<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://securestate.io/</loc></url><url><loc>https://securestate.io/blogs-resources</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/4-benefits-to-using-application-security-frameworks</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/4-most-common-application-security-vulnerabilities-and-how-to-prevent-them</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/5-best-practices-for-implementing-application-security-in-the-development-process</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/5-security-risks-to-the-increasing-use-of-iot-devices</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/application-security-in-a-modern-world</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/colonial-hack</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/conducting-a-web-application-security-assessment-in-5-steps</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/e-commerce-security-part-1</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/five-barriers-to-implementing-effective-product-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/five-risks-to-cloud-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/how-a-vulnerable-plug-in-allowed-hackers-to-steal-from-e-commerce-sites</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/how-colleges-fail-computer-science-students</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/how-threat-modeling-can-save-thousands</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/integrating-application-security-into-your-sdl-in-4-steps</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/integrating-micro-pentesting-into-your-software-development-lifecycle</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/lets-take-inventory-with-a-software-bill-of-materials</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/low-codeno-code-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/manual-vs-automated-testing</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/platform-security-101</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/securing-mobile-applications-during-the-development-lifecycle</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/shifting-left-in-the-sdlc</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/solarwinds-hack</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-future-of-application-security-and-emerging-threats</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-keys-to-encryption-in-application-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-most-common-website-security-threats</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-owasp-top-10</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-compliance-in-application-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-penetration-testing-in-the-ssdl</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-secure-coding-in-application-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-security-training-in-preventing-application-security-breaches</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-user-authentication-and-authorization-in-application-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/the-role-of-vulnerability-management-in-application-security</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/three-common-application-security-mistakes-and-how-to-prevent-them</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/top-3-penetration-testing-tools-by-expert-pentesters</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/what-do-you-do-after-you-are-hacked-incident-response-101</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/what-is-pentesting-ethical-hacking</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/where-do-i-start-in-cybersecurity</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/blogs-resources/why-pentest</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/contact-us</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/job-board</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/job-board/job-positions</loc><lastmod>2025-03-19T01:24:53.054Z</lastmod></url><url><loc>https://securestate.io/job-board/job-positions/product-security-engineer</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/job-board/job-positions/sales-development-representative</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/privacy-policy</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url><url><loc>https://securestate.io/terms-of-service</loc><lastmod>2025-03-19T01:24:53.055Z</lastmod></url></urlset>