<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://pangea.cloud/services/secure-audit-log/</loc></url><url><loc>https://pangea.cloud/services/prompt-guard/</loc></url><url><loc>https://pangea.cloud/services/ai-guard/</loc></url><url><loc>https://pangea.cloud/services/redact/</loc></url><url><loc>https://pangea.cloud/services/embargo-check/</loc></url><url><loc>https://pangea.cloud/services/vault/</loc></url><url><loc>https://pangea.cloud/services/authn/</loc></url><url><loc>https://pangea.cloud/services/ip-intel/reputation/</loc></url><url><loc>https://pangea.cloud/services/ip-intel/geolocate/</loc></url><url><loc>https://pangea.cloud/services/ip-intel/vpn/</loc></url><url><loc>https://pangea.cloud/services/ip-intel/proxy/</loc></url><url><loc>https://pangea.cloud/services/ip-intel/domain/</loc></url><url><loc>https://pangea.cloud/services/file-intel/</loc></url><url><loc>https://pangea.cloud/services/domain-intel/reputation/</loc></url><url><loc>https://pangea.cloud/services/domain-intel/whois/</loc></url><url><loc>https://pangea.cloud/services/url-intel/</loc></url><url><loc>https://pangea.cloud/services/user-intel/</loc></url><url><loc>https://pangea.cloud/services/file-scan/</loc></url><url><loc>https://pangea.cloud/services/sanitize/</loc></url><url><loc>https://pangea.cloud/services/authz/</loc></url><url><loc>https://pangea.cloud/services/secure-share/</loc></url><url><loc>https://pangea.cloud/case-studies/reach-security/</loc></url><url><loc>https://pangea.cloud/case-studies/grand-canyon-education/</loc></url><url><loc>https://pangea.cloud/case-studies/fashmates/</loc></url><url><loc>https://pangea.cloud/case-studies/codex/</loc></url><url><loc>https://pangea.cloud/case-studies/sitemana/</loc></url><url><loc>https://pangea.cloud/case-studies/scan-my-sms/</loc></url><url><loc>https://pangea.cloud/case-studies/radius-xr/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-cheat-sheet/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-why-care/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-how/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-how-taxonomy/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-how-org/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-how-create-sw/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-how-features/</loc></url><url><loc>https://pangea.cloud/securebydesign/sbd-paved-paths/</loc></url><url><loc>https://pangea.cloud/securebydesign/secure-audit-logging-overview/</loc></url><url><loc>https://pangea.cloud/securebydesign/secure-audit-records/</loc></url><url><loc>https://pangea.cloud/securebydesign/secure-audit-field-selection/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-passwords/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-webauthn/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-passkeys/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-trx-otp/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-totp/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-magic-links/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-biometrics/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-oidc/</loc></url><url><loc>https://pangea.cloud/securebydesign/authn-using-saml2/</loc></url><url><loc>https://pangea.cloud/securebydesign/secrets-overview/</loc></url><url><loc>https://pangea.cloud/securebydesign/secrets-how/</loc></url><url><loc>https://pangea.cloud/securebydesign/secrets-for-external/</loc></url><url><loc>https://pangea.cloud/securebydesign/secrets-k8s-safety/</loc></url><url><loc>https://pangea.cloud/securebydesign/secrets-cicd-safety/</loc></url><url><loc>https://pangea.cloud/securebydesign/authz-rbac-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/authz-rebac-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/authz-abac-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-threats-inference/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-threats-ingestion/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-rag-intro/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-rag-authz-what/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-rag-authz-how/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-pi-classes/</loc></url><url><loc>https://pangea.cloud/securebydesign/aiapp-pi-taxonomy/</loc></url><url><loc>https://pangea.cloud/resources/sample-reports/esg/</loc></url><url><loc>https://pangea.cloud/use-cases/healthcare/</loc></url><url><loc>https://pangea.cloud/use-cases/applications/</loc></url><url><loc>https://pangea.cloud/use-cases/workforce/</loc></url><url><loc>https://pangea.cloud/use-cases/financial/</loc></url><url><loc>https://pangea.cloud/use-cases/ai/</loc></url><url><loc>https://pangea.cloud/privacy-choices/</loc></url><url><loc>https://pangea.cloud/blog/pangea-unveils-study-on-genai-vulnerabilities-insights/</loc></url><url><loc>https://pangea.cloud/blog/decoding-llm-attack-surfaces-a-deep-dive-into-model-vulnerabilities/</loc></url><url><loc>https://pangea.cloud/blog/</loc></url><url><loc>https://pangea.cloud/blog/mining-the-index-uncovering-sensitive-data-in-public-chatgpt-histories-via-google-search/</loc></url><url><loc>https://pangea.cloud/blog/integrating-pangea-authn-into-fastmcp-redux/</loc></url><url><loc>https://pangea.cloud/blog/phishing-for-gemini-invisible-instructions-to-manipulate-email-summaries/</loc></url><url><loc>https://pangea.cloud/blog/bypassing-ai-malware-analysis-with-prompt-injection/</loc></url><url><loc>https://pangea.cloud/blog/the-hidden-influence-prompt-injection-in-arxiv-research-papers/</loc></url><url><loc>https://pangea.cloud/blog/integrating-pangea-authn-into-fastmcp/</loc></url><url><loc>https://pangea.cloud/blog/when-smart-isnt-smart-enough-how-llms-faked-their-way-into-math-and-code-and-gave-us-agents/</loc></url><url><loc>https://pangea.cloud/blog/secure-mcp-servers-with-ai-guardrails/</loc></url><url><loc>https://pangea.cloud/blog/ai-guard-malicious-prompt-detection-best-practices/</loc></url><url><loc>https://pangea.cloud/blog/ethical-hackers-mindset-leads-to-victory-in-pangea-ai-challenge/</loc></url><url><loc>https://pangea.cloud/blog/ai-guard-on-the-edge/</loc></url><url><loc>https://pangea.cloud/blog/pangea-ai-security/</loc></url><url><loc>https://pangea.cloud/blog/pangea-unveils-suite-of-ai-security-guardrails-and-jailbreak-competition/</loc></url><url><loc>https://pangea.cloud/blog/pangea-leads-the-charge-in-ai-security/</loc></url><url><loc>https://pangea.cloud/blog/ai-security-trends-from-2024-the-ciso-and-cto-perspectives/</loc></url><url><loc>https://pangea.cloud/blog/ai-product-security-newsletter-vol-2-issue-2/</loc></url><url><loc>https://pangea.cloud/blog/the-enterprise-leaders-playbook-for-secure-ai-product-dev/</loc></url><url><loc>https://pangea.cloud/blog/ai-product-security-newsletter-vol-2-issue-1/</loc></url><url><loc>https://pangea.cloud/blog/2/</loc></url><url><loc>https://pangea.cloud/blog/logging-for-ai-apps/</loc></url><url><loc>https://pangea.cloud/blog/how-security-engineering-leaders-and-developers-can-secure-generative-ai-applications/</loc></url><url><loc>https://pangea.cloud/blog/pangea-authz-inherited-permissions/</loc></url><url><loc>https://pangea.cloud/blog/to-see-ai-securitys-future-look-to-network-securitys-past/</loc></url><url><loc>https://pangea.cloud/blog/authorization-in-ai-systems-with-pangea-multipass/</loc></url><url><loc>https://pangea.cloud/blog/ai-product-security-newsletter-vol-i-issue-5/</loc></url><url><loc>https://pangea.cloud/blog/permissions-dont-persist-in-ai-apps-and-thats-a-big-problem/</loc></url><url><loc>https://pangea.cloud/blog/ai-access-granted-rag-apps-with-identity-and-access-control/</loc></url><url><loc>https://pangea.cloud/blog/building-authorization-in-ai-apps/</loc></url><url><loc>https://pangea.cloud/blog/updated-pangea-extension-for-github-copilot/</loc></url><url><loc>https://pangea.cloud/blog/introducing-pangea-prompt-guard-and-ai-guard-to-secure-ai-applications/</loc></url><url><loc>https://pangea.cloud/blog/announcing-secure-share/</loc></url><url><loc>https://pangea.cloud/blog/secure-by-design-newsletter-vol1-issue-4/</loc></url><url><loc>https://pangea.cloud/blog/hipaa-access-control-for-developers/</loc></url><url><loc>https://pangea.cloud/blog/understanding-and-mitigating-prompt-injection-attacks/</loc></url><url><loc>https://pangea.cloud/blog/vault-item-notifications/</loc></url><url><loc>https://pangea.cloud/blog/announcing-sanitize/</loc></url><url><loc>https://pangea.cloud/blog/where-ai-powered-software-is-going/</loc></url><url><loc>https://pangea.cloud/blog/3/</loc></url><url><loc>https://pangea.cloud/blog/how-to-abac/</loc></url><url><loc>https://pangea.cloud/blog/authz-abac-true/</loc></url><url><loc>https://pangea.cloud/blog/secure-by-design-newsletter-vol-1-issue-3/</loc></url><url><loc>https://pangea.cloud/blog/a-developers-guide-to-preventing-sensitive-information-disclosure/</loc></url><url><loc>https://pangea.cloud/blog/querying-llms-with-pangea-and-github-copilot-chat/</loc></url><url><loc>https://pangea.cloud/blog/rbac-vs-rebac-vs-abac/</loc></url><url><loc>https://pangea.cloud/blog/ato-detection-using-ml/</loc></url><url><loc>https://pangea.cloud/blog/hipaa-audit-log-requirements/</loc></url><url><loc>https://pangea.cloud/blog/audit-logs-what-why-and-how/</loc></url><url><loc>https://pangea.cloud/blog/secure-by-design-newsletter-vol-i-issue-ii/</loc></url><url><loc>https://pangea.cloud/blog/protecting-our-pql-funnel/</loc></url><url><loc>https://pangea.cloud/blog/find-exposed-users-with-credential-leak-monitoring/</loc></url><url><loc>https://pangea.cloud/blog/add-audit-log-streaming-to-auth0-in-2-mins/</loc></url><url><loc>https://pangea.cloud/blog/secure-by-design-newsletter/</loc></url><url><loc>https://pangea.cloud/blog/authz-access-controls-from-a-to-z/</loc></url><url><loc>https://pangea.cloud/blog/pangea-joins-github-copilot-partner-program/</loc></url><url><loc>https://pangea.cloud/blog/securathon-showdown-winners/</loc></url><url><loc>https://pangea.cloud/blog/do-passkeys-solve-the-deployability-issue/</loc></url><url><loc>https://pangea.cloud/blog/4/</loc></url><url><loc>https://pangea.cloud/blog/add-login-with-passkeys-to-nextjs-in-2-mins/</loc></url><url><loc>https://pangea.cloud/blog/add-login-with-passkeys-to-your-django-app/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-april-2024/</loc></url><url><loc>https://pangea.cloud/blog/pangea-at-gartner-application-innovation-business-solutions-summit-2024/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-march-2024/</loc></url><url><loc>https://pangea.cloud/blog/why-i-love-hackathons/</loc></url><url><loc>https://pangea.cloud/blog/pangeas-inaugural-secure-by-design-dinner/</loc></url><url><loc>https://pangea.cloud/blog/add-passkeys-to-reactjs-in-2mins/</loc></url><url><loc>https://pangea.cloud/blog/introducing-passkeys-from-pangea/</loc></url><url><loc>https://pangea.cloud/blog/saml-explained/</loc></url><url><loc>https://pangea.cloud/blog/airdeveloppa-on-using-pangeas-authn/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-february-2024/</loc></url><url><loc>https://pangea.cloud/blog/pangea-at-that-texas-edition/</loc></url><url><loc>https://pangea.cloud/blog/integrate-an-audit-trail-for-nextauthjs-in-a-few-lines-of-code/</loc></url><url><loc>https://pangea.cloud/blog/a-guide-to-choosing-a-vault-for-your-application-secrets/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-january-2024/</loc></url><url><loc>https://pangea.cloud/blog/pangea-on-capitol-hill/</loc></url><url><loc>https://pangea.cloud/blog/using-ips-domains-and-geolocation-to-secure-your-authentication/</loc></url><url><loc>https://pangea.cloud/blog/5/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-december-2023/</loc></url><url><loc>https://pangea.cloud/blog/redefining-security-in-2023-and-beyond/</loc></url><url><loc>https://pangea.cloud/blog/an-easy-way-to-make-your-network-automation-secure/</loc></url><url><loc>https://pangea.cloud/blog/in-depth-review-for-the-november-pangea-hashnode-securathon-winners/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-november-2023/</loc></url><url><loc>https://pangea.cloud/blog/pangeas-github-actions/</loc></url><url><loc>https://pangea.cloud/blog/what-does-5-get-you-these-days/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-october-2023/</loc></url><url><loc>https://pangea.cloud/blog/supercharge-your-domain-intel-with-pangea-and-whoisxml-api-integration/</loc></url><url><loc>https://pangea.cloud/blog/authn-in-minutes-mfa-eulas-and-social-auth-out-of-the-box/</loc></url><url><loc>https://pangea.cloud/blog/are-reddit-posts-links-malicious/</loc></url><url><loc>https://pangea.cloud/blog/safely-dealing-with-files/</loc></url><url><loc>https://pangea.cloud/blog/announcing-health-wealth-securathon-winners/</loc></url><url><loc>https://pangea.cloud/blog/developer-newsletter-september-2023/</loc></url><url><loc>https://pangea.cloud/blog/announcing-the-pangea-securathon-health-wealth-hackathon/</loc></url><url><loc>https://pangea.cloud/blog/outsmart-botnets-with-ip-intel/</loc></url><url><loc>https://pangea.cloud/blog/protect-your-users-pii-from-ai-channel-your-inner-time-lord-with-three-lines-of-code/</loc></url><url><loc>https://pangea.cloud/blog/pangea-and-team-cymru-the-better-together-story/</loc></url><url><loc>https://pangea.cloud/blog/6/</loc></url><url><loc>https://pangea.cloud/blog/meet-our-new-mascot/</loc></url><url><loc>https://pangea.cloud/blog/july-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/api-first-approach-and-automation/</loc></url><url><loc>https://pangea.cloud/blog/june-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/announcing-the-pangea-securathon-winners/</loc></url><url><loc>https://pangea.cloud/blog/trusting-gpt-protecting-apps-from-pii-leakage/</loc></url><url><loc>https://pangea.cloud/blog/may-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/partner-updates-team-cymru/</loc></url><url><loc>https://pangea.cloud/blog/april-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/announcing-pangea-authn-service/</loc></url><url><loc>https://pangea.cloud/blog/partner-updates-20230414/</loc></url><url><loc>https://pangea.cloud/blog/pangea-partners-with-digital-element/</loc></url><url><loc>https://pangea.cloud/blog/march-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/no-call-left-behind/</loc></url><url><loc>https://pangea.cloud/blog/redact-quack-quack/</loc></url><url><loc>https://pangea.cloud/blog/february-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/january-newsletter-2023/</loc></url><url><loc>https://pangea.cloud/blog/pangea-partners-with-crowdstrike/</loc></url><url><loc>https://pangea.cloud/blog/7/</loc></url><url><loc>https://pangea.cloud/blog/level-up-your-authentication-security-the-easy-way-with-pangea-and-auth0/</loc></url><url><loc>https://pangea.cloud/blog/introducing-security-platform-as-a-service/</loc></url><url><loc>https://pangea.cloud/blog/december-newsletter-2022/</loc></url><url><loc>https://pangea.cloud/blog/pangea-general-availability/</loc></url><url><loc>https://pangea.cloud/blog/november-newsletter-2022/</loc></url><url><loc>https://pangea.cloud/blog/audit-log-field-guide-time-travel-and-humblebrags/</loc></url><url><loc>https://pangea.cloud/blog/marvelous-merkle-trees/</loc></url><url><loc>https://pangea.cloud/blog/a-tamperproof-logging-implementation/</loc></url><url><loc>https://pangea.cloud/blog/security-in-the-app-runtime/</loc></url><url><loc>https://pangea.cloud/blog/partnering-with-pangea/</loc></url><url><loc>https://pangea.cloud/blog/pangea-uniting-security-for-builders/</loc></url><url><loc>https://pangea.cloud/blog/compliance-privacy-and-the-spirit-of-christmas/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai/2/</loc></url><url><loc>https://pangea.cloud/blog/tag/prompt-injection/</loc></url><url><loc>https://pangea.cloud/blog/tag/owasp/</loc></url><url><loc>https://pangea.cloud/blog/tag/attack-surface/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai-red-teaming/</loc></url><url><loc>https://pangea.cloud/blog/tag/openai/</loc></url><url><loc>https://pangea.cloud/blog/tag/google/</loc></url><url><loc>https://pangea.cloud/blog/tag/pii/</loc></url><url><loc>https://pangea.cloud/blog/tag/sensitive-data/</loc></url><url><loc>https://pangea.cloud/blog/tag/chatgpt/</loc></url><url><loc>https://pangea.cloud/blog/tag/mcp-server/</loc></url><url><loc>https://pangea.cloud/blog/tag/mcp/</loc></url><url><loc>https://pangea.cloud/blog/tag/authentication/</loc></url><url><loc>https://pangea.cloud/blog/tag/auth/</loc></url><url><loc>https://pangea.cloud/blog/tag/authn/</loc></url><url><loc>https://pangea.cloud/blog/tag/redux/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai-security/</loc></url><url><loc>https://pangea.cloud/blog/tag/phishing/</loc></url><url><loc>https://pangea.cloud/blog/tag/malware/</loc></url><url><loc>https://pangea.cloud/blog/tag/research/</loc></url><url><loc>https://pangea.cloud/blog/tag/promptinjections/</loc></url><url><loc>https://pangea.cloud/blog/tag/mcp-client/</loc></url><url><loc>https://pangea.cloud/blog/tag/agentic-ai/</loc></url><url><loc>https://pangea.cloud/blog/tag/guardrails/</loc></url><url><loc>https://pangea.cloud/blog/tag/guard/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai-guardrails/</loc></url><url><loc>https://pangea.cloud/blog/tag/pangea/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai-guard/</loc></url><url><loc>https://pangea.cloud/blog/tag/promptengineering/</loc></url><url><loc>https://pangea.cloud/blog/tag/hacking/</loc></url><url><loc>https://pangea.cloud/blog/tag/cybersecurity-1/</loc></url><url><loc>https://pangea.cloud/blog/tag/cybersecurity-1/2/</loc></url><url><loc>https://pangea.cloud/blog/tag/rag/</loc></url><url><loc>https://pangea.cloud/blog/tag/genai/</loc></url><url><loc>https://pangea.cloud/blog/tag/security/</loc></url><url><loc>https://pangea.cloud/blog/tag/security/2/</loc></url><url><loc>https://pangea.cloud/blog/tag/llm/</loc></url><url><loc>https://pangea.cloud/blog/tag/yearinreview/</loc></url><url><loc>https://pangea.cloud/blog/tag/newsletter/</loc></url><url><loc>https://pangea.cloud/blog/tag/logging/</loc></url><url><loc>https://pangea.cloud/blog/tag/gartner/</loc></url><url><loc>https://pangea.cloud/blog/tag/generative-ai/</loc></url><url><loc>https://pangea.cloud/blog/tag/authorization/</loc></url><url><loc>https://pangea.cloud/blog/tag/inheritance/</loc></url><url><loc>https://pangea.cloud/blog/tag/rbac/</loc></url><url><loc>https://pangea.cloud/blog/tag/rebac/</loc></url><url><loc>https://pangea.cloud/blog/tag/network-security/</loc></url><url><loc>https://pangea.cloud/blog/tag/ai-tools/</loc></url><url><loc>https://pangea.cloud/blog/tag/google-drive/</loc></url><url><loc>https://pangea.cloud/blog/tag/confluence/</loc></url><url><loc>https://pangea.cloud/blog/tag/jira/</loc></url><url><loc>https://pangea.cloud/blog/tag/github/</loc></url><url><loc>https://pangea.cloud/blog/tag/slack/</loc></url><url><loc>https://pangea.cloud/blog/tag/permissions/</loc></url><url><loc>https://pangea.cloud/blog/tag/owasp-top-10/</loc></url><url><loc>https://pangea.cloud/blog/tag/authz/</loc></url><url><loc>https://pangea.cloud/blog/tag/copilot/</loc></url><url><loc>https://pangea.cloud/blog/tag/copilot-ai/</loc></url><url><loc>https://pangea.cloud/blog/tag/web-development/</loc></url><url><loc>https://pangea.cloud/blog/tag/fileshare/</loc></url><url><loc>https://pangea.cloud/blog/tag/file-share/</loc></url><url><loc>https://pangea.cloud/blog/tag/hipaa/</loc></url><url><loc>https://pangea.cloud/blog/tag/prompt-engineering/</loc></url><url><loc>https://pangea.cloud/blog/tag/vault/</loc></url><url><loc>https://pangea.cloud/blog/tag/notifications/</loc></url><url><loc>https://pangea.cloud/blog/tag/apis/</loc></url><url><loc>https://pangea.cloud/blog/tag/abac/</loc></url><url><loc>https://pangea.cloud/blog/tag/github-copilot/</loc></url><url><loc>https://pangea.cloud/blog/tag/access-control/</loc></url><url><loc>https://pangea.cloud/blog/tag/machine-learning/</loc></url><url><loc>https://pangea.cloud/blog/tag/account-takeover/</loc></url><url><loc>https://pangea.cloud/blog/tag/audit-logs/</loc></url><url><loc>https://pangea.cloud/blog/tag/compliance/</loc></url><url><loc>https://pangea.cloud/blog/tag/pqls/</loc></url><url><loc>https://pangea.cloud/blog/tag/domain-intelligence/</loc></url><url><loc>https://pangea.cloud/blog/tag/ip-intelligence/</loc></url><url><loc>https://pangea.cloud/blog/tag/threat-intelligence/</loc></url><url><loc>https://pangea.cloud/blog/tag/mfa/</loc></url><url><loc>https://pangea.cloud/blog/tag/data-breach/</loc></url><url><loc>https://pangea.cloud/blog/tag/identity-management/</loc></url><url><loc>https://pangea.cloud/blog/tag/auth0/</loc></url><url><loc>https://pangea.cloud/blog/tag/nextjs/</loc></url><url><loc>https://pangea.cloud/blog/tag/reactjs/</loc></url><url><loc>https://pangea.cloud/blog/tag/secops/</loc></url><url><loc>https://pangea.cloud/blog/tag/secure-by-design/</loc></url><url><loc>https://pangea.cloud/blog/tag/hackathon/</loc></url><url><loc>https://pangea.cloud/blog/tag/app-development/</loc></url><url><loc>https://pangea.cloud/blog/tag/multi-factor-authentication/</loc></url><url><loc>https://pangea.cloud/blog/tag/passkeys/</loc></url><url><loc>https://pangea.cloud/blog/tag/1password/</loc></url><url><loc>https://pangea.cloud/blog/tag/icloud/</loc></url><url><loc>https://pangea.cloud/blog/tag/django/</loc></url><url><loc>https://pangea.cloud/blog/tag/fido2-passkeys/</loc></url><url><loc>https://pangea.cloud/blog/tag/infosec-cjbi6apo9015yaywu2micx2eo/</loc></url><url><loc>https://pangea.cloud/blog/tag/webdev/</loc></url><url><loc>https://pangea.cloud/blog/tag/secure-coding/</loc></url><url><loc>https://pangea.cloud/blog/tag/ciso/</loc></url><url><loc>https://pangea.cloud/blog/tag/javascript/</loc></url><url><loc>https://pangea.cloud/blog/tag/passwordless/</loc></url><url><loc>https://pangea.cloud/blog/tag/webauthn/</loc></url><url><loc>https://pangea.cloud/blog/tag/saml/</loc></url><url><loc>https://pangea.cloud/blog/tag/sso/</loc></url><url><loc>https://pangea.cloud/blog/tag/rust/</loc></url><url><loc>https://pangea.cloud/blog/tag/mongodb/</loc></url><url><loc>https://pangea.cloud/blog/tag/conference/</loc></url><url><loc>https://pangea.cloud/blog/tag/cloud-design-pattern/</loc></url><url><loc>https://pangea.cloud/blog/tag/securityawareness/</loc></url><url><loc>https://pangea.cloud/blog/tag/audit/</loc></url><url><loc>https://pangea.cloud/blog/tag/nextauthjs/</loc></url><url><loc>https://pangea.cloud/blog/tag/aws/</loc></url><url><loc>https://pangea.cloud/blog/tag/secrets-management/</loc></url><url><loc>https://pangea.cloud/blog/tag/secretmanager/</loc></url><url><loc>https://pangea.cloud/blog/tag/api-security/</loc></url><url><loc>https://pangea.cloud/blog/tag/information-security/</loc></url><url><loc>https://pangea.cloud/blog/tag/government/</loc></url><url><loc>https://pangea.cloud/blog/tag/gdpr/</loc></url><url><loc>https://pangea.cloud/blog/tag/paas/</loc></url><url><loc>https://pangea.cloud/blog/tag/privacy/</loc></url><url><loc>https://pangea.cloud/blog/tag/networkautomation/</loc></url><url><loc>https://pangea.cloud/blog/tag/ansible/</loc></url><url><loc>https://pangea.cloud/blog/tag/hashnode/</loc></url><url><loc>https://pangea.cloud/blog/tag/github-actions-1/</loc></url><url><loc>https://pangea.cloud/blog/tag/secure-coding-practices/</loc></url><url><loc>https://pangea.cloud/blog/tag/developer/</loc></url><url><loc>https://pangea.cloud/blog/tag/dns/</loc></url><url><loc>https://pangea.cloud/blog/tag/networking/</loc></url><url><loc>https://pangea.cloud/blog/tag/oidc/</loc></url><url><loc>https://pangea.cloud/blog/tag/passwords/</loc></url><url><loc>https://pangea.cloud/blog/tag/privacypolicy/</loc></url><url><loc>https://pangea.cloud/blog/tag/data-analysis/</loc></url><url><loc>https://pangea.cloud/blog/tag/reddit/</loc></url><url><loc>https://pangea.cloud/blog/tag/shiftleft/</loc></url><url><loc>https://pangea.cloud/blog/tag/healthcare/</loc></url><url><loc>https://pangea.cloud/blog/tag/fintech/</loc></url><url><loc>https://pangea.cloud/blog/tag/health-cjaeh844x02vvo3wtj5r2s75q/</loc></url><url><loc>https://pangea.cloud/blog/tag/websecurity/</loc></url><url><loc>https://pangea.cloud/blog/tag/bots/</loc></url><url><loc>https://pangea.cloud/blog/tag/devops/</loc></url><url><loc>https://pangea.cloud/blog/tag/data-security/</loc></url><url><loc>https://pangea.cloud/blog/tag/infrastructure/</loc></url><url><loc>https://pangea.cloud/blog/tag/kubernetes/</loc></url><url><loc>https://pangea.cloud/blog/tag/infosectrain/</loc></url><url><loc>https://pangea.cloud/blog/tag/merkle-tree/</loc></url><url><loc>https://pangea.cloud/blog/tag/cryptography/</loc></url><url><loc>https://pangea.cloud/blog/tag/gdpr-compliance/</loc></url><url><loc>https://pangea.cloud/blog/tag/ccpa/</loc></url><url><loc>https://pangea.cloud/company/</loc></url><url><loc>https://pangea.cloud/contact-us/</loc></url><url><loc>https://pangea.cloud/</loc></url><url><loc>https://pangea.cloud/privacy-policy/</loc></url><url><loc>https://pangea.cloud/talk-to-an-expert/</loc></url><url><loc>https://pangea.cloud/terms-of-use/</loc></url><url><loc>https://pangea.cloud/careers/</loc></url><url><loc>https://pangea.cloud/landing/passkeys/</loc></url><url><loc>https://pangea.cloud/platform/aidr/</loc></url><url><loc>https://pangea.cloud/platform/</loc></url><url><loc>https://pangea.cloud/news-events/</loc></url><url><loc>https://pangea.cloud/products/ai-application-guardrails/</loc></url><url><loc>https://pangea.cloud/security/advisories/</loc></url><url><loc>https://pangea.cloud/security/vdp/</loc></url><url><loc>https://pangea.cloud/securebydesign/</loc></url><url><loc>https://pangea.cloud/services/ai-red-teaming/</loc></url><url><loc>https://pangea.cloud/signup/</loc></url><url><loc>https://pangea.cloud/taxonomy/</loc></url><url><loc>https://pangea.cloud/careers/job/[id]/</loc></url><url><loc>https://pangea.cloud/landing/ai-escape-room/</loc></url><url><loc>https://pangea.cloud/landing/ai-escape-room/terms-and-conditions/</loc></url><url><loc>https://pangea.cloud/news-events/event/[id]/</loc></url><url><loc>https://pangea.cloud/news-events/story/[id]/</loc></url><url><loc>https://pangea.cloud/pricing/startup/</loc></url><url><loc>https://pangea.cloud/resources/technologies/</loc></url><url><loc>https://pangea.cloud/news-events/announcements/soc2-audit/</loc></url><url><loc>https://pangea.cloud/news-events/announcements/soc2-type2-audit/</loc></url><url><loc>https://pangea.cloud/news-events/press-releases/rsa-innovation-sandbox/</loc></url><url><loc>https://pangea.cloud/news-events/press-releases/series-b/</loc></url><url><loc>https://pangea.cloud/news-events/press-releases/sue-barsamian-joins-board/</loc></url></urlset>