2024/</loc>
		<lastmod>2024-12-12T21:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/securing-the-cloud-native-landscape-compliance-assurance-through-aspm/</loc>
		<lastmod>2025-01-16T14:23:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/book-a-demo-thank-you-meeting-booked/</loc>
		<lastmod>2025-01-22T12:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/thank-you-for-booking-a-walkthrough/</loc>
		<lastmod>2025-01-26T08:06:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/platform-walkthroug-alternative-time/</loc>
		<lastmod>2025-01-26T08:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/esg-report-2025-modern-application-security-platforms-fix-what-matters/</loc>
		<lastmod>2025-02-17T10:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ox-at-swiss-cyber-days/</loc>
		<lastmod>2025-02-19T15:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/hr-hg-with-defy/</loc>
		<lastmod>2025-03-03T14:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/globaldots-and-ox/</loc>
		<lastmod>2025-03-06T12:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/from-foundation-to-maturity-how-to-build-a-solid-appsec-program-webinar-register/</loc>
		<lastmod>2025-03-19T15:22:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/the-science-behind-fatigue-in-security-teams-and-how-to-beat-it/</loc>
		<lastmod>2025-04-21T14:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ox-monthly-deminars/</loc>
		<lastmod>2025-04-24T14:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-monthly-deminars/</loc>
		<lastmod>2025-04-29T10:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ox-virtual-money-machine/</loc>
		<lastmod>2025-05-14T12:18:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/e500-raffle-competition-terms-and-conditions-ice-2025/</loc>
		<lastmod>2025-05-15T09:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ci-cd-workflow-automation/</loc>
		<lastmod>2025-06-04T16:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ci-cd-security-posture-managment-ox-security/</loc>
		<lastmod>2025-06-04T16:06:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/the-art-of-vibe-coding-and-staying-secure-a-practical-guide/</loc>
		<lastmod>2025-06-11T13:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/cyeblox-and-ox/</loc>
		<lastmod>2025-06-12T18:55:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/home-page/</loc>
		<lastmod>2025-06-23T11:46:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/security-tools-marketplace/</loc>
		<lastmod>2025-06-24T18:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/from-chaos-to-control-aspm-devsecops-and-software-supply-chain-security-in-italy/</loc>
		<lastmod>2025-06-29T11:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/vulnerability-disclosure-program/</loc>
		<lastmod>2025-07-21T17:06:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/events/riskontherocks/</loc>
		<lastmod>2025-07-27T06:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/events/black-hat-us-2025/</loc>
		<lastmod>2025-07-31T10:09:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/contact-product-walkthrough/</loc>
		<lastmod>2025-08-05T13:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/choosing-the-right-sca-for-your-organization/</loc>
		<lastmod>2025-08-28T11:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/SCA-Whitepaper-Graphic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/become-a-partner/</loc>
		<lastmod>2025-08-31T11:30:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/the-cisos-appsec-dilemma-what-matters-most-in-the-age-of-ai-webinar/</loc>
		<lastmod>2025-09-09T16:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/technology-alliances/</loc>
		<lastmod>2025-10-08T07:11:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ox-security-named-security-innovator-and-code-to-cloud-leader-in-the-latio-2025-cloud-security-report/</loc>
		<lastmod>2025-10-13T14:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/the-ai-velocity-gap-playbook/</loc>
		<lastmod>2025-10-30T17:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/1.1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/terms_of_ai_services/</loc>
		<lastmod>2025-11-02T08:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/the-cisos-dilemma-when-the-opposing-team-got-superpowers/</loc>
		<lastmod>2025-11-06T12:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/watch-the-cisos-dilemma-when-the-opposing-team-got-superpowers/</loc>
		<lastmod>2025-11-06T14:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/leveraging-ox-security-for-eu-cra-compliance-white-paper/</loc>
		<lastmod>2025-11-07T15:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/buyers-guide-how-to-not-screw-up-application-security-download-guide/</loc>
		<lastmod>2025-11-07T15:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/the-kev-illusion-separating-true-threats-from-pretend-critical-risks/</loc>
		<lastmod>2025-11-07T15:55:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Mockup-2-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/nist-cybersecurity-framework-2-0-improve-application-security-in-todays-threat-landscape-whitepaper/</loc>
		<lastmod>2025-11-07T16:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/NIST-Cybersecurity-Framework-2.0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/vibing-with-caution-how-ai-code-generation-challenges-application-security-whitepaper/</loc>
		<lastmod>2025-11-07T16:07:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/The-OX-Active-ASPM-Platform-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/arms-race-appsec-vs-the-world-whitepaper/</loc>
		<lastmod>2025-11-07T16:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/ox-2025-application-security-benchmark-report/</loc>
		<lastmod>2025-11-07T16:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/modern-application-security-platforms-fix-what-matters-esg-ebook/</loc>
		<lastmod>2025-11-07T16:16:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/eight-reasons-why-a-data-fabric-will-improve-your-appsec-ebook/</loc>
		<lastmod>2025-11-07T16:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/frost-and-sullivan-frost-radar-report/</loc>
		<lastmod>2025-11-07T16:20:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/frost-and-sull.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/what-appsec-can-learn-from-30-years-of-cybersecurity/</loc>
		<lastmod>2025-11-07T16:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/ox-security-named-a-sample-vendor-for-aspm/</loc>
		<lastmod>2025-11-07T16:24:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Whitepapers-and-Reports-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/how-aspm-solutions-help-organizations-prepare-for-the-eus-dora/</loc>
		<lastmod>2025-11-07T16:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/what-you-need-to-know-about-application-detection-and-response/</loc>
		<lastmod>2025-11-07T16:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/SCA-Whitepaper-Graphic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/key-performance-indicators-for-application-security/</loc>
		<lastmod>2025-11-07T16:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-code-to-exposure-and-back-again-how-ai-powered-defenders-outpace-ai-driven-threats/</loc>
		<lastmod>2025-11-10T11:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/How-AI-Powered-Defenders-Outpace-AI-Driven-Threats-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/are-ai-app-builders-secure-we-tested-lovable-base44-and-bolt-to-find-out/</loc>
		<lastmod>2025-11-18T12:25:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/Are-AI-App%E2%80%A8Builders-Secure_-We-Tested-Lovable-Base44-and-Bolt-to-Find-Out.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/appsec-uncomplicated-by-ox-everything-you-need-to-know-about-aspm/</loc>
		<lastmod>2025-11-27T04:19:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-register-the-2026-guide-to-securing-ai-generated-code-at-scale-phase-two/</loc>
		<lastmod>2025-11-27T15:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-cycognito-ox-content-download-video-deck-thank-you/</loc>
		<lastmod>2025-11-27T16:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/dowload_content_webinar-cycognito-ox_video_slidedeck/</loc>
		<lastmod>2025-11-30T11:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/vibesec-product-tour/</loc>
		<lastmod>2025-12-09T13:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/securing-ai-generated-code-at-scale-cheat-sheet-thank-you/</loc>
		<lastmod>2025-12-17T13:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/terms-of-service/</loc>
		<lastmod>2025-12-30T21:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/content-download-the-2026-application-security-blueprint/</loc>
		<lastmod>2026-01-07T12:25:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/the-2026.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/context-is-key-empowering-developers-with-the-right-security-insights/</loc>
		<lastmod>2026-01-19T12:38:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/channel-partners/</loc>
		<lastmod>2026-02-24T20:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/black-hat-europe-2024/</loc>
		<lastmod>2026-02-27T15:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/attack-path-reachability-analysis/</loc>
		<lastmod>2026-02-27T15:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-security-rsac-2024/</loc>
		<lastmod>2026-02-27T15:19:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/shift-left/</loc>
		<lastmod>2026-02-27T15:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-25-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/09/333-150x150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/privacy-policy/</loc>
		<lastmod>2026-03-02T13:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/derailed-2026-application-security-benchmark-report/</loc>
		<lastmod>2026-03-10T18:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar/threat-intelligence-update-whats-been-working-for-hackers-and-what-have-the-good-guys-been-doing/</loc>
		<lastmod>2026-03-11T13:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/1200x628-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/book-a-demo/</loc>
		<lastmod>2026-03-11T16:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/derailed-2026-application-security-benchmark-report/</loc>
		<lastmod>2026-03-17T12:02:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/subscription-agreement/</loc>
		<lastmod>2026-04-07T08:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-register-the-2026-guide-to-securing-ai-generated-code-at-scale/</loc>
		<lastmod>2026-04-12T12:54:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/The-2026-Guide-to-Securing-AI-Generated-Code-at-Scale-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ai-powered-fixes/</loc>
		<lastmod>2026-04-13T14:10:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.ox.security/ox-code/</loc>
		<lastmod>2026-04-15T20:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-agentic-pentester/</loc>
		<lastmod>2026-04-15T20:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Agentic-Pentester.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resource-category/whitepapers-and-reports/mother-of-all-ai-supply-chains/</loc>
		<lastmod>2026-04-16T08:01:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Critical-Systemic-Vulnerability-at-the-Core-of-the-MCP-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/</loc>
		<lastmod>2026-04-17T09:45:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/Property-1Ox-Blog-Size64-ColorDark-Blue.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/resources/</loc>
		<lastmod>2026-04-17T09:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Resource-Library.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/</loc>
		<lastmod>2026-04-17T10:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Podcasts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/integrations/</loc>
		<lastmod>2026-04-17T10:17:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Integrations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-cycode/</loc>
		<lastmod>2026-04-17T10:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Cycode.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-black-duck/</loc>
		<lastmod>2026-04-17T10:24:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Black-Duck.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-veracode/</loc>
		<lastmod>2026-04-17T10:24:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Veracode.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-checkmarx/</loc>
		<lastmod>2026-04-17T10:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Checkmarx.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-snyk/</loc>
		<lastmod>2026-04-17T10:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Snyk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-aikido/</loc>
		<lastmod>2026-04-17T10:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-vs-Aikido.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/about-ox/</loc>
		<lastmod>2026-04-17T10:37:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-About-us.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/newsroom/</loc>
		<lastmod>2026-04-17T10:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Newsroom.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/events/</loc>
		<lastmod>2026-04-17T10:38:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Events.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/partners/</loc>
		<lastmod>2026-04-17T10:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Partners.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/pricing/</loc>
		<lastmod>2026-04-17T10:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Plans-Pricing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/careers/</loc>
		<lastmod>2026-04-17T10:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Careers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/trust-center/</loc>
		<lastmod>2026-04-17T10:44:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Trust-Center.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/application-security-platform/</loc>
		<lastmod>2026-04-17T10:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Platform-Overview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/vibesec/</loc>
		<lastmod>2026-04-17T10:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-VibeSac.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-cloud/</loc>
		<lastmod>2026-04-17T10:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-for-software-supply-chain-security/</loc>
		<lastmod>2026-04-17T10:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Software-Supply-Chain-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/assess-appsec-processes-ensure-compliance/</loc>
		<lastmod>2026-04-17T10:57:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Compliance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/ox-for-api-exposure-management/</loc>
		<lastmod>2026-04-17T10:58:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-API-Exposure-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/eliminate-the-need-to-revisit-old-code-and-workflows-use-case/</loc>
		<lastmod>2026-04-17T10:58:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-AP-Dev-Empowerment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/open-software-supply-chain-attack-reference-oscr/</loc>
		<lastmod>2026-04-17T11:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OSCR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/contact/</loc>
		<lastmod>2026-04-17T12:25:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/meta-Contact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/contact.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->