<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.sweet.security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/demo</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/contact</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/about</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/detection-response</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/cloud-visibility</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/identities-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/vulnerabilities-management</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/latest</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/white-papers</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/case-studies</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/datasheets</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/press-releases</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/videos</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/runtime-cspm</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/product/api-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/solution/ai-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/integrations</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/what-is-cnapp</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/solution/sweet-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/solution/sweet-for-cloudsec-devsecops</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/solution/sweet-for-soc-ir-teams</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/solution/sweet-for-appsec</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/ai-security-platform-aisp</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/runtime-cnapp</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/cheat-sheet</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/resources/events</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/2026-prediction-from-the-ceos-desk-security-didnt-slow-ai-down-now-what</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/a-cisos-guide-to-reporting-on-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/almost-everybody-is-affected-kubernetes-privilege-escalation-can-lead-to-rce</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/automate-the-entire-response-lifecycle-with-the-sweet-security-torq-integration</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/breaking-the-cloud-security-illusion-putting-the-app-back-in-cnapp</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/bridging-runtime-visibility-and-secrets-management-in-kubernetes-with-sweet-security-and-cyberark</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/cloud-security-predictions---2024</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/consolidated-remediation-how-sweet-security-turns-vulnerabilities-into-clear-engineering-decisions</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/critical-alert-unauthenticated-rce-in-react-next-js-demands-immediate-action</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/customized-rules-for-enhanced-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/cve-2025-30066-tj-actions-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/cvss-10-0-unauthenticated-rce---one-malformed-ssh-handshake-is-all-it-takes</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/defending-against-ssrf-attacks-in-cloud-native-applications</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/defending-against-the-latest-ghostscript-vulnerability-cve-2024-29510</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/detection-meets-api-security-the-missing-layer-for-your-cloud-app-protection</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/ecscape-understanding-iam-privilege-boundaries-in-amazon-ecs</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/enhance-sboms-with-runtime-security-context</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/every-breach-starts-with-an-attempt-are-you-watching</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/finding-the-sweet-spot-where-cloud-and-ai-security-converge</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/fireblocks-oren-yaakobi-on-how-sweet-security-transformed-their-red-team-operations</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/from-a-snowflake-to-a-snowball-how-to-detect-and-stop-impersonation-attacks</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/from-cloud-migration-to-cloud-security-with-sweets-runtime-powered-cspm</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/from-code-to-cloud-vulnerability-management-across-the-cloud-application-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/hardening-the-ci-cd-pipeline-catching-vulnerabilities-before-they-hit-production</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/hijacking-privileges-in-the-cloud-breaking-role-boundaries-in-amazon-ecs</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/hit-1-false-positive-rate-with-sweets-patent-pending-llm-cloud-detection-engine</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/how-kubernetes-risk-emerges-at-runtime-lessons-from-an-attack-scenario</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/how-sweet-security-detects-manual-actions-the-human-identity-behind-suspicious-cloud-activity</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/how-to-secure-ai-agents-when-prompts-become-code</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/how-transitioning-from-military-ciso-to-startup-ceo-made-me-a-better-leader</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/ingressnightmare-how-runtime-changes-the-game-for-ingress-nginx-kubernetes-critical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/inside-the-axios-incident-unpacking-an-npm-supply-chain-breach</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/introducing-connection-analysis-unveiling-hidden-network-insights</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/introducing-data-security-at-sweet-protecting-data-in-motion</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/introducing-sweet-security-for-hybrid-environments</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/kickstarting-vulnerability-investigations-with-code-owner-context-for-gitlab-github</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/largest-npm-supply-chain-attack-to-date-targets-billions-of-downloads</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/manage-cis-compliance-across-your-workloads-and-clusters</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/modern-problems-unified-solutions</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/nextjs-authorization-bypass-cve-2025-29927-highlights-the-need-for-stronger-runtime-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/oded-blatman-of-fireblocks-on-runtime-detection-and-response-with-sweet-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/of-xz-and-unknown-unknowns</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/practical-ways-to-thwart-non-human-identity-attacks</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/prioritize-cves-with-jit-and-sweet-securitys-runtime-reachability-analysis</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/prioritize-vulnerabilities-by-identifying-executed-vulnerable-functions</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/python-tar-file-vulnerability-cve-2024-12718-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/raising-75m-to-build-the-future-of-runtime-and-ai-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/responding-to-the-cve-2024-6387-regresshion-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/secure-cloud-migration---lift-adapt-and-shift-right</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/securing-the-agentic-era-building-your-2026-ai-security-program</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/see-what-matters-faster-with-sweets-enhanced-asset-graph</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/shai-hulud-2-0-escalating-npm-supply-chain-threat-demands-immediate-attention</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/shai-hulud-3-0-when-a-supply-chain-worm-evolves---and-makes-mistakes</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/shai-hulud-the-self-replicating-npm-worm-stealing-secrets-and-hijacking-pipelines</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/spotlight-on-sweet-securitys-advanced-identity-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/start-your-day-with-confidence-introducing-cloud-issues-hub-at-sweet</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/static-cnapp-assumes-risk-runtime-cnapp-proves-it</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/strengthening-open-source-security-with-sweets-package-reputation-checks</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-cloud-security-leader-cloud-sec-report-2025</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-demo-detect-attacks-to-your-applications-and-spot-attack-attempts</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-demo-intelligent-vulnerability-prioritization-using-ai-and-runtime-insights</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-at-the-cnapp-showdown-2025</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-explains-the-19-capital-one-ssrf-breach</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-extends-runtime-cnapp-coverage-to-windows-environments</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-extends-support-for-windows-os</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-introduces-ai-response-playbooks</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-security-is-now-available-on-the-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-securitys-unified-cloud-native-detection-response-platform</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweet-securitys-vulnerabilities-hub-end-to-end-vulnerability-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/sweetx-your-new-ai-agent-for-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/the-cloud-security-alphabet-soup</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/the-need-for-runtime-protection-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/the-power-of-a-story-turning-cloud-incidents-into-actionable-narratives</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/the-roi-of-ai-why-security-must-be-rebuilt-from-the-inside-out</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/the-sweet-spot-of-cve-prioritization-solving-the-biggest-challenge-in-appsec-with-sweets-llm</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/under-the-hood-of-amazon-ecs-on-ec2-agents-iam-roles-and-task-isolation</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/understanding-elastic-index-mappings-and-field-limits</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/understanding-the-new-vulnerabilities-on-linuxs-cups-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/unified-detections-with-sweet-detecting-cross-account-role-assumptions</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/unlocking-a-new-layer-of-serverless-security-with-sweets-sensor-for-aws-lambda</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/welcome-to-candystore-sweet-securitys-open-source-key-value-storage</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/what-is-runtime-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/blog/when-prompts-go-rogue</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/chris-lentricchia</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/dror-kashti</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/eyal-fisher</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/hilit-yurman</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/lea-edelstein</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/lior-pollak</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/naor-haziz-2</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/noam-raveh</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/omer-kazo-cohen</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/omer-nissim</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/or-harel</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/sarah-elkaim</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/sweet-team</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/author/tomer-filiba</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/ai-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/breach</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/cve</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/feature-release</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/impersonation-attack</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/managed-service-access</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/runtime-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/security-research</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/sweet-news</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/sweet-people</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/sweet-product</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/thought-leadership</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/tags/vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-adds-generative-ai-to-its-cloud-runtime-security-suite</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-brings-runtime-cnapp-power-to-windows</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-introduces-evolutionary-leap-in-cloud-detection-and-response-releasing-first-unified-detection-response-platform</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-introduces-patent-pending-llm-powered-detection-engine-reducing-cloud-detection-noise-to-0-04</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-partners-with-illustria-to-offer-proactive-open-source-supply-chain-risk-management</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/press-releases/sweet-security-raises-75m-series-b-and-unveils-the-first-unified-runtime-cnapp-for-cloud-and-ai-security</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/enterprise-account-executive-central-usa</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/enterprise-account-executive-east-usa</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/enterprise-account-executive-west-usa</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/head-of-product-marketing</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/senior-frontend-engineer</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/senior-low-level-engineer</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/senior-product-manager</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/senior-security-researcher</loc>
    </url>
    <url>
        <loc>https://www.sweet.security/career/solution-architect-west-usa</loc>
    </url>
</urlset>