<?xml version="1.0" encoding="UTF-8"?>
<urlset
xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url>
<loc>https://www.cycognito.com/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/gigaom-radar-for-attack-surface-management-2026/</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito_Platform_Overview.pdf</loc>
   <lastmod>2023-12-19T03:51:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/platform/attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SB-SolutionBrief_Discover_Contextualize.pdf</loc>
   <lastmod>2023-11-04T23:57:07+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/DS-CyCognito_Discovery_and_Contextualization_2023Q2_v1.pdf</loc>
   <lastmod>2023-12-19T03:51:35+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/reduce-your-external-attack-surface-with-better-communications-across-security-it-and-business-teams/</loc>
   <lastmod>2026-04-02T17:58:44+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jason-pappalexis/</loc>
   <lastmod>2026-04-02T18:28:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/product/</loc>
   <lastmod>2026-04-02T18:51:17+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/igal-zeifman/</loc>
   <lastmod>2026-04-02T18:37:52+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan/</loc>
   <lastmod>2026-04-02T18:30:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-f5-big-ip-access-policy-manager-remote-code-execution-cve-2025-53521/</loc>
   <lastmod>2026-04-02T17:43:19+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/citrix-netscaler-adc-and-gateway-vulnerabilities-cve-2026-3055-cve-2026-4368/</loc>
   <lastmod>2026-04-02T17:43:17+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-ubiquiti-unifi-network-application-path-traversal-cve-2026-22557/</loc>
   <lastmod>2026-04-02T17:34:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746/</loc>
   <lastmod>2026-04-02T18:31:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/what-is-cve-2026-23813-cve-2026-23814/</loc>
   <lastmod>2026-04-02T18:38:11+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-microsoft-sql-server-elevation-of-privilege-vulnerability-cve-2026-21262/</loc>
   <lastmod>2026-04-02T17:43:16+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cisco-secure-firewall-management-center-root-compromise-cve-2026-20079-cve-2026-20131/</loc>
   <lastmod>2026-04-02T18:43:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/igal-zeifman/page/2/</loc>
   <lastmod>2026-04-03T03:03:07+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-new-in-cycognito-february-2026-platform-enhancements/</loc>
   <lastmod>2026-04-02T18:30:58+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2025-15467-openssl-cms-authenvelopeddata-stack-based-buffer-overflow/</loc>
   <lastmod>2026-04-02T18:42:38+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/amit-sheps/</loc>
   <lastmod>2026-04-02T18:30:50+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cisco-catalyst-sd-wan-authentication-bypass-cve-2026-20127/</loc>
   <lastmod>2026-04-02T18:38:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769/</loc>
   <lastmod>2026-04-02T18:51:45+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/permission-to-ignore-leveraging-the-ctem-framework-to-focus-on-real-risk/</loc>
   <lastmod>2026-04-02T18:37:51+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/what-is-cve-2026-1731/</loc>
   <lastmod>2026-04-02T18:51:35+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/moving-from-activity-to-impact-how-ctem-refocuses-security-kpis/</loc>
   <lastmod>2026-04-02T18:02:21+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/removing-the-guesswork-from-ctem/</loc>
   <lastmod>2026-04-02T18:30:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/solarwinds-web-help-desk-vulnerabilities-update/</loc>
   <lastmod>2026-04-02T18:51:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2026-24858-forticloud-sso-authentication-bypass/</loc>
   <lastmod>2026-04-02T18:38:07+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/amit-sheps/page/2/</loc>
   <lastmod>2026-04-03T03:03:08+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2025-14733-authentication-bypass-vulnerability/</loc>
   <lastmod>2026-04-02T17:43:13+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-django-sql-injection-vulnerability-cve-2025-64459/</loc>
   <lastmod>2026-04-02T18:51:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2025-64095-critical-unauthenticated-file-upload-vulnerability-in-dnn-dotnetnuke/</loc>
   <lastmod>2026-04-02T18:46:59+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-apache-tomcat-vulnerability-cve-2025-55752/</loc>
   <lastmod>2026-04-02T18:37:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2025-37164-critical-unauthenticated-remote-code-execution-in-hpe-oneview/</loc>
   <lastmod>2026-04-02T18:30:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2026-21858-cve-2025-68613-cve-2026-21877-n8n-workflow-automation-vulnerabilities/</loc>
   <lastmod>2026-04-02T18:51:26+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2026-24061-telnet-authentication-bypass-in-gnu-inetutils/</loc>
   <lastmod>2026-04-02T18:51:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-react-server-components-rce-vulnerability-cve-2025-55182/</loc>
   <lastmod>2026-04-02T17:43:11+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-cve-2025-41115-critical-scim-privilege-escalation-in-grafana-enterprise/</loc>
   <lastmod>2026-04-02T18:51:24+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/stav-nahum/</loc>
   <lastmod>2026-04-02T18:30:54+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/introducing-discovery-of-externally-reachable-mcp-services/</loc>
   <lastmod>2026-04-02T18:31:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-new-in-cycognito-october-2025-platform-enhancements/</loc>
   <lastmod>2026-04-02T18:51:22+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-new-in-cycognito-august-2025-platform-enhancements/</loc>
   <lastmod>2026-04-02T18:51:16+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/naftali-kopilevich/</loc>
   <lastmod>2026-04-02T18:30:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-integrates-with-cloudflare-for-direct-access-to-dns/</loc>
   <lastmod>2026-04-02T18:30:43+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/shahar-agmon/</loc>
   <lastmod>2026-04-02T18:37:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/dynamic-ips-are-breaking-security-heres-how-to-fix-it/</loc>
   <lastmod>2026-04-02T18:37:05+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/ansh-patnaik/</loc>
   <lastmod>2026-04-02T18:29:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/polyfill-io-and-software-supply-chain-security-a-cautionary-tale/</loc>
   <lastmod>2026-04-02T18:33:51+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/application-security-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/web-application-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/application-security-in-the-cloud/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/waf-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/web-application-penetration-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/automated-security-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito-DS-Active-Security-Testing-Oct2023.pdf</loc>
   <lastmod>2023-12-19T03:55:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito_Data_Sheet_Vulnerability_Management.pdf</loc>
   <lastmod>2023-12-19T03:51:45+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/web-application-security-testing-struggles-shortfalls-and-solutions/</loc>
   <lastmod>2026-04-02T18:51:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/graham-rance/</loc>
   <lastmod>2026-04-02T17:37:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/external-attack-surface-management-promised-visibility-but-did-it-deliver/</loc>
   <lastmod>2026-04-02T18:49:01+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-security-rating-platforms-work/</loc>
   <lastmod>2026-04-02T17:58:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/cycognito-state-of-web-application-security-testing-2024/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/api-security-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/api-security-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/api-discovery/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/api-discovery-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/owasp-api-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/rest-api-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/automated-pen-testing-for-efficient-red-teaming/</loc>
   <lastmod>2026-04-02T17:43:51+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/penetration-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/solution-brief-scale-your-pen-testing-and-red-team-operations.pdf</loc>
   <lastmod>2023-10-10T20:17:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/automated-pentesting/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/ctem/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/active-vs-passive-reconnaissance/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/adversarial-exposure-validation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/security-controls/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/breach-and-attack-simulation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanning/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanning-vs-pen-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanning-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-detection-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-assessment-and-penetration-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanner-for-websites/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanning-in-aws/</loc>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/stroer.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/videos/stroer-customer-testimonial.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/understanding-continuous-threat-exposure-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/continuous-threat-exposure-management-your-path-to-reduced-external-cyberisecurity-risk/</loc>
   <lastmod>2026-04-02T17:34:12+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/demystifying-continuous-threat-exposure-management-ctem/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/dark-reading-threat-vulnerability-data-risk-reduction-opportunities-examined/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/automated-security-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito-DS-Automated-Security-Testing-Oct-2024.pdf</loc>
   <lastmod>2024-10-21T19:20:21+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito-DS-Prioritization-and-Remediation-Mar2024.pdf</loc>
   <lastmod>2024-03-08T21:24:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/solution-brief-exposure-management.pdf</loc>
   <lastmod>2023-09-14T16:32:38+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/Techology-Checklist-CyCognito-Continuous-Threat-Exposure-Management-Feb-2024.pdf</loc>
   <lastmod>2024-02-06T21:43:44+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/Cycognito_Prioritization_SolutionsBrief.pdf</loc>
   <lastmod>2023-11-05T00:05:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/aimpoint-the-state-of-external-attack-surface-and-risk-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-stroer.pdf</loc>
   <lastmod>2023-11-16T16:11:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/vulnerability-scanning-process/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/data-leak-prevention/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/leaked-credentials/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/threat-exposure-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/cycognito-state-of-external-exposure-management-2024/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/if-you-arent-running-the-right-security-testing-how-protected-are-you/</loc>
   <lastmod>2026-04-02T17:56:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/active-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/TechDS-CyCognito-Active-Testing-vs.-Passive-Scanning_Apr_2023.pdf</loc>
   <lastmod>2023-11-14T20:47:57+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/passive-scanning.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/external-exposure-management-key-to-safeguarding-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:34:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/tim-matthews/</loc>
   <lastmod>2026-04-02T17:37:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-budget-for-easm/</loc>
   <lastmod>2026-04-02T18:48:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/forrester-the-total-economic-impact-of-the-cycognito-platform/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/five-questions-your-easm-vendor-doesnt-want-you-to-ask/</loc>
   <lastmod>2026-04-02T18:35:08+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/what-cisos-need-to-know-about-the-secs-new-rules/</loc>
   <lastmod>2026-04-02T18:02:11+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/ai-at-cycognito/</loc>
   <lastmod>2026-04-02T17:44:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/api-detection-with-cycognito/</loc>
   <lastmod>2026-04-02T18:02:13+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/new-emerging-technology-external-attack-service-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/esg-gaps-in-attack-surface-monitoring-and-security-testing-for-cyber-risk-mitigation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/threat-intelligence.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/understanding-the-technology-threat-intelligence-and-exploit-intelligence/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/exploit-intelligence-an-easm-force-multiplier/</loc>
   <lastmod>2026-04-02T17:35:50+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-unveils-exploit-intelligence-to-accelerate-risk-remediation.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/caasm/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface-management-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/shadow-it/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/cloud-security-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/cloud-security-challenges/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/cspm/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/cloud-compliance/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/cnapp/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/qualys-competitors/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/crowdstrike-falcon-pricing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/qualys-pricing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-vector/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cyber-attack/sql-injection/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cyber-attack/xss/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/asset-discovery-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/asset-inventory-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-path-analysis/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface-analysis/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface-mapping/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/cortex-xpanse/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/microsoft-defender-easm/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/exploit-intelligence/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/DS-Exploit-Intelligence-v6.pdf</loc>
   <lastmod>2023-12-19T03:51:38+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/build-a-modern-threat-intelligence-program-based-in-automation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/rethinking-penetration-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/dast-vs-sast/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/dast-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/dast-vs-manual-pentesting-vs-automated-pentesting/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/dynamic-application-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/security-control-validation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/security-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/application-security/software-supply-chain-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/ai-security/ai-agent-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/ai-security/prompt-injection/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/ai-security/shadow-ai/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/ai-security/llm-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/ai-security/mcp-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/api-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cloud-security/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/cyber-attack/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/drps/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/drps/compromised-accounts/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/drps/phishing-domains/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/cybersecurity-risk-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/vulnerability-management-program/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/cvss-scoring/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/risk-based-vulnerability-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/vulnerability-management-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/a-new-framework-understanding-exposure-management/</loc>
   <lastmod>2026-04-02T18:48:33+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/cycognito-external-risk-insights/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/idc-attack-surface-management-the-foundation-of-risk-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/tag-cyber-benefits-of-external-attack-surface-management-easm-across-both-security-and-it/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/addressing-attack-surface-cyber-risk-an-interview-with-rob-gurzeev-ceo/</loc>
   <lastmod>2026-04-02T17:30:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/rob-gurzeev/</loc>
   <lastmod>2026-04-02T17:43:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/security-risks-in-internet-exposed-scada-in-manufacturing/</loc>
   <lastmod>2026-04-02T18:29:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/three-approaches-to-external-attack-surface-management/</loc>
   <lastmod>2026-04-02T18:02:05+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/principles-of-attack-surface-protection-part-one-discover-everything/</loc>
   <lastmod>2026-04-02T17:58:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/principles-of-attack-surface-protection-part-two-assess-all-assets-to-detect-all-risks/</loc>
   <lastmod>2026-04-02T17:43:59+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/principles-of-attack-surface-protection-part-three-prioritize-risks-that-endanger-your-business/</loc>
   <lastmod>2026-04-02T17:35:59+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/principles-of-attack-surface-protection-part-four-winning-the-remediation-race/</loc>
   <lastmod>2026-04-02T17:36:00+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/principles-of-attack-surface-protection-part-five-time-crowns-the-winner-in-security/</loc>
   <lastmod>2026-04-02T17:36:02+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/accelerating-the-journey-cycognito-celebrates-100m-series-c/</loc>
   <lastmod>2026-04-02T17:35:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-secures-100m-to-accelerate-next-evolution-of-attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/where-the-heck-do-i-start-or-why-we-created-remediation-planner/</loc>
   <lastmod>2026-04-02T17:58:28+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/oren-parag/</loc>
   <lastmod>2026-04-02T18:28:31+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/redefining-what-external-attack-surface-management-should-be-with-a-new-platform-approach/</loc>
   <lastmod>2026-04-02T17:35:28+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/raphael-reich/</loc>
   <lastmod>2026-04-02T18:28:29+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/does-pen-testing-still-make-sense-in-an-era-of-digital-transformation/</loc>
   <lastmod>2026-04-02T17:58:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/pen-test-alternatives/</loc>
   <lastmod>2026-04-02T17:35:08+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/cycognito/</loc>
   <lastmod>2026-04-02T18:31:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/map-your-attack-surface-to-comply-with-data-privacy-regulations/</loc>
   <lastmod>2026-04-02T17:35:11+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface-discovery/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/subsidiary-it-risk/</loc>
   <lastmod>2026-04-02T17:35:16+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/mergers-and-acquisition-cyber-risk/</loc>
   <lastmod>2026-04-02T17:35:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-castle-has-fallen-protect-your-it-ecosystem/</loc>
   <lastmod>2026-04-02T17:58:46+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/vulnerability-scanners-are-no-match-for-modern-threats/</loc>
   <lastmod>2026-04-02T17:44:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/increased-attack-surface-visibility-and-security-workflows/</loc>
   <lastmod>2026-04-02T17:35:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-announces-next-generation-platform.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/news-release-beating-attackers-at-their-own-game-by-building-a-nation-state-grade-reconnaissance-platform/</loc>
   <lastmod>2026-04-02T17:43:58+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/creating-cyber-reconnaissance/</loc>
   <lastmod>2026-04-02T17:35:23+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/dima-potekhin/</loc>
   <lastmod>2026-04-02T17:37:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/explaining-explainability/</loc>
   <lastmod>2026-04-02T18:02:10+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/empowering-security-operations-to-know-which-risks-to-remediate-first/</loc>
   <lastmod>2026-04-02T17:35:49+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cybersecurity-research-report-organizations-are-blind-to-attacker-exposed-assets/</loc>
   <lastmod>2026-04-02T17:35:44+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/alex-zaslavsky/</loc>
   <lastmod>2026-04-02T17:43:02+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-achieves-soc-2-type-2-compliance/</loc>
   <lastmod>2026-04-02T17:30:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/detecting-and-validating-spring4shell-vulnerability-cve-2022-22965/</loc>
   <lastmod>2026-04-02T17:34:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/four-reasons-attackers-are-more-dangerous-this-holiday-season/</loc>
   <lastmod>2026-04-02T17:58:26+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cve-2021-31166/</loc>
   <lastmod>2026-04-02T17:58:24+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-platform-automatically-detects-four-zero-day-vulnerabilities/</loc>
   <lastmod>2026-04-02T17:43:53+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/debating-cybersecurity-defenses-against-rogue-servers/</loc>
   <lastmod>2026-04-02T17:43:54+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/report-reveals-penetration-testing-failures.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/external-attack-surface-management/</loc>
   <lastmod>2026-04-02T17:35:10+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/get-started-on-zero-trust/</loc>
   <lastmod>2026-04-02T17:30:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cyber-risks-and-the-importance-of-attack-surface-management/</loc>
   <lastmod>2026-04-02T17:35:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-improve-security-posture/</loc>
   <lastmod>2026-04-02T17:58:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jim-wachhaus/</loc>
   <lastmod>2026-04-02T17:42:59+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-great-resignation-isnt-going-away-heres-how-to-retain-your-cybersecurity-employees/</loc>
   <lastmod>2026-04-02T17:44:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/two-cycognito-log4j2-testing-modules/</loc>
   <lastmod>2026-04-02T18:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/log4j-risky-business/</loc>
   <lastmod>2026-04-02T17:34:23+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/tom-spring/</loc>
   <lastmod>2026-04-02T17:43:01+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/rash-of-breaches-hit-businesses-in-australia-hard/</loc>
   <lastmod>2026-04-02T17:36:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/study-easm-boost-security-reducing-costs/</loc>
   <lastmod>2026-04-02T17:36:07+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/three-minutes-with-anne-marie-zettlemoyer-cycognitos-cso/</loc>
   <lastmod>2026-04-02T17:56:44+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-appoints-anne-marie-zettlemoyer-as-chief-security-officer.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/exclusive-easm-report-mergers-and-acquisitions-top-2022-external-attack-surface-management-risks/</loc>
   <lastmod>2026-04-02T17:43:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/setup-your-log4j-response-plan/</loc>
   <lastmod>2026-04-02T17:36:05+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/apache-log4j-vulnerability-cve-2021-44228-aka-log4shell/</loc>
   <lastmod>2026-04-02T17:43:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/5-parts-of-good-breach-disclosure/</loc>
   <lastmod>2026-04-02T17:35:26+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-manage-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:35:54+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware/</loc>
   <lastmod>2026-04-02T17:58:29+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/attackers-are-paying-attention-as-remote-working-becomes-the-new-norm/</loc>
   <lastmod>2026-04-02T17:35:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/accellion-supply-chain-attack/</loc>
   <lastmod>2026-04-02T17:35:31+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/what-the-microsoft-exchange-zero-days-tell-us-about-the-attack-surface/</loc>
   <lastmod>2026-04-02T17:30:29+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/mitre-attack-move-toward-pre-attack/</loc>
   <lastmod>2026-04-02T17:58:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jim-wachhaus/page/2/</loc>
   <lastmod>2026-04-02T18:45:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/passive-dns-stops-phishing-and-secures-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:35:15+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/fireeye-data-breach/</loc>
   <lastmod>2026-04-02T17:37:22+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-named-a-cool-vendor-by-gartner.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/cycognito-platform/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/vulnerability-management-is-due-for-an-adjustment-and-an-upgrade/</loc>
   <lastmod>2026-04-02T17:35:13+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/digital-transformation-demands-a-digital-risk-protection-strategy/</loc>
   <lastmod>2026-04-02T17:58:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/reduce-your-attack-vectors-not-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:35:21+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-state-of-enterprise-attack-surface-management/</loc>
   <lastmod>2026-04-02T17:58:47+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/rob-gurzeev/page/2/</loc>
   <lastmod>2026-04-03T03:03:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/find-the-path-of-least-resistance-into-your-organization-before-attackers-do/</loc>
   <lastmod>2026-04-02T17:35:52+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-raises-30-million-in-series-b-funding.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/tag-cyber-advice-on-external-attack-surface-management-easm-selection/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/CyCognito-Executive-Brief-External-Attack-Surface-Management-solutions-Web.pdf</loc>
   <lastmod>2023-11-03T22:26:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/esg-security-hygiene-and-posture-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/infographic-think-your-external-attack-surface-is-covered/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/security-nightmares-of-2023-and-how-to-avoid-them-in-2024/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024/</loc>
   <lastmod>2026-04-02T17:34:10+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/cyber-monday-is-just-once-a-year-active-security-testing-shouldnt-be/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/this-holiday-shopping-season-your-attack-surface-is-open-for-business/</loc>
   <lastmod>2026-04-02T17:56:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/drps/digital-risk-protection/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/drps/spoofed-domains/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/penetration-testing-costs/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/application-security-testing-software/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/pentesting-pricing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/penetration-testing-as-a-service/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/black-box-pentesting/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/penetration-testing/website-penetration-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/red-teaming/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/red-teaming/red-teaming-vs-pentesting/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/red-teaming/red-team-vs-blue-team/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/red-teaming/red-teaming-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-hunting/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-hunting/threat-hunting-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-hunting/threat-hunting-frameworks/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-intelligence/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-intelligence/cyber-threat-intelligence/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-intelligence/threat-intelligence-feeds/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-intelligence/threat-intelligence-platform/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/threat-intelligence/threat-intelligence-tools/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/take-another-leap-beyond-managing-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:44:01+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/optimizing-asset-management-and-incident-response-cycognitos-new-integration-with-servicenow-cmdb/</loc>
   <lastmod>2026-04-02T18:48:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/product/page/2/</loc>
   <lastmod>2026-04-03T03:03:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution/</loc>
   <lastmod>2026-04-02T18:29:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/randy-streu/</loc>
   <lastmod>2026-04-02T18:28:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-shifting-world-of-cyber-insurance/</loc>
   <lastmod>2026-04-02T17:34:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/360-degree-threat-exposure-management-with-cycognito-and-axonius/</loc>
   <lastmod>2026-04-02T17:30:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-Axonius-JSB.pdf</loc>
   <lastmod>2024-01-19T19:27:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/no-room-for-doubt-why-security-testing-is-essential-for-your-external-attack-surface/</loc>
   <lastmod>2026-04-02T17:35:57+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/banner-grabbing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure/</loc>
   <lastmod>2026-04-02T17:35:47+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/discovery-and-contextualization/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/product/page/3/</loc>
   <lastmod>2026-04-03T03:03:31+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/navigating-compliance-challenges-across-your-external-attack-surface/</loc>
   <lastmod>2026-04-02T17:34:10+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/pci-dss-v4-0.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/aviel-tzarfaty/</loc>
   <lastmod>2026-04-02T17:43:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-automation-can-empower-your-security-operations-team/</loc>
   <lastmod>2026-04-02T17:56:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-ensure-waf-coverage-using-cycognito/</loc>
   <lastmod>2026-04-02T17:34:13+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog/</loc>
   <lastmod>2026-04-02T17:58:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/exploit-intelligence-its-not-just-for-offensive-security-pros-anymore/</loc>
   <lastmod>2026-04-02T17:34:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/phillip-wylie/</loc>
   <lastmod>2026-04-02T17:37:44+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/byopt-bring-your-own-pen-tester-a-cycognito-use-case-for-pen-testing/</loc>
   <lastmod>2026-04-02T17:34:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-get-the-most-out-of-pen-tests/</loc>
   <lastmod>2026-04-02T17:34:28+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/how-exploit-intelligence-identifies-and-accelerates-remediation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jeff-romano/</loc>
   <lastmod>2026-04-02T17:37:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/identifying-and-mitigating-potential-russian-cyber-attacks-proactive-measures-in-the-cycognito-platform/</loc>
   <lastmod>2026-04-02T17:58:23+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/product/page/4/</loc>
   <lastmod>2026-04-03T03:03:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-new-in-cycognito-july-2025-platform-enhancements/</loc>
   <lastmod>2026-04-02T18:51:14+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-new-in-cycognito-june-2025-platform-enhancements/</loc>
   <lastmod>2026-04-02T18:49:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/</loc>
   <lastmod>2026-04-02T18:02:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/2/</loc>
   <lastmod>2026-04-03T03:03:33+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/brittany-busa/</loc>
   <lastmod>2026-04-02T17:37:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/a-recent-interview-uncovers-how-berlitz-corporation-reduced-critical-alerts-by-86-and-saved-100k-with-cycognito/</loc>
   <lastmod>2026-04-02T18:29:38+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/recent-interview-reveals-how-asklepios-kliniken-gmbh-improves-risk-exposure-with-cycognito/</loc>
   <lastmod>2026-04-02T18:48:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito/</loc>
   <lastmod>2026-04-02T18:02:08+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/carrie-oakes/</loc>
   <lastmod>2026-04-02T17:37:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-recognized-as-leader-in-the-gigaom-radar-for-attack-surface-management-2024/</loc>
   <lastmod>2026-04-02T18:30:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/gigaom-radar-for-attack-surface-management-2025/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/understanding-attack-surface-management-asm-with-gigaom/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-cisa-points-way-forward-for-more-effective-vulnerability-management-with-directive-23-01/</loc>
   <lastmod>2026-04-02T17:37:25+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/no-room-for-error-experiments-with-generative-ai-in-easm/</loc>
   <lastmod>2026-04-02T17:30:32+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/3/</loc>
   <lastmod>2026-04-03T03:03:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/greg-delaney/</loc>
   <lastmod>2026-04-02T17:37:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-moveit-hacking-spree-impact-perspective-and-detecting-it-in-your-attack-surface/</loc>
   <lastmod>2026-04-02T17:34:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report/</loc>
   <lastmod>2026-04-02T17:58:31+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/vulnerability-prioritization-what-to-consider/</loc>
   <lastmod>2026-04-02T17:34:17+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/how-to-supercharge-your-vulnerability-remediation-process/</loc>
   <lastmod>2026-04-02T17:56:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/4/</loc>
   <lastmod>2026-04-03T03:03:34+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/lisa-bilawski/</loc>
   <lastmod>2026-04-02T18:28:26+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-holding-attack-surface-management-back/</loc>
   <lastmod>2026-04-02T17:34:33+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-surface.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognitos-2022-cyber-security-predictions/</loc>
   <lastmod>2026-04-02T17:35:46+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/5/</loc>
   <lastmod>2026-04-03T03:03:35+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/sam-curcuruto/</loc>
   <lastmod>2026-04-02T17:37:29+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/top-attack-vectors-and-how-to-prevent-them/</loc>
   <lastmod>2026-04-02T18:02:01+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/when-your-security-tools-introduce-security-weaknesses/</loc>
   <lastmod>2026-04-02T17:43:22+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/6/</loc>
   <lastmod>2026-04-03T03:03:35+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/perspectives/page/7/</loc>
   <lastmod>2026-04-03T03:03:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/faster-fixes-solving-the-security-testing-trade-off/</loc>
   <lastmod>2026-04-02T18:49:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/checklist-path-to-faster-fixes/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/black-box-discovery-and-dast-cycognitos-integration-with-wiz/</loc>
   <lastmod>2026-04-02T17:56:36+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/strategy/</loc>
   <lastmod>2026-04-02T18:48:35+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/the-long-tail-of-the-supply-chain-leveraging-exposure-management-to-mitigate-risk-from-current-or-former-vendors/</loc>
   <lastmod>2026-04-02T18:02:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/need-to-boost-the-value-of-your-security-budget-in-2025-heres-how/</loc>
   <lastmod>2026-04-02T18:35:23+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/six-signs-that-exposure-management-is-right-for-your-organization/</loc>
   <lastmod>2026-04-02T18:48:31+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-hashicorp-vault-ssh-cve-2024-7594/</loc>
   <lastmod>2026-04-02T18:29:45+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/exposure-management-for-the-ciso/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/exposure-management-for-the-security-practitioner/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/think-your-attack-surface-is-covered-lets-look-at-the-math/</loc>
   <lastmod>2026-04-02T18:29:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/vulnerability-scanners.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/common-security-testing-approaches-leave-gaps-heres-how-to-find-them/</loc>
   <lastmod>2026-04-02T18:34:01+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/whats-the-buzz-about-nis-2/</loc>
   <lastmod>2026-04-02T18:48:21+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/worum-geht-es-bei-nis-2/</loc>
   <lastmod>2026-04-02T18:33:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jason-pappalexis/page/2/</loc>
   <lastmod>2026-04-03T03:03:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/jason-pappalexis/page/3/</loc>
   <lastmod>2026-04-02T19:52:16+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/one-month-in-cycognito-looks-at-spring4shell/</loc>
   <lastmod>2026-04-02T17:56:47+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/</loc>
   <lastmod>2026-04-02T17:58:23+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/2/</loc>
   <lastmod>2026-04-03T03:03:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/dynamic-ip-volatility-study/</loc>
   <lastmod>2026-04-02T18:38:02+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/3/</loc>
   <lastmod>2026-04-03T03:03:38+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/state-of-waf-protection/</loc>
   <lastmod>2026-04-02T17:43:09+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-sap-netweaver-visual-composer-cve-2025-31324/</loc>
   <lastmod>2026-04-02T18:29:58+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-ivanti-cve-2025-22457/</loc>
   <lastmod>2026-04-02T18:37:11+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-next-js-cve-2025-29927/</loc>
   <lastmod>2026-04-02T18:31:48+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-pan-os-cve-2025-0108/</loc>
   <lastmod>2026-04-02T18:29:54+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-fortinet-cve-2024-55591/</loc>
   <lastmod>2026-04-02T18:29:51+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-fortinet-fortios-cve-2024-23113/</loc>
   <lastmod>2026-04-02T18:29:48+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-fortijump-cve-2024-47575/</loc>
   <lastmod>2026-04-02T18:35:18+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-ivanti-connect-secure-cve-2025-0282-and-cve-2025-0283/</loc>
   <lastmod>2026-04-02T18:29:49+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-windows-ldap-cve-2024-49113/</loc>
   <lastmod>2026-04-02T18:48:49+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/4/</loc>
   <lastmod>2026-04-03T03:03:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-palo-alto-pan-os-cve-2024-3393/</loc>
   <lastmod>2026-04-02T17:43:08+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-apache-struts-cve-2024-53677/</loc>
   <lastmod>2026-04-02T18:48:46+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/gift-or-grift-how-retailers-can-combat-cyber-threats-this-season/</loc>
   <lastmod>2026-04-02T18:48:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-threat-palo-alto-pan-os-cve-2024-0012-cve-2024-9474/</loc>
   <lastmod>2026-04-02T18:30:12+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-palo-alto-networks-globalprotect-pan-os-software-cve-2024-3400/</loc>
   <lastmod>2026-04-02T17:37:27+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-multiple-cups-vulnerabilities/</loc>
   <lastmod>2026-04-02T18:29:46+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-multiple-palo-alto-networks-expedition-pan-os-firewalls-vulnerabilities/</loc>
   <lastmod>2026-04-02T18:35:13+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-solarwinds-web-help-desk-cve-2024-28987/</loc>
   <lastmod>2026-04-02T18:29:43+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/5/</loc>
   <lastmod>2026-04-03T03:03:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-progress-software-whatsup-gold-cve-2024-6670/</loc>
   <lastmod>2026-04-02T18:48:28+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766/</loc>
   <lastmod>2026-04-02T18:33:58+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/emerging-security-issue-ivanti-vulnerabilities-cve-2023-46805-and-cve-2024-21887/</loc>
   <lastmod>2026-04-02T17:37:24+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/its-10pm-do-you-know-where-your-pii-is/</loc>
   <lastmod>2026-04-02T17:34:15+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/6/</loc>
   <lastmod>2026-04-03T00:05:56+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/mind-the-gaps-in-the-external-attack-surface/</loc>
   <lastmod>2026-04-02T17:35:55+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/heartbleed-like-critical-openssl-bug/</loc>
   <lastmod>2026-04-02T17:34:22+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/f5-big-ip/</loc>
   <lastmod>2026-04-02T17:56:46+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/research/page/7/</loc>
   <lastmod>2026-04-03T03:03:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/category/company/</loc>
   <lastmod>2026-04-02T18:02:16+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/amit-amar/</loc>
   <lastmod>2026-04-02T18:31:00+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/cycognito-named-a-leader-and-outperformer-in-the-2026-gigaom-radar-for-asm/</loc>
   <lastmod>2026-04-02T17:43:14+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/zohar-venturero/</loc>
   <lastmod>2026-04-02T18:30:45+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/what-over-2-million-assets-reveal-about-industry-vulnerability/</loc>
   <lastmod>2026-04-02T18:51:12+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/emma-zaballos/</loc>
   <lastmod>2026-04-02T17:37:37+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/emma-zaballos/page/2/</loc>
   <lastmod>2026-04-03T01:02:26+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/emma-zaballos/page/3/</loc>
   <lastmod>2026-04-02T23:13:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/author/emma-zaballos/page/4/</loc>
   <lastmod>2026-04-03T03:03:41+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/blog/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets/</loc>
   <lastmod>2026-04-02T18:48:59+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-joins-wiz-integrations-win-platform.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/reports/forrester-teamwork-shines-a-light-on-hidden-external-risk/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/external-attack-surface-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/three-actions-to-reduce-external-risk/</loc>
   <lastmod>2026-04-02T17:37:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/vulnerability-assessment/</loc>
</url>
<url>
<loc>https://www.cycognito.com/blog/defensive-playbook-understanding-new-trends-in-external-risk-with-cycognitos-state-of-external-exposure-management-report/</loc>
   <lastmod>2026-04-02T18:29:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/customers/asklepios.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/CyCognito-CS-Asklepios.pdf</loc>
   <lastmod>2024-06-14T17:12:02+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/learn/exposure-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/exploit-intelligence.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/discovery.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/contextualization.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/active-security-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/prioritization.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/remediation-acceleration.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/integrations.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-Armis.pdf</loc>
   <lastmod>2025-05-27T17:16:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-Cortex.pdf</loc>
   <lastmod>2023-09-07T19:08:39+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-JupiterOne.pdf</loc>
   <lastmod>2023-09-07T19:09:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-ServiceNow.pdf</loc>
   <lastmod>2023-09-07T19:08:17+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-Splunk.pdf</loc>
   <lastmod>2023-09-07T19:07:30+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/solutions/easm.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/autopt.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/caasm.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/uvm.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/cnapp.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/appsec.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/assess-your-security-effectiveness.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/human-api.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-human-api.pdf</loc>
   <lastmod>2023-12-17T19:34:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/evaluate-merger-and-acquisition-risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/mirion-technologies.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-mirion-technologies.pdf</loc>
   <lastmod>2025-03-24T14:40:20+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/monitor-subsidiary-risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/prioritize-and-eliminate-attack-vectors.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/scientific-games.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/videos/scientific-games-customer-testimonial.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-scientific-games.pdf</loc>
   <lastmod>2023-10-23T16:12:02+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/secure-your-software-supply-chain.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/use-cases/simplify-compliance-initiatives.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/ctem.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/operationalizing-ctem-through-external-exposure-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/platform/pricing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito-DS-Customer-Success-Package-May2024.pdf</loc>
   <lastmod>2024-05-08T16:15:42+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/customers/</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/berlitz.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/CyCognito-CS-Berlitz-Jun2024.pdf</loc>
   <lastmod>2024-06-10T20:40:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/how-siemens-healthineers-operationalizes-ctem-for-exposure-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/mapping-and-managing-ai-supply-chain-risk/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/from-discovery-to-remediation-the-2025-landscape-for-attack-surface-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/how-colgate-palmolive-works-cloud-exposure-magic-with-wiz-and-cycognito/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/easm-in-context-turning-surface-data-into-security-insight/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/evaluating-attack-surface-management-asm-solutions-with-gigaom/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/gain-visibility-and-enforce-security-policies-for-assets-across-public-clouds/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/how-a-threat-actor-really-views-your-organization/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/leveraging-automation-to-scan-cisa-kev-for-high-risk-vulnerabilities/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/how-enterprises-become-exposed-to-hidden-risks-from-subsidiaries-and-web-apps/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/forrester-thought-leadership-paper-teamwork-shines-a-light-on-hidden-risk/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/enable-your-security-team-to-build-better-remediation-partnerships/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/improve-attack-surface-visibility-while-reducing-false-positives/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/the-top-five-requirements-for-external-attack-surface-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/webinars/forresters-total-economic-impact-study-the-value-of-easm/</loc>
</url>
<url>
<loc>https://www.cycognito.com/emerging-threats/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-path.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-surface-discovery.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-surface-protection.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/attack-vector.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/automatic-attribution.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/breach-and-attack-simulation-bas.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/understanding-the-technology-easm-and-bas/</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/business-context.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/cis-v8.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/cloud-security.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/Datasheet_Cloud-Connector_November-2023.pdf</loc>
   <lastmod>2023-12-19T03:51:06+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/common-platform-enumeration-cpe.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/common-vulnerabilities-and-exposures-cve.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/common-vulnerability-scoring-system-cvss.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/continuous-attack-surface-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/cyber-kill-chain.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/cyber-reconnaissance.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/cybersecurity-risk-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/data-breach.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/defensive-security.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/digital-footprint.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/dns-history-passive-dns.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/ethical-hacking.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/external-attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/external-attack-surface-vulnerability-the-foundation-of-effective-cybersecurity/</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/false-negative.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/false-positive.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/internet-protocol-ip-v4-address.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/internet-protocol-ip-v6-address.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/iso-270012022.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/it-asset.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/it-ecosystem.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/kali-linux.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/machine-learning.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/maltego.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/multi-factor-authentication-mfa.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/natural-language-processing-nlp.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/nist-800-171-r2.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/nist-800-53-r5.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/cycognito-alignment-with-nist-800-53/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/CyCognito_Data_Sheet_NIST-800-53_Sept2022.pdf</loc>
   <lastmod>2023-12-19T03:51:40+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/nist-cybersecurity-framework.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/offensive-security.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/open-web-application-security-project-owasp.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/open-source-intelligence-osint.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/passive-dns.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/path-of-least-resistance.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/pen-testing-automated.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/proactive-security.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/ransomware.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/recon-ng.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/red-blue-and-purple-teams.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/remediation.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/datasheets/DS-CyCognito_Data_Sheet_Remediation-Planning_Jan_2023.pdf</loc>
   <lastmod>2023-11-14T20:48:07+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/glossary/risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/risk-assessment.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/risk-based-vulnerability-management-rbvm.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/risk-prioritization.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/security-posture.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/security-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/shadow-it.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/shadow-risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/shift-left.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/supply-chain-risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/third-party-risk.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/true-negative.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/true-positive.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/unknown-unknowns.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/vulnerability.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/vulnerability-management-vm.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/web-application-firewall-waf.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/web-applications.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/whois.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/glossary/zero-trust.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/attack-surface-management/attack-surface-reduction/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/easm-for-dummies/</loc>
</url>
<url>
<loc>https://www.cycognito.com/company/</loc>
</url>
<url>
<loc>https://www.cycognito.com/company/careers.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/company/trust.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/contact/</loc>
</url>
<url>
<loc>https://www.cycognito.com/contact/report-a-security-incident.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-accelerates-2025-momentum-with-enterprise-customer-growth-expanded-partnerships-and-innovation-leadership.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-reveals-lack-web-application-firewall-waf-protection.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-report-reveals-1-in-3-easily-exploitable-vulnerabilities-found-on-cloud-assets.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-unveils-next-generation-automation-and-visibility-capabilities-to-accelerate-external-exposure-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-named-a-leader-in-gigaom-rada-report-for-attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-report-highlights-rising-cybersecurity-risks-in-holiday-ecommerce.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-announces-enhancements-to-its-automated-security-testing-product.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-report-exposes-rising-software-supply-chain-threats.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-unveils-integration-with-servicenow-to-optimize-asset-management-and-incident-response.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-report-reveals-urgent-need-for-web-application-security-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-announces-new-ai-features-to-enhance-attack-surface-asset-discovery-and-testing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-selected-by-dxc-technology-as-a-key-collaborator-to-bolster-attack-surface-management-in-the-enterprise.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-names-sean-blenkhorn-as-chief-customer-officer.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-partners-with-eviden-to-bolster-exposure-management-in-the-enterprise.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-named-leader-in-gigaom-radar-report-for-attack-surface-management.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-achieves-soc-2-type-ii-and-iso-27001-security-certifications.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/attack-surface-management-leader-cycognito-delivers-over-five-billion-external-asset-tests.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-announces-major-platform-expansion-for-enhanced-visbility-and-protection.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-discovers-alarming-volume-of-personal-identifiable-information-in-vulnerable-cloud-and-web-applications.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/crn-honors-cycognito-with-5-star-rating-in-2022-partner-program-guide.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-unveils-new-look-rule-your-risk-tagline.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-hires-new-sales-leaders.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-accelerates-partner-program.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-and-carahsoft-partner-to-deliver-attack-surface-management-and-protection-solutions-to-the-public-sector.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-platform-now-available-in-aws-marketplace.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-teams-with-intel471-to-bolster-cyber-threat-intelligence-capabilities.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cornmesser-named-to-crns-women-of-the-channel-power.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/new-report-reveals-subsidiaries-are-global-enterprise-achilles-heel.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/crn-recognizes-cycognito-on-the-2021-emerging-vendors-list.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-expands-market-reach-with-new-vp.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-empowers-organizations-to-prevent-breaches.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-named-market-leader-in-attack-surface-protection-at-rsac.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-named-winner-of-2020-sinet-16-innovator-awards.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-launches-channel-program-to-provide-attack-surface-security.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/researchers-uncover-zero-day-vulnerability-on-cisco-routers.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-wins-five-2020-ispg-awards.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-wins-three-cybersecurity-excellence-awards.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/ceo-rob-gurzeev-named-to-forbes-30-under-30-list.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/press-releases/cycognito-secures-23-million-in-funding.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/mysecurityevent-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/ians-information-security-forum-boston-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/health-isac-european-summit-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/it-sa-expo-and-congress-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/ians-information-security-forum-atlanta-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/gartner-security-and-risk-management-summit-emea-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/events/ians-information-security-forum-charlotte-2025.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/news/awards.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/partners/</loc>
</url>
<url>
<loc>https://www.cycognito.com/partners/resellers-msps-systems-integrators.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/partners/technology-alliance-partners.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/partners/become-a-partner/</loc>
</url>
<url>
<loc>https://www.cycognito.com/security-gap-calculator/</loc>
</url>
<url>
<loc>https://www.cycognito.com/free-scan/</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/</loc>
</url>
<url>
<loc>https://www.cycognito.com/solutions/manufacturing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/videos/colgate-palmolive-company-customer-testimonial.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/crowdstrike-competitor.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/microsoft-defender-easm-competitor.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/cortex-xpanse-competitor.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/qualys-competitor.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/why-cycognito/tenable-competitor.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/sans-maximizing-security-value-through-external-attack-surface-management/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/white-papers/easm-from-understanding-to-implementation/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/datasheets/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/solution-brief-security-testing.pdf</loc>
   <lastmod>2023-10-09T17:00:55+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/checklist-when-to-use-dast-for-owasp-top-10-testing/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/cheatsheet-top-app-vulnerabilities-often-missed-after-deployment/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/quicktake-five-security-metics-that-matter/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/cheatsheet-five-common-gaps-in-cnapp-coverage/</loc>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/quicktake-closing-the-production-app-risk-gap/</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/briefs/SolutionBrief-CyCognito-Wiz.pdf</loc>
   <lastmod>2025-11-04T12:25:03+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/resources/briefs/five-lessons-for-seucrity-leaders-from-the-past-years-breaches/</loc>
</url>
<url>
<loc>https://www.cycognito.com/learn/security-frameworks-and-compliance.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/privacy-policy.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/terms-of-service.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/sitemap.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/customer-stories.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/customers/financial-services.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-financial-services.pdf</loc>
   <lastmod>2023-02-23T15:24:04+00:00</lastmod>
</url>
<url>
<loc>https://www.cycognito.com/customers/digital-publishing.php</loc>
</url>
<url>
<loc>https://www.cycognito.com/documents/case-studies/case-study-digital-publishing.pdf</loc>
   <lastmod>2023-02-23T15:24:04+00:00</lastmod>
</url>
</urlset>
