<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://pumasecurity.io/resources/video-demos/ci-live-static-analysis-vs-roslyn/</loc>
<lastmod>2016-11-13T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/video-demos/stalking-vulnerabilities-with-puma-scan/</loc>
<lastmod>2017-04-23T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/what-is-puma-scan/</loc>
<lastmod>2017-11-10T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/puma-scan-aspnet-install/</loc>
<lastmod>2017-11-16T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/Secure-DevOps-Pumas-Tail/</loc>
<lastmod>2018-06-10T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/5-tips-for-getting-started-with-DevSecOps/</loc>
<lastmod>2018-07-17T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/weaponizing-your-devops-pipeline/</loc>
<lastmod>2018-07-31T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/what-to-do-and-what-to-avoid-when-implementing-security-in-the-devops-lifecycle/</loc>
<lastmod>2018-10-02T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/DevSecOps-Key-Controls-for-Modern-Security-Success/</loc>
<lastmod>2019-04-06T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/cloud-security-instance-metadata/</loc>
<lastmod>2019-10-09T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/contributing-to-puma-scan-community-edition/</loc>
<lastmod>2020-01-29T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/infosec-podcast/</loc>
<lastmod>2020-02-03T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/video-demos/puma-security-building-a-secure-culture/</loc>
<lastmod>2020-02-10T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/RSAC-2020-Defending-Serverless-Infrastructure-in-the-Cloud/</loc>
<lastmod>2020-03-02T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/hth-2022-cloud-security-village/</loc>
<lastmod>2022-11-03T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/RSAC-2023-Nymeria-Destroying-Long-Lived-Credentials-Workload-Identity-Federation/</loc>
<lastmod>2023-05-01T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/auditing-eks-pod-permissions/</loc>
<lastmod>2024-02-29T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/rsac-2025-kubernetes-workload-identity/</loc>
<lastmod>2025-05-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/aws-outbound-identity-federation/</loc>
<lastmod>2025-12-18T00:00:00-06:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/puma-scan-vs-sonarqube-dotnet-sast/</loc>
<lastmod>2026-03-25T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/blog/teampcp-github-actions-supply-chain/</loc>
<lastmod>2026-03-27T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/404/</loc>
</url>
<url>
<loc>https://pumasecurity.io/about/</loc>
</url>
<url>
<loc>https://pumasecurity.io/azuredevops/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/category/blog/</loc>
</url>
<url>
<loc>https://pumasecurity.io/capture-the-flag/</loc>
</url>
<url>
<loc>https://pumasecurity.io/career/</loc>
</url>
<url>
<loc>https://pumasecurity.io/cloud-ci/</loc>
</url>
<url>
<loc>https://pumasecurity.io/cloud-security/</loc>
</url>
<url>
<loc>https://pumasecurity.io/error/</loc>
</url>
<url>
<loc>https://pumasecurity.io/vacancies/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/</loc>
</url>
<url>
<loc>https://pumasecurity.io/</loc>
</url>
<url>
<loc>https://pumasecurity.io/net-security-workshop/</loc>
</url>
<url>
<loc>https://pumasecurity.io/penetration-tests/</loc>
</url>
<url>
<loc>https://pumasecurity.io/pricing/</loc>
</url>
<url>
<loc>https://pumasecurity.io/privacy/</loc>
</url>
<url>
<loc>https://pumasecurity.io/product/</loc>
</url>
<url>
<loc>https://pumasecurity.io/remediation/</loc>
</url>
<url>
<loc>https://pumasecurity.io/secure-devops/</loc>
</url>
<url>
<loc>https://pumasecurity.io/security-advisement/</loc>
</url>
<url>
<loc>https://pumasecurity.io/server-edition/</loc>
</url>
<url>
<loc>https://pumasecurity.io/services/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/category/video-demos/</loc>
</url>
<url>
<loc>https://pumasecurity.io/vulnerability-assessments/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/page2/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/page3/</loc>
</url>
<url>
<loc>https://pumasecurity.io/resources/page4/</loc>
</url>
<url>
<loc>https://pumasecurity.io/googleb248f844e7ce2e5e.html</loc>
<lastmod>2026-03-31T20:40:23-05:00</lastmod>
</url>
<url>
<loc>https://pumasecurity.io/resources/downloads/LAB1-T09-AttackingDefendingKubernetesPrivilegeEscalationLateralMovement.pdf</loc>
<lastmod>2026-03-31T20:40:24-05:00</lastmod>
</url>
</urlset>
