<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.secureflag.com/2020/07/21/why-is-practical-appsec-training-for-developers-vital-for-your-organisation/</loc>
<lastmod>2020-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/07/29/kubernetes-security-challenges-and-how-to-steer-the-container-ship/</loc>
<lastmod>2020-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/08/13/the-key-to-achieving-pci-dss-compliance-effective-pci-training-for-developers/</loc>
<lastmod>2020-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/08/19/stretching-the-elasticsearch/</loc>
<lastmod>2020-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/09/08/adaptive-appsec-learning-for-developers/</loc>
<lastmod>2020-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/11/19/securing-the-docker-ecosystem-part-1-the-docker-daemon/</loc>
<lastmod>2020-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/11/30/securing-the-docker-ecosystem-part-2-the-container-build/</loc>
<lastmod>2020-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2020/12/08/securing-the-docker-ecosystem-part-3-the-container-runtime/</loc>
<lastmod>2020-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/03/18/the-strong-relationship-between-hipaa-compliance-and-secure-coding-training/</loc>
<lastmod>2021-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/04/12/why-secure-coding-is-essential-for-compliance-with-fda-21-cfr-part11/</loc>
<lastmod>2021-04-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/05/04/how-qa-and-security-testing-training-makes-software-more-secure/</loc>
<lastmod>2021-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/06/08/threat-analysis-training-with-secureflag/</loc>
<lastmod>2021-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/09/06/secureflag-contextual-security-training-on-github/</loc>
<lastmod>2021-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/11/01/secureflag-contextual-security-training-on-jira/</loc>
<lastmod>2021-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2021/11/29/cyber-security-awareness-month-2021-challenge-writeup/</loc>
<lastmod>2021-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/01/05/introducing-secure-code-reviews-as-part-of-your-SDLC/</loc>
<lastmod>2022-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/01/17/secure-coding-lab-recommendations-for-github-and-jira/</loc>
<lastmod>2022-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/01/26/securing-react-native/</loc>
<lastmod>2022-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/02/23/secure-coding-training-for-all-layers-in-all-stacks-securing-sap-abap/</loc>
<lastmod>2022-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/03/02/salesforce-apex-security-concerns-and-the-role-of-hands-on-secure-coding-training/</loc>
<lastmod>2022-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/03/09/why-you-should-take-security-in-cobol-software-seriously/</loc>
<lastmod>2022-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/03/23/comparing-features-and-security-capabilities-of-objective-c-and-swift/</loc>
<lastmod>2022-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/04/05/pl-sql-and-t-sql-pros-cons-and-security-concerns/</loc>
<lastmod>2022-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/04/11/considerations-for-secure-laravel-php-framework-development/</loc>
<lastmod>2022-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/04/20/flutter-popular-versatile-powerful-also-secure/</loc>
<lastmod>2022-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/05/03/secureflag-contextual-security-training-on-sonarqube/</loc>
<lastmod>2022-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/06/10/securing-vue-a-secureflag-guide-to-creating-robusts-vue-js-code/</loc>
<lastmod>2022-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/09/15/secure-coding-activities-at-secureflag-for-cybersecurity-awareness-month-2022/</loc>
<lastmod>2022-09-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/09/26/the-great-blockchain-robbery-recent-hacks-and-heists-on-blockchain-and-defi/</loc>
<lastmod>2022-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/11/04/threat-modelling-labs-now-available-on-secureflag/</loc>
<lastmod>2022-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2022/12/02/azure-plugin/</loc>
<lastmod>2022-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/03/09/secure-your-infrastructure-as-code-with-secureflag-hands-on-terraform-cloud-labs/</loc>
<lastmod>2023-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/03/21/the-impact-of-ai-on-secure-coding/</loc>
<lastmod>2023-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/03/28/why-the-eu-cyber-resilience-act-makes-secure-coding-practices-critical/</loc>
<lastmod>2023-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/04/13/how-to-master-the-owasp-top-10-and-be-compliant/</loc>
<lastmod>2023-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/05/02/why-is-it-hard-to-write-secure-programs/</loc>
<lastmod>2023-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/06/02/integrate-with-secureflag-through-our-open-API-innovative/</loc>
<lastmod>2023-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/06/14/integrating-secureflag-into-gitlab-for-effective-vulnerability-remediation/</loc>
<lastmod>2023-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/06/19/from-conference-to-lab-the-emergence-of-frontjacking/</loc>
<lastmod>2023-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/07/04/secureflag-training-now-integrated-with-dracon-for-streamlined-devops-security-practices/</loc>
<lastmod>2023-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/07/12/secureflag-revolutionizes-threat-modeling-training-with-new-sdk/</loc>
<lastmod>2023-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/07/19/empowering-application-security-management-kondukto-and-secureflag-integration/</loc>
<lastmod>2023-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/07/26/combining-owasp-samm-and-secureflag-for-enhanced-software-security/</loc>
<lastmod>2023-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/08/02/increasing-trust-between-security-teams-and-developers-through-secure-coding-training/</loc>
<lastmod>2023-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/08/15/secureflag-platform-a-comprehensive-guide-to-integrations/</loc>
<lastmod>2023-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/08/31/enhance-ci-cd-security-with-jenkins-new-labs/</loc>
<lastmod>2023-08-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/09/23/secureflag-new-azure-security-training-labs/</loc>
<lastmod>2023-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/10/10/elevate-and-federate-the-power-of-teams-in-training-programs/</loc>
<lastmod>2023-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/10/30/setting-up-and-managing-an-effective-security-champions-program/</loc>
<lastmod>2023-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/11/06/introducing-threatcanvas-an-ai-powered-tool-to-automate-threat-modeling/</loc>
<lastmod>2023-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/11/10/prompt-injection-attacks-in-large-language-models/</loc>
<lastmod>2023-11-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/11/23/secureflag-unveils-sarif-integration/</loc>
<lastmod>2023-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/11/29/new-prompt-injection-labs-a-leap-towards-securing-large-language-models/</loc>
<lastmod>2023-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/12/04/introducing-risk-templates-on-threatcanvas-a-new-era-in-automated-threat-modeling/</loc>
<lastmod>2023-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2023/12/11/secureflag-soc-analyst-labs-training/</loc>
<lastmod>2023-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/01/03/new-year-new-threatcanvas-features/</loc>
<lastmod>2024-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/02/06/azure-arm-vs-bicep-discover-both-on-secureflag/</loc>
<lastmod>2024-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/02/14/threat-modeling-for-privacy-what-is-it-and-how-can-you-use-it/</loc>
<lastmod>2024-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/02/21/shift-left-with-effective-security-training/</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/02/27/introducing-custom-threat-library-and-custom-risk-templates/</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/03/05/threat-modeling-for-pci-dss/</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/03/13/security-policy-enforcement-in-kubernetes/</loc>
<lastmod>2024-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/03/18/improving-security-of-mysql-databases/</loc>
<lastmod>2024-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/03/22/introducing-threatcanvas-assistant/</loc>
<lastmod>2024-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/04/04/threat-modeling-for-hipaa/</loc>
<lastmod>2024-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/04/09/an-introduction-to-python-web-frameworks/</loc>
<lastmod>2024-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/04/16/enhance-your-lms-with-secureflag-and-scorm/</loc>
<lastmod>2024-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/05/07/introducing-threatcanvas-lite/</loc>
<lastmod>2024-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/05/10/security-in-python-django/</loc>
<lastmod>2024-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/05/17/security-in-ruby-sinatra/</loc>
<lastmod>2024-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/05/21/embedding-threat-modeling-in-the-sdlc-with-jira/</loc>
<lastmod>2024-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/05/30/secureflag-owasp-partner-threat-modeling-automation-tool-threatcanvas/</loc>
<lastmod>2024-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/06/05/security-hardening-for-your-postgresql-database/</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/06/13/write-fast-and-secure-code-with-secureFlags-new-haskell-labs/</loc>
<lastmod>2024-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/06/18/new-virtual-content-security-policy-labs-on-secureflag/</loc>
<lastmod>2024-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/07/02/simplify-threat-modeling-with-threatcanvas-upload-diagrams-for-instant-analysis/</loc>
<lastmod>2024-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/07/08/compare-your-secure-coding-progress-with-the-secure-coding-benchmark/</loc>
<lastmod>2024-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/07/16/boost-engagement-with-customizable-progress-levels/</loc>
<lastmod>2024-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/07/25/create-detailed-threat-models-with-threatcanvas/</loc>
<lastmod>2024-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/07/29/avoid-reintroducing-vulnerable-code/</loc>
<lastmod>2024-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/08/15/master-securing-your-ci-cd-pipelines/</loc>
<lastmod>2024-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/08/22/integrate-security-insights-into-your-shortcut-stories-with-secureflag/</loc>
<lastmod>2024-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/08/27/announcing-personal-subscriptions-on-secureflag/</loc>
<lastmod>2024-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/09/03/preparing-your-organization-for-pci-dss-4/</loc>
<lastmod>2024-09-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/09/09/copilot-capital-invests-in-secureflag-to-drive-growth-and-innovation/</loc>
<lastmod>2024-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/09/11/the-rise-of-devsecops/</loc>
<lastmod>2024-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/09/18/threat-model-cloud-applications-in-aws-azure-gcp/</loc>
<lastmod>2024-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/09/24/explore-owasp-llm-top-10-with-secureflag-interactive-labs/</loc>
<lastmod>2024-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/10/16/the-risks-of-generative-ai-coding-in-software-development/</loc>
<lastmod>2024-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/10/21/introducing-azure-boards-integration-for-threatcanvas/</loc>
<lastmod>2024-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/10/28/reduce-risk-and-secure-your-applications-with-grc/</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/11/12/top-ten-owasp-api-security-risks/</loc>
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/11/15/understanding-owasp-asvs/</loc>
<lastmod>2024-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/11/22/new-rust-training-labs/</loc>
<lastmod>2024-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/11/26/threatcanvas-revolutionizing-threat-modeling/</loc>
<lastmod>2024-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/11/29/engage-teams-secure-coding-training/</loc>
<lastmod>2024-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/12/05/trends-application-security/</loc>
<lastmod>2024-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/12/10/understanding-european-ai-act/</loc>
<lastmod>2024-12-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/12/12/low-code-no-code-security/</loc>
<lastmod>2024-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/12/17/threat-modeling-for-developers/</loc>
<lastmod>2024-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2024/12/19/building-security-champions-program/</loc>
<lastmod>2024-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/01/07/translation-feature/</loc>
<lastmod>2025-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/01/14/simplify-fedramp-compliance/</loc>
<lastmod>2025-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/01/17/ot-iot-scada-threat-modeling/</loc>
<lastmod>2025-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/01/22/gcp-cloud-security-threatcanvas/</loc>
<lastmod>2025-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/01/27/automotive-risk-template-threatcanvas/</loc>
<lastmod>2025-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/04/cybersecurity-trends-2025/</loc>
<lastmod>2025-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/10/privacy-risk-template-threatcanvas/</loc>
<lastmod>2025-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/14/security-skills-software-engineers/</loc>
<lastmod>2025-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/18/risk-templates-threatcanvas/</loc>
<lastmod>2025-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/20/roi-secure-coding-training/</loc>
<lastmod>2025-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/25/automotive-security-compliance/</loc>
<lastmod>2025-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/02/27/scada-security-training/</loc>
<lastmod>2025-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/04/secure-coding-best-practices/</loc>
<lastmod>2025-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/07/new-automotive-labs/</loc>
<lastmod>2025-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/19/develop-scada-new-labs/</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/21/rad-tm-developer-driven-threat-modeling/</loc>
<lastmod>2025-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/24/secure-embedded-systems/</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/03/27/threatcanvas-linked-threat-models/</loc>
<lastmod>2025-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/04/03/threat-modeling-process/</loc>
<lastmod>2025-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/04/10/gcp-security-training-labs/</loc>
<lastmod>2025-04-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/04/14/secure-coding-training-smbs/</loc>
<lastmod>2025-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/04/25/automotive-cybersecurity/</loc>
<lastmod>2025-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/04/29/live-notifications/</loc>
<lastmod>2025-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/05/07/application-security-program/</loc>
<lastmod>2025-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/05/09/security-training-for-developers/</loc>
<lastmod>2025-05-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/05/14/secure-vibe-coding/</loc>
<lastmod>2025-05-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/05/20/security-in-cloud-computing/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/10/training-for-owasp-top-ten-llms/</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/12/active-directory-learning-path/</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/17/guide-to-software-development-lifecycle/</loc>
<lastmod>2025-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/23/threatcanvas-layers/</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/25/ncsc-software-security-code/</loc>
<lastmod>2025-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/06/27/security-misconfiguration/</loc>
<lastmod>2025-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/01/threatcanvas-markdown-reports/</loc>
<lastmod>2025-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/08/agentic-ai-security/</loc>
<lastmod>2025-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/11/secureflag-analyzer/</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/15/making-sense-of-fedramp-process/</loc>
<lastmod>2025-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/18/secureflag-supports-dora-compliance/</loc>
<lastmod>2025-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/23/evaluate-third-party-developers/</loc>
<lastmod>2025-07-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/07/30/threat-modeling-developer-story/</loc>
<lastmod>2025-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/12/what-are-secure-by-design-principles/</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/15/integrating-threat-modeling-into-sdlc/</loc>
<lastmod>2025-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/19/why-static-analysis-isnt-enough/</loc>
<lastmod>2025-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/22/develop-safer-software-with-secure-datasets/</loc>
<lastmod>2025-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/27/agentic-ai-mcp-labs/</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/08/27/strengthening-supplier-security-through-training/</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/05/developers-guide-to-security-vulnerabilities/</loc>
<lastmod>2025-09-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/09/rise-of-quantum-cryptography/</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/12/secureflag-git-hook/</loc>
<lastmod>2025-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/16/insider-threat-and-emerging-risks/</loc>
<lastmod>2025-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/19/hands-on-data-security-labs/</loc>
<lastmod>2025-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/09/26/secureflag-code-recipes-repository/</loc>
<lastmod>2025-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/03/secureflag-analyzer-intellij-idea/</loc>
<lastmod>2025-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/07/secureflag-training-github-action/</loc>
<lastmod>2025-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/10/threat-modeling-methodology-explained/</loc>
<lastmod>2025-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/14/kerberos-delegation-learning-path/</loc>
<lastmod>2025-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/21/ai-application-security/</loc>
<lastmod>2025-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/24/threatcanvas-projects/</loc>
<lastmod>2025-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/10/30/private-aws-cloud-threatcanvas/</loc>
<lastmod>2025-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/04/organizational-security-challenges/</loc>
<lastmod>2025-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/07/owasp-top-ten-2025-learning-paths/</loc>
<lastmod>2025-11-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/11/secureflag-introduces-new-cobol-labs/</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/13/software-supply-chain-attack/</loc>
<lastmod>2025-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/17/front-end-security-best-practices/</loc>
<lastmod>2025-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/21/what-is-remote-code-execution/</loc>
<lastmod>2025-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/11/25/enhance-salesforce-security-apex-labs/</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/02/human-side-application-security-posture-management/</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/10/cloud-native-security-practices-for-developers/</loc>
<lastmod>2025-12-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/12/pipeline-security-with-owasp-spvs/</loc>
<lastmod>2025-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/16/security-training-with-custom-labs/</loc>
<lastmod>2025-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/19/epic-level-threat-modeling/</loc>
<lastmod>2025-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/23/practical-guide-to-container-security/</loc>
<lastmod>2025-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2025/12/31/looking-back-security-trends/</loc>
<lastmod>2025-12-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/07/integrated-security-training/</loc>
<lastmod>2026-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/09/guide-owasp-top-ten-agentic-ai/</loc>
<lastmod>2026-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/13/code-repo-to-threatcanvas/</loc>
<lastmod>2026-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/16/mobile-app-security-essentials/</loc>
<lastmod>2026-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/20/introducing-threat-modeling-apis/</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/23/attack-surface-management-for-developers/</loc>
<lastmod>2026-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/01/27/whats-next-for-application-security/</loc>
<lastmod>2026-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/03/nis2-compliance-developer-security-training/</loc>
<lastmod>2026-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/05/risk-templates-owasp-llm-agentic-ai/</loc>
<lastmod>2026-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/10/developer-insights-ot-security-principles/</loc>
<lastmod>2026-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/13/secure-code-review-in-practice/</loc>
<lastmod>2026-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/17/cyber-resilience-design-to-deployment/</loc>
<lastmod>2026-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/20/sensitive-data-protection-todays-software/</loc>
<lastmod>2026-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/24/vibe-coding-learning-path-beginners/</loc>
<lastmod>2026-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/02/27/developer-workstation-attack-surface/</loc>
<lastmod>2026-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/03/ci-cd-security-best-practices-devops/</loc>
<lastmod>2026-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/06/claude-code-security-developer-first/</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/10/mcp-security-risks-prevention/</loc>
<lastmod>2026-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/13/security-debt-ai-development/</loc>
<lastmod>2026-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/17/findings2training-vscode-intellij/</loc>
<lastmod>2026-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/20/organization-goals-track-security-training/</loc>
<lastmod>2026-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/23/ai-assisted-development-labs/</loc>
<lastmod>2026-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/03/27/ai-pair-programming/</loc>
<lastmod>2026-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/2026/04/01/ai-assistants-producing-secure-code/</loc>
<lastmod>2026-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.secureflag.com/categories/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/contact/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/privacy-policy/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page2/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page3/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page4/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page5/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page6/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page7/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page8/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page9/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page10/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page11/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page12/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page13/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page14/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page15/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page16/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page17/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page18/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page19/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page20/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page21/</loc>
</url>
<url>
<loc>https://blog.secureflag.com/page22/</loc>
</url>
</urlset>
