<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://strobes.co/webinar/automated-pentesting-with-ai-agents</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/pricing</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/e-books/vulnerability-management-buyers-guide</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/threat-landscape-report-2023</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/threat-landscape-report</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/threat-exposure-report-2024</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/exposure-management-playbook</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/exposure-management-ebook</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/e-books/ctem-buyers-guide</loc>
<lastmod>2026-03-30T16:55:44.152Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/partners/deal-registration</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/partners/technology-partner</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/partners/become-a-partner</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/case-studies/ptaas-for-kloudgin</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/case-studies/cs</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/customers/case-studies</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/customers/reviews</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/synack-alternative</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ptaas</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/pentesting-as-a-service</loc>
<lastmod>2026-03-30T16:55:42.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/hackerone-alternative</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ctem-platform</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ctem-for-ecommerce</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/cobalt-alternative</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/aws-security-ideabytes</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ad-demo</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ai-pentesting</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/agentic-pentesting</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/tools</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/sitemap</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/ctem-buyers-guide</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/cookies</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/terms</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/privacy-policy</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/accessibility</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/free-trial</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/lp/case-studies</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ebooks</loc>
<lastmod>2026-03-30T16:55:41.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/datasheets</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/red-team</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/healthcare</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/finance</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/api</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/analytics</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ai-agents</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/platform</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/asm</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/rbvm</loc>
<lastmod>2026-03-30T16:55:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/ctem</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/automated-pentesting</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/contact</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/lp/demo</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/pentesting-as-a-service</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/automated-pentesting</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/contact</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/trust</loc>
<lastmod>2026-03-30T16:55:39.298Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/company/partners/deal-registration</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/partners/technology</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/partners</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/careers</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/team</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/about</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/company/press</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources/academy</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources/customer-stories</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources/ebooks</loc>
<lastmod>2026-03-30T16:55:38.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources/datasheets</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources/videos</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/resources</loc>
<lastmod>2026-03-30T16:55:36.868Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/solutions/industries/manufacturing</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/industries/healthcare</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/industries/retail</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/industries/technology</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/industries/finance</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/roles/appsec</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/roles/cloud-security</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/roles/security-director</loc>
<lastmod>2026-03-30T16:55:35.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/roles/ciso</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/exposure-validation</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/aspm</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/rbvm</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/asm</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/exposure-assessment</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem/mobilization</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem/validation</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem/prioritization</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem/discovery</loc>
<lastmod>2026-03-30T16:55:34.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem/scoping</loc>
<lastmod>2026-03-30T16:55:33.644Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/solutions/ctem</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/api</loc>
<lastmod>2026-03-30T16:55:33.665Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/analytics</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/automation</loc>
<lastmod>2026-03-30T16:55:33.665Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/scanners</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/integrations</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform/ai-agents</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/platform</loc>
<lastmod>2026-03-30T16:55:33.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/</loc>
<lastmod>2026-03-30T16:55:33.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://strobes.co/blog</loc>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-vi-supply-chain-ransomware-threat-actors-tracking</loc>
<lastmod>2026-04-03T05:06:17.786Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/worst-data-breaches-of-march-2026</loc>
<lastmod>2026-04-02T14:37:41.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-to-write-effective-ai-agent-skill</loc>
<lastmod>2026-04-01T13:03:05.442Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-ai-supply-chain-incident-response-exposure-assessment</loc>
<lastmod>2026-03-31T05:27:45.931Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026</loc>
<lastmod>2026-03-31T03:51:11.527Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-ai-agent-stack-offensive-security</loc>
<lastmod>2026-03-27T07:02:06.182Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/litellm-pypi-supply-chain-attack-ai-infrastructure</loc>
<lastmod>2026-03-26T15:21:44.883Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-an-exposure-assessment-platform</loc>
<lastmod>2026-03-25T11:32:19.195Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/agentic-pentesting-strobes-ai</loc>
<lastmod>2026-03-25T10:35:59.220Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ai-harness-offensive-security-llm-pentest-architecture</loc>
<lastmod>2026-03-22T16:28:13.714Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ai-powered-pentesting-crawling-attack-surface-discovery</loc>
<lastmod>2026-03-20T08:04:05.414Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/black-friday-cybercrime-economy</loc>
<lastmod>2026-03-14T16:48:01.556Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-november-2025</loc>
<lastmod>2026-03-14T16:48:03.066Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-october-2025</loc>
<lastmod>2026-03-14T16:48:04.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/driving-ctem-adoption-across-the-enterprise</loc>
<lastmod>2026-03-20T07:37:33.775Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-in-2025-month-wise</loc>
<lastmod>2026-03-14T16:48:07.490Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-deduplication-security</loc>
<lastmod>2026-03-14T16:48:09.651Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-february-2026</loc>
<lastmod>2026-03-14T16:48:11.089Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/why-organizations-are-moving-to-ctem</loc>
<lastmod>2026-03-20T07:37:38.834Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-december-2025</loc>
<lastmod>2026-03-14T16:48:13.999Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ai-powered-cloud-native-security-strategy</loc>
<lastmod>2026-03-14T16:48:15.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-september-2025</loc>
<lastmod>2026-03-14T16:48:17.502Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/new-cert-in-guidelines-2025-what-every-security-team-needs-to-act-on-now</loc>
<lastmod>2026-03-14T16:48:19.243Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-we-managed-aurora-serverless-v2-idle-connections-in-rds-proxy-and-saved-rds-costs-by-50</loc>
<lastmod>2026-03-14T16:48:20.684Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/protect-rfid-systems-detect-hacking-risks</loc>
<lastmod>2026-03-14T16:48:22.318Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/network-device-configuration-security</loc>
<lastmod>2026-03-14T16:48:24.061Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ai-governance-framework-for-security-leaders</loc>
<lastmod>2026-03-14T16:48:25.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cybersecurity-accountability-why-cisos-must-share-ownership-across-the-enterprise</loc>
<lastmod>2026-03-14T16:48:27.489Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/web-application-penetration-testing-steps-test-cases</loc>
<lastmod>2026-03-14T19:48:47.872Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/beyond-the-basics-developing-a-risk-driven-ai-driven-cloud-native-security-strategy</loc>
<lastmod>2026-03-14T16:48:31.059Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-types-of-attack-surfaces</loc>
<lastmod>2026-03-14T19:48:50.103Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/nis2-cybersecurity-directive-guide</loc>
<lastmod>2026-03-14T16:48:34.318Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-vs-patch-management</loc>
<lastmod>2026-03-14T16:48:36.036Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/types-of-penetration-testing-for-your-business</loc>
<lastmod>2026-03-14T16:48:37.481Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ransomware-readiness-assessment-metrics-components</loc>
<lastmod>2026-03-14T19:48:52.183Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/securing-from-active-directory-attacks</loc>
<lastmod>2026-03-14T16:48:41.274Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/automated-vulnerability-management-for-security</loc>
<lastmod>2026-03-14T16:48:43.037Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines</loc>
<lastmod>2026-03-14T16:48:44.728Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cve-scanning-reduce-risk-rce-attacks</loc>
<lastmod>2026-03-14T16:48:46.489Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/application-penetration-testing-prevent-breaches</loc>
<lastmod>2026-03-14T16:48:48.256Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/why-your-business-needs-a-robust-malware-defense-strategy</loc>
<lastmod>2026-03-14T16:48:49.977Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-january-2025</loc>
<lastmod>2026-03-14T16:48:51.763Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-6-data-breaches-in-june-2025-that-made-headlines</loc>
<lastmod>2026-03-14T16:48:53.281Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/web-application-pentesting-checklist</loc>
<lastmod>2026-03-14T16:48:55.122Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/owasp-top-10-risk-mitigations-for-llms-and-gen-ai-apps-2025</loc>
<lastmod>2026-03-14T19:48:54.306Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-best-practices</loc>
<lastmod>2026-03-14T16:48:58.797Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/attack-surface-monitoring-risk-visibility</loc>
<lastmod>2026-03-14T16:49:00.430Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ctem-vs-asm-explained</loc>
<lastmod>2026-03-14T16:49:02.328Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-in-december-2024</loc>
<lastmod>2026-03-14T16:49:04.168Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/owasp-mobile-top-10-vulnerabilities-2024-updated</loc>
<lastmod>2026-03-14T16:49:05.904Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/major-data-breaches-of-november-2024</loc>
<lastmod>2026-03-14T16:49:07.762Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-journey-from-rejection-to-recognition-p1</loc>
<lastmod>2026-03-14T16:49:09.631Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/inside-ctem-boom-pioneers-followers-black-hat-2025</loc>
<lastmod>2026-03-14T16:49:11.341Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/root-detection-android-security</loc>
<lastmod>2026-03-14T16:49:13.259Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strategic-tool-consolidation-for-cisos</loc>
<lastmod>2026-03-14T16:49:14.899Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/42900-openclaw-exposed-control-panels-and-why-you-should-care</loc>
<lastmod>2026-03-14T16:49:16.645Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/scaling-ctem-from-concept-to-enterprise-pt-3</loc>
<lastmod>2026-03-14T16:49:18.279Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ctem-for-saas-security-leaders-a-practical-guide</loc>
<lastmod>2026-03-14T16:49:20.031Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/visibility-vs-context-2026</loc>
<lastmod>2026-03-14T16:49:21.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/pivot-to-ctem-when-others-doubted-pt-2</loc>
<lastmod>2026-03-14T16:49:23.421Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/major-data-breaches-of-october-2024</loc>
<lastmod>2026-03-14T16:49:25.117Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breaches-for-the-month-july-2024</loc>
<lastmod>2026-03-14T16:49:26.844Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-critical-risk-of-using-dummy-email-domains-in-payment-gateways</loc>
<lastmod>2026-03-14T16:49:28.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cloud-pentesting-101-what-to-expect-from-a-cloud-penetration-test</loc>
<lastmod>2026-03-14T19:48:56.817Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-in-2024-month-wise</loc>
<lastmod>2026-03-14T16:49:32.013Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-the-owasp-top-10-application-vulnerabilities</loc>
<lastmod>2026-03-14T19:48:59.324Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/continuous-threat-exposure-management-for-cyber-insurance</loc>
<lastmod>2026-03-14T16:49:36.046Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breaches-for-the-month-august-2024</loc>
<lastmod>2026-03-14T16:49:37.884Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/penetration-testing-frequency-how-often-is-enough</loc>
<lastmod>2026-03-14T19:49:01.635Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/decoding-the-pentesting-process-a-step-by-step-guide</loc>
<lastmod>2026-03-14T16:49:41.147Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/california-consumer-privacy-act-ccpa-essentials</loc>
<lastmod>2026-03-14T16:49:42.936Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/devsecops-pipeline-checklist</loc>
<lastmod>2026-03-14T16:49:44.678Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-risk-management-for-10000-assets</loc>
<lastmod>2026-03-14T19:49:04.056Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cybersecurity-budgets-set-to-grow-by-9-what-it-means-for-companies</loc>
<lastmod>2026-03-14T19:49:05.929Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/exposure-assessment-vs-validation</loc>
<lastmod>2026-03-14T19:49:58.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-ffiec-compliance-strobes-guide</loc>
<lastmod>2026-03-14T16:49:50.981Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/exploiting-limited-markup-features-on-web-applications</loc>
<lastmod>2026-03-14T16:49:52.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/10-cybersecurity-trends-to-watch-in-2025-and-how-to-prepare</loc>
<lastmod>2026-03-14T16:49:54.829Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-security-2024-year-in-review</loc>
<lastmod>2026-03-14T16:49:56.594Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-role-of-asset-correlation-in-vulnerability-management</loc>
<lastmod>2026-03-14T16:49:58.081Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/service-level-agreements-sla-for-vulnerability-management</loc>
<lastmod>2026-03-14T19:49:08.137Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/open-source-security-how-strobes-integrates-security-into-your-dev-workflow</loc>
<lastmod>2026-03-14T16:50:01.514Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cvss-score-a-comprehensive-guide-to-vulnerability-scoring</loc>
<lastmod>2026-03-14T16:50:03.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-evolving-landscape-of-security-from-vulnerability-management-to-ctem</loc>
<lastmod>2026-03-14T16:50:04.980Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/key-ctem-metrics-how-to-measure-the-effectiveness-of-your-continuous-threat-exposure-management-program</loc>
<lastmod>2026-03-14T16:50:06.672Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/debunking-gigaoms-radar-for-penetration-testing-as-a-service-ptaas-report</loc>
<lastmod>2026-03-14T16:50:08.344Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-security-scanners-application-security-for-modern-enterprises</loc>
<lastmod>2026-03-14T16:50:10.100Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/customized-vulnerability-management-dashboard-for-cisos</loc>
<lastmod>2026-03-14T16:50:12.033Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-is-pci-dss-v4-different-from-pci-dss-v3-penetration-testing-vulnerability-management-requirements-explained</loc>
<lastmod>2026-03-14T16:50:13.883Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cloud-attack-surface-managementcasm-what-is-it-how-does-strobes-casm-help-you-with-cloud-security</loc>
<lastmod>2026-03-14T16:50:15.595Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-10-exposure-management-platforms-that-truly-reduce-risks</loc>
<lastmod>2026-03-14T16:50:17.370Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-october-2025</loc>
<lastmod>2026-03-14T16:50:19.430Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-december-2025</loc>
<lastmod>2026-03-14T16:50:21.137Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/adversarial-exposure-validation-for-modern-environments</loc>
<lastmod>2026-03-14T16:50:22.672Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cybersecurity-trends-to-watch-in-2026</loc>
<lastmod>2026-03-14T16:50:24.098Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-november-2025</loc>
<lastmod>2026-03-14T16:50:25.625Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/bridging-the-gap-connecting-cybersecurity-spending-to-business-results</loc>
<lastmod>2026-03-14T16:50:27.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-f5-nation-state-compromise-strategic-implications-and-enterprise-defense-mandates</loc>
<lastmod>2026-03-14T16:50:29.074Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/react2shell-cve-2025-55182-rce</loc>
<lastmod>2026-03-14T16:50:30.474Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-aspm-protects-cloud-native-applications-from-misconfigurations-and-exploits</loc>
<lastmod>2026-03-14T16:50:31.974Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-real-cost-of-security-fatigue-and-how-ctem-brings-it-down</loc>
<lastmod>2026-03-14T19:49:10.317Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cve-2025-61882-explained-the-oracle-zero-day-breach-that-hit-enterprises-hard</loc>
<lastmod>2026-03-14T16:50:34.864Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-sbomsoftware-bill-of-materials</loc>
<lastmod>2026-03-14T16:50:36.574Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-10-cybersecurity-companies-in-united-states</loc>
<lastmod>2026-03-14T16:50:38.433Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-of-september-2025</loc>
<lastmod>2026-03-14T16:50:40.364Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-of-august-2025</loc>
<lastmod>2026-03-14T16:50:42.249Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cisos-use-ai-powered-vulnerability-prioritization</loc>
<lastmod>2026-03-14T16:50:44.368Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/npm-package-compromised-phishing-attack</loc>
<lastmod>2026-03-14T16:50:46.179Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cloud-security-in-healthcare-compliance-roi</loc>
<lastmod>2026-03-14T16:50:47.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/csrmc-department-of-war-cybersecurity</loc>
<lastmod>2026-03-14T16:50:49.506Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-network-penetration-testing</loc>
<lastmod>2026-03-14T16:50:51.314Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/external-network-penetration-testing-checklist</loc>
<lastmod>2026-03-14T16:50:53.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-continuous-penetration-testing-an-ultimate-guide</loc>
<lastmod>2026-03-14T19:49:12.231Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-6-data-breaches-in-july-2025</loc>
<lastmod>2026-03-14T16:50:56.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-high-risk-cves-of-june-2025</loc>
<lastmod>2026-03-14T16:50:58.503Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/difference-in-traditional-vulnerability-management-vs-risk-based-vulnerability-management</loc>
<lastmod>2026-03-14T19:49:14.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/threat-exposure-management-for-security-leaders</loc>
<lastmod>2026-03-14T16:51:02.329Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/why-attack-surface-analysis</loc>
<lastmod>2026-03-14T16:51:04.028Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/eu-cyber-resilience-act-what-you-must-do</loc>
<lastmod>2026-03-14T16:51:05.763Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/exposure-management-vs-vulnerability-management</loc>
<lastmod>2026-03-14T16:51:07.494Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/30-cybersecurity-metrics-kpis</loc>
<lastmod>2026-03-14T16:51:09.315Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-vulnerability-prioritization-strobes-guide</loc>
<lastmod>2026-03-14T16:51:11.234Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cve-2025-31324-critical-sap-flaw-explained</loc>
<lastmod>2026-03-14T16:51:13.140Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/roi-of-vulnerability-management-metrics</loc>
<lastmod>2026-03-14T16:51:14.860Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/pentesting-vs-ptaas-vs-automated-pentesting</loc>
<lastmod>2026-03-14T16:51:16.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerabilities-and-top-cves-of-april-2025</loc>
<lastmod>2026-03-14T16:51:18.348Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-may-2025</loc>
<lastmod>2026-03-14T16:51:20.148Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-may-2025</loc>
<lastmod>2026-03-14T19:49:16.905Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breaches-in-april-2025</loc>
<lastmod>2026-03-14T16:51:23.930Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-prioritization-over-fixing-everything</loc>
<lastmod>2026-03-14T16:51:25.640Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-ctem-enhances-threat-prioritization-in-complex-networks</loc>
<lastmod>2026-03-14T16:51:27.339Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cybersecurity-conferences-events-in-india-2025</loc>
<lastmod>2026-03-14T16:51:29.128Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/guide-vulnerability-assessment</loc>
<lastmod>2026-03-14T16:51:30.911Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/dpdp-rules-2025-what-everything-you-need-to-know</loc>
<lastmod>2026-03-14T16:51:33.008Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-january-2025</loc>
<lastmod>2026-03-14T16:51:34.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/web-application-penetration-testing-tools</loc>
<lastmod>2026-03-14T16:51:36.523Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-of-march-2025</loc>
<lastmod>2026-03-14T16:51:38.542Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-february-2025</loc>
<lastmod>2026-03-14T16:51:40.521Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breaches-march-2025</loc>
<lastmod>2026-03-14T16:51:42.263Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cybersecurity-conferences-events-in-the-us-2025</loc>
<lastmod>2026-03-14T16:51:44.083Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/is-vulnerability-scanning-enough-to-protect-us-organizations-in-2025</loc>
<lastmod>2026-03-14T19:49:19.041Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-of-october-2024</loc>
<lastmod>2026-03-14T16:51:47.139Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-cves-vulnerabilities-of-november-2024</loc>
<lastmod>2026-03-14T16:51:48.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-vulnerabilities-of-december-2024</loc>
<lastmod>2026-03-14T16:51:50.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/critical-linux-vulnerability-in-cups-what-it-means-and-how-to-respond</loc>
<lastmod>2026-03-14T16:51:52.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-ptaas-supports-shift-left-security-practices</loc>
<lastmod>2026-03-14T19:49:21.572Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-cves-vulnerabilities-of-september-2024</loc>
<lastmod>2026-03-14T16:51:56.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breaches-for-the-month-september-2024</loc>
<lastmod>2026-03-14T16:51:57.965Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/new-york-state-cybersecurity-regulations-now-in-effect-what-you-need-to-know</loc>
<lastmod>2026-03-14T16:51:59.642Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/what-is-vulnerability-management-compliance-challenges-solutions</loc>
<lastmod>2026-03-14T16:52:01.314Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-lifecycle-the-ultimate-guide-to-business-security</loc>
<lastmod>2026-03-14T19:49:23.821Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-much-does-penetration-testing-cost</loc>
<lastmod>2026-03-14T19:49:26.277Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strengthening-api-security-with-appsentinels-integration-in-the-strobes-platform</loc>
<lastmod>2026-03-14T16:52:06.591Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/enhanced-user-access-more-control-more-security-with-strobes</loc>
<lastmod>2026-03-14T19:49:28.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-vulnerability-management-mistakes-companies-make-plus-a-bonus-mistake-to-avoid</loc>
<lastmod>2026-03-14T19:49:30.782Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-july-2024-key-vulnerabilities-and-mitigations</loc>
<lastmod>2026-03-14T16:52:11.546Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/introducing-strobes-enhanced-role-based-access-control-dynamic-asset-permissions</loc>
<lastmod>2026-03-14T16:52:13.269Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-integrates-with-azure-repos-enhancing-code-security</loc>
<lastmod>2026-03-14T16:52:15.096Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cve-2024-38063-an-in-depth-look-at-the-critical-remote-code-execution-vulnerability</loc>
<lastmod>2026-03-14T16:52:16.818Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-cves-and-vulnerabilities-of-august-2024-key-threats-and-how-to-respond</loc>
<lastmod>2026-03-14T19:49:33.107Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-to-protect-your-website-from-subdomain-takeovers</loc>
<lastmod>2026-03-14T16:52:20.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/continuous-threat-exposure-management-ctem-the-ultimate-guide-for-cisos</loc>
<lastmod>2026-03-14T16:52:21.979Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-15-vulnerability-management-tools-for-your-business</loc>
<lastmod>2026-03-14T16:52:23.732Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/penetration-testing-report-key-elements-you-cant-miss</loc>
<lastmod>2026-03-14T16:52:25.626Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/openssh-regresshion-cve-2024-6387-a-blast-from-the-past-with-critical-repercussions</loc>
<lastmod>2026-03-14T16:52:27.323Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/why-ignoring-vulnerability-prioritization-is-a-cisos-worst-nightmare</loc>
<lastmod>2026-03-14T19:49:35.250Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/a-closer-look-at-top-5-vulnerabilities-of-april-2024</loc>
<lastmod>2026-03-14T16:52:31.153Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/prioritizing-vulnerabilities-a-growing-imperative</loc>
<lastmod>2026-03-14T16:52:32.907Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-cves-and-vulnerabilities-of-may-2024</loc>
<lastmod>2026-03-14T16:52:34.674Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/atlassian-patches-critical-bamboo-bug-and-over-20-other-vulnerabilities</loc>
<lastmod>2026-03-14T16:52:36.483Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-vulnerabilities-for-march-2024-a-closer-look-at-the-xz-utils-supply-chain-attack</loc>
<lastmod>2026-03-14T16:52:38.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/penetration-testing-methodology-strobes-guide</loc>
<lastmod>2026-03-14T16:52:40.253Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/integrating-penetration-testing-as-a-service-ptaas-with-ci-cd-pipelines-a-practical-guide</loc>
<lastmod>2026-03-14T19:49:37.481Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/2025-building-security-outcomes</loc>
<lastmod>2026-03-14T16:52:43.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-ptaas-enhances-collaboration-between-security-teams-and-developers</loc>
<lastmod>2026-03-14T16:52:45.565Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-strobes-penetration-testing-supports-compliance-audits-and-assessments</loc>
<lastmod>2026-03-14T19:49:39.799Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/offensive-security-101-everything-you-need-to-know</loc>
<lastmod>2026-03-14T19:49:42.028Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ptaas-vs-bug-bounty-programs-complementary-or-competing-approaches</loc>
<lastmod>2026-03-14T19:49:44.318Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-strobes-uncover-hidden-cloud-risks-within-your-organization</loc>
<lastmod>2026-03-14T19:49:46.454Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/new-feature-risk-based-prioritization</loc>
<lastmod>2026-03-14T16:52:53.786Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-2023-pentesting-recap-trends-stats-and-how-ptaas-is-transforming-cybersecurity</loc>
<lastmod>2026-03-14T16:52:55.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/january-2024-top-cve-and-vulnerabilities-report</loc>
<lastmod>2026-03-14T16:52:57.267Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cybersecurity-trends-2024-lessons-from-2023-predictions-to-watch-out-for</loc>
<lastmod>2026-03-14T16:52:59.016Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/attack-surface-management-what-is-it-why-do-you-need-it</loc>
<lastmod>2026-03-14T16:53:00.669Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/new-feature-grouping-vulnerabilities-to-streamline-patch-management</loc>
<lastmod>2026-03-14T16:53:02.415Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/february-2024-top-cves-and-vulnerabilities-report</loc>
<lastmod>2026-03-14T16:53:04.442Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-13-cybersecurity-companies-in-the-usa-in-2024</loc>
<lastmod>2026-03-14T16:53:06.192Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-custom-dashboards-redefining-risk-based-vulnerability-management</loc>
<lastmod>2026-03-14T16:53:08.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/rbvm-customized-dashboards-cfo-template</loc>
<lastmod>2026-03-14T16:53:09.838Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/use-case-rapid-identification-and-escalation-of-a-critical-threat-by-strobes-asm</loc>
<lastmod>2026-03-14T16:53:11.589Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ransomware-simulation-playbook</loc>
<lastmod>2026-03-14T16:53:13.332Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/multi-cloud-attack-surface-with-pentesting</loc>
<lastmod>2026-03-14T19:49:48.685Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-next-js-vulnerability</loc>
<lastmod>2026-03-14T16:53:17.015Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/mcp-model-context-protocol-and-its-critical-vulnerabilities</loc>
<lastmod>2026-03-14T16:53:18.672Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-cves-of-july-2025</loc>
<lastmod>2026-03-14T16:53:20.425Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/mobile-application-pentesting-data-protection-compliance</loc>
<lastmod>2026-03-14T16:53:22.184Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/integrating-attack-surface-management-and-penetration-testing-as-a-service</loc>
<lastmod>2026-03-14T19:49:50.812Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cve-2025-53770-microsoft-sharepoint-zero-day-exploited-in-rce-attacks</loc>
<lastmod>2026-03-14T19:49:52.993Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/data-breach-at-allianz-life</loc>
<lastmod>2026-03-14T16:53:27.236Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/exposure-management-in-legacy-enterprise-environments</loc>
<lastmod>2026-03-14T16:53:28.896Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cloud-security-essentials-protecting-your-data-in-cloud-environments</loc>
<lastmod>2026-03-14T16:53:30.563Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/penetration-testing-explained-safeguarding-your-online-presence</loc>
<lastmod>2026-03-14T16:53:32.279Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/a-critical-remote-code-executionrce-vulnerability-in-apache-struts2-flaw-puts-your-web-apps-at-risk</loc>
<lastmod>2026-03-14T16:53:33.944Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-10-must-attend-cybersecurity-conferences-in-2024</loc>
<lastmod>2026-03-14T16:53:35.582Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/scaling-application-security-with-application-security-posture-management-aspm</loc>
<lastmod>2026-03-14T16:53:37.016Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/application-security-fundamentals-common-threats-and-how-to-mitigate-them</loc>
<lastmod>2026-03-14T16:53:38.669Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-data-breaches-of-february-2025</loc>
<lastmod>2026-03-14T16:53:40.413Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/e-commerce-security-101-key-threats-and-best-practices</loc>
<lastmod>2026-03-14T16:53:42.245Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-gitlabs-critical-security-release-cve-2023-5009</loc>
<lastmod>2026-03-14T16:53:43.961Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/must-ask-questions-before-choosing-a-penetration-testing-vendor</loc>
<lastmod>2026-03-14T16:53:45.392Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/three-reasons-why-traditional-pentesting-isnt-working-for-you</loc>
<lastmod>2026-03-14T16:53:47.068Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/unleash-the-power-of-a-crest-accredited-penetration-testing-provider-a-comprehensive-guide</loc>
<lastmod>2026-03-14T16:53:48.734Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/penetration-testing-as-a-service-ptaas-an-overview</loc>
<lastmod>2026-03-14T16:53:50.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/understanding-external-attack-surface-management-easm</loc>
<lastmod>2026-03-14T16:53:52.037Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-prioritization-an-effective-security-approach</loc>
<lastmod>2026-03-14T16:53:53.818Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-without-auto-deduplication-is-inefficient</loc>
<lastmod>2026-03-14T19:49:55.140Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/vulnerability-management-10x-faster</loc>
<lastmod>2026-03-14T16:53:57.063Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/top-5-cybersecurity-predictions-for-2023</loc>
<lastmod>2026-03-14T16:53:58.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/traditional-pentesting-vs-pentesting-as-a-service-ptaas-choosing-the-right-approach-for-your-security-needs</loc>
<lastmod>2026-03-14T16:54:00.109Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/uncovering-the-limitations-of-vulnerability-scanners</loc>
<lastmod>2026-03-14T16:54:01.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/strobes-security-year-in-review-product-highlights</loc>
<lastmod>2026-03-14T16:54:03.197Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ptaas-pricing-made-easy-streamlining-costs-for-pentesting</loc>
<lastmod>2026-03-14T16:54:04.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/simplifying-continuous-pentests-how-strobes-ptaas-makes-security-testing-efficient</loc>
<lastmod>2026-03-14T16:54:06.125Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/rise-in-the-need-of-vm-platforms</loc>
<lastmod>2026-03-14T16:54:07.587Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/ongoing-modern-pentesting-for-comprehensive-security-in-healthcare</loc>
<lastmod>2026-03-14T16:54:09.366Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-unfair-blame-game-why-cisos-shouldnt-shoulder-all-the-responsibility</loc>
<lastmod>2026-03-14T19:49:57.023Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-top-10-vulnerabilities-of-2022-mastering-vulnerability-management</loc>
<lastmod>2026-03-14T16:54:12.306Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/is-your-pentesting-program-optimized-for-maximum-effectiveness</loc>
<lastmod>2026-03-14T16:54:14.043Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/the-ultimate-guide-to-zero-day-vulnerability-exploits-attacks</loc>
<lastmod>2026-03-14T16:54:15.685Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/mitigating-the-risks-of-digital-transformation</loc>
<lastmod>2026-03-14T16:54:17.341Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/how-companies-can-quickly-identify-the-most-critical-issues-using-strobes-part-1</loc>
<lastmod>2026-03-14T16:54:18.995Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/4-ways-mssps-can-increase-their-margins-by-partnering-with-strobes-security</loc>
<lastmod>2026-03-14T16:54:20.460Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/cisos-solution-for-better-vulnerability-management</loc>
<lastmod>2026-03-14T16:54:21.931Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/demystify-the-cybersecurity-risk-management-process</loc>
<lastmod>2026-03-14T16:54:23.480Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/harness-the-power-of-hybrid-framework-in-penetration-testing</loc>
<lastmod>2026-03-14T16:54:25.127Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/is-texas-becoming-a-hub-for-pentesting-companies</loc>
<lastmod>2026-03-14T16:54:26.528Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/6-key-attributes-of-an-effective-ciso</loc>
<lastmod>2026-03-14T16:54:28.189Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/building-a-vulnerability-management-program-key-components-and-tips-to-get-started</loc>
<lastmod>2026-03-14T16:54:29.614Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/companies-maintaining-pci-compliance-and-the-importance-of-a-vulnerability-management-program</loc>
<lastmod>2026-03-14T16:54:31.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/blog/introducing-strobes-vi</loc>
<lastmod>2026-03-14T16:54:32.839Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/tools</loc>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://strobes.co/tools/security-tool-roi-calculator</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/tools/pentest-health-check</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/tools/ctem-maturity-assessment</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets</loc>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://strobes.co/datasheets/ptaas-datasheet</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets/aspm-datasheet</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets/rbvm-datasheet</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets/asm-datasheet</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/datasheets/ctem-datasheet</loc>
<lastmod>2026-03-30T16:55:45.612Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://strobes.co/feed.xml</loc>
<changefreq>daily</changefreq>
<priority>0.3</priority>
</url>
</urlset>
