<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.kusari.dev/about</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/contact</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/terms</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/contact-form-sent</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resources</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/open-source</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/news</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/events</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/case-studies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/five-strategies-to-reduce-risk-in-your-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/securing-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/guides</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/careers</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/recent-talks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/webinars</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/platform</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/kubecon</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/five-devsecops-practices-to-harden-your-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/use-cases</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/demo</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/kubecon-eu</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-hub-old</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/rsa</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/kubecon-na-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/inspector</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/seven-critical-devsecops-strategies-for-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/the-new-frontline-in-devsecops-security-at-the-pull-request</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/inspector-docs</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/content-library</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/vulnerabilities-gone-in-30-days</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/medical-device-cybersecurity-fda-524b-compliance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/developers</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/better-together-kusari-and-cloudsmith</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/integrations</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/product-tour</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/2026-predictions-why-open-source-accountability-ai-security-and-standardization-will-define-the-next-era-of-software</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/a-high-fidelity-view-of-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/achieving-wisdom-with-guac-visualizer</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/addressing-the-challenges-of-cloud-native-application-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/ai-alone-wont-fix-your-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/ai-and-the-secure-software-factory</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/ai-coding-assistants-in-2026-4x-faster-10x-riskier-the-hidden-security-cost</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/announcing-guac-v0-8-0-license-data-integration-immediate-vuln-scans-and-streamlined-node-deletion</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/announcing-helm-chart-for-guac</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/another-step-on-the-security-journey-a-constellation-of-sboms</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/another-turn-of-the-page-guac-v0-7-0-released</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/applying-zero-trust-to-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/best-sbom-tools-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/book-available</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/breaking-the-department-of-no-ship-fast-but-also-secure</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/case-study-a-discussion-with-guidewire-on-guac</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/celebrating-openssfs-anniversary</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/choosing-an-sbom-generation-tool</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/code-is-more-important-than-identity-for-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/codifying-the-sdlc-with-in-toto</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/compliance-is-getting-real</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/contributor-to-leader-securing-open-source-software-at-openssf</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/counting-cves-was-never-enough</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/dabom-podcast-with-tim-dj</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/effort-to-fix</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/facts-and-mythos</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/figure-out-whos-lurking-in-your-supply-chain-with-signatures-and-attestations</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/foundation-trust-stronger-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/future-cves</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/github-code-review-best-practices-for-security-critical-projects</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/going-beyond-vibes-with-kusari-inspector</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/government-memo-for-enhancing-the-security-of-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/graph-for-understanding-artifact-composition-guac-adds-persistent-storage-in-v0-6-0-release</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/graph-for-understanding-artifact-composition-guac-joins-openssf-as-incubating-project</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/guac-boosts-license-transparency</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/guac-kubescape</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/guac-v0-1-beta-release</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/hack-proof-ai-supply-chains-using-open-source-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/identity-signing-and-transparency-the-foundation-of-verifiable-builds</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/implementation-phase-threats</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/improving-vulnerability-reachability-and-exploitability-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/integrating-gitlab-and-kusari</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/intern-at-kusari</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/introducing-osps-baseline</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/introducing-the-kusari-platform--know-your-software</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/is-the-internet-on-fire-the-state-of-open-source-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/is-your-supply-chain-haunted-by-cves</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/it-takes-more-than-ai-to-deliver-code-faster</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-and-cncf-advancing-software-supply-chain-security-for-cloud-native-projects</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-inspector-security-insights-where-you-need-them</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-open-sources-spector</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-partners-with-openssf-to-strengthen-open-source-software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-presenting-at-kubecon-and-cloud-native-securitycon-na-2022</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-score</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusari-soaks-up-community-at-fosdem-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/kusaris-software-supply-chain-security-overview</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/meeting-federal-software-supply-chain-mandates</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/not-just-third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/open-source-accelerates-secure-software</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/open-source-summit-2022</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/openssf-tech-talk-recap-using-the-osps-baseline-to-navigate-standards-and-regulations</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/pinning-dependencies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/proactive-security-in-the-post-log4j-era</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/providing-secure-updates-with-tuf</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/quest-to-determine-the-g-in-guac</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/reverse-backdoor-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/rust-wont-fix-everything-moving-toward-a-memory-safe-future</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/secure-design-pledge</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/securing-medical-devices-cyber-threats-sboms-and-fda-premarket-readiness</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/securing-the-maintenance-phase</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/securing-yesterdays-medical-devices-against-cyber-threats-addressing-legacy-medtech</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/securing-your-ai-models</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/security-journey-kusari-platform</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/seed-funding</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/software-is-a-supply-chain-start-treating-it-like-one</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/software-supply-chain-security-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/software-supply-chain-security-predictions-hits-misses-from-2024</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/solving-the-bottom-turtle-problem-in-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/spiffe-spire-csi-driver</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/spooky-enhancements-unveiling-guacs-openvex-feature</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/starting-the-security-journey-producing-an-sbom</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/stop-merging-risky-code</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/supply-chain-security-for-gitops</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/terror-of-curl</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-best-way-to-secure-your-open-source-supply-chain-is-to-participate</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-hidden-cost-of-reactive-appsec</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-hidden-risk-in-your-software-managing-transitive-dependencies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-next-heartbleed</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-next-step-in-the-security-journey-comparing-sboms</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/the-path-to-zero-cves-vanquishing-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/threat-modeling-in-the-software-development-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/to-fork-or-not-to-fork</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/top-10-cra-compliance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/top-5-pull-request-security-risks-every-maintainer-should-know</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/tprm-open-source-addressing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/tprm-open-source-software</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/understanding-prevalence-is-the-first-step</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/understanding-the-proposed-cisa-2025-sbom-minimum-elements</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/understanding-transitive-dependencies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/unpacking-kusari-platform-views</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/unveiling-guac-as-an-openssf-incubating-project-for-software-dependency-management</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/updating-legacy-medical-applications-for-modern-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/using-kusari-platform-to-manage-your-open-source-dependencies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/using-pull-requests-on-a-single-developer-project</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/vibe-coding-is-shipping-vulnerabilities-a-security-teams-guide-to-ai-generated-code-risks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/vulncon-2025-recap</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/what-security-leaders-need-to-know-about-americas-ai-action-plan</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/what-the-nsa-missed-in-its-sbom-management-recommendations</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/why-72-of-organizations-cant-see-their-real-attack-surface-solving-the-transitive-dependency-visibility-gap</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/why-software-cannot-be-secured-by-sboms-alone</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/why-the-eu-cyber-resilience-act-will-catch-us-software-companies-off-guard</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/why-transitive-dependencies-biggest-software-supply-chain-blind-spot-2026</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/xz-backdoor-software-security-lessons</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/you-cant-fix-issues-if-you-cant-find-them</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/blog/youtube-channel-and-guacademy</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/ai-in-2025-generative-tech-robots-and-emerging-risks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/ai-malware-dressed-up-as-deepseek-packages-lurk-in-pypi</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/appsec-in-practice-research-report</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/axios</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/baked-in-security-how-devsecops-can-protect-software-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/be-careful-with-open-source-ai</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cloudnativesecuritycon-2024-seattle</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cloudnativesecuritycon-na-2023-seattle</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cncf-and-kusari-partner-to-strengthen-software-supply-chain-security-across-cloud-native-projects</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cncf-cloud-native-live---guac-101-dip-into-the-delicious-world-of-software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cncf-cloud-native-live---guac-use-cases-beyond-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/codeseccon</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/cybersecurity-summit-new-york</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/dabom-podcast</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/devops-digest</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/devops-exchange-nyc-december-2023-new-york</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/down-the-security-rabbithole-podcast-featuring-kusaris-tim-miller-a-frank-conversation-on-software-manifests</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/fortune-subscription-content</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/fosdem-24-brussels</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/google-backed-guac-cybersecurity-tool-becomes-an-openssf-project</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/guac-joins-openssf-as-incubating-project</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/introducing-kusari-inspector</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/is-an-open-source-ai-vulnerability-next</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kubecon-eu-2024-paris</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kubecon-eu-2024-paris-2</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kubecon-eu-2025-london</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kubecon-na-2024-salt-lake-city</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kubecon-na-2025-atlanta</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-brings-enterprise-grade-ai-code-review-dependency-management-to-cncf-and-openssf-communities</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-debuts-ai-powered-pull-request-security-tool-for-software-supply-chain-protection</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-introduces-new-book-showcases-supply-chain-security-innovations-at-kubecon-eu-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-on-youtube</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-platform-delivers-insights-and-actionable-outcomes-from-software-bill-of-materials-data</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/kusari-platform-enhances-software-supply-chain-security-with-sbom-data</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/lessons-from-the-xz-utils-supply-chain-attack-that-nearly-hacked-the-world</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/meeting-federal-software-supply-chain-mandates</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/more-trust-less-boo-haunt-free-deployments-with-cloudsmith-kusari</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/mt-asks-are-businesses-burying-their-heads-in-the-sand-on-cyber-crime</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/nasdaq-trade-talks-how-privacy-and-security-regulation-is-advancing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/never-drop-the-sbom-why-a-software-bill-of-materials-pays-off</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/new-kusari-research-finds-security-teams-stuck-in-reactive-appsec-as-software-supply-chain-accountability-tightens</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/open-source-project-of-the-week-guac</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/open-source-security-incidents-arent-going-away</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/open-source-summit-na-2023-vancouver</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/open-source-tracking-in-software-supply-chains-with-kusaris-tim-miller</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/openssf-and-lf-europe-collaborate-to-ensure-open-source-compliance-with-laws-like-cra</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/openssf-defines-baseline-for-securing-open-source-software</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/openssf-experts-weigh-in-on-cisas-sbom-minimum-elements-update</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/openssf-guidelines-encourage-oss-developers-to-build-securely</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/openssf-tech-talk-how-to-use-the-open-source-project-security-baseline-to-better-navigate-standards-regulations</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/owasp-supply-chain-security-cheat-sheet-5-key-action-items</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/proactive-supply-chain-security-with-guac</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/protect-your-codebase-the-importance-of-provenance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/regtech-analyst</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/sc-magazine</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/sector</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/securing-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/security-week</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/silicon-angle</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/software-engineering-daily-podcast</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/software-leaders-uncensored</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/software-supply-chain-security-deep-dive-part-1</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/soss-fusion-24-atlanta</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/startup-embeds-ai-security-analysis-in-dev-workflow</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2023-japan</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2023-japan-2</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2024-north-america-1</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2024-north-america-2</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2024-north-america-3</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-2024-north-america-4</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/supplychain-securitycon-at-open-source-summit-na-2023-vancouver</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/techcrunch</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/the-new-frontline-in-devsecops-security-at-the-pull-request</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/vmblog</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/vulncon-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/white-house-supports-open-source-ai</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/why-its-time-to-add-some-guac-to-open-source-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/why-software-supply-chains-matter</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/resource-library/workbench-com</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/case-studies/kusari-on-kusari</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/case-studies/readying-for-the-next-react4shell-with-kusari</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learninghub/ai-model-security-concerns-threats-risks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learninghub/medical-device-cybersecurity-premarket</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learninghub/supply-chain-security-101</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/april-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/august-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/december-2024</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/december-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/february-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/february-2026</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/january-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/january-2026</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/july-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/june-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/march-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/march-2026</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/may-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/november-2024</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/november-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/october-2024</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/october-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/september-2024</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/newsletters/september-2025</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/a</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/access-control</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/ai-code-review</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/api-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/application-security-posture-management-aspm</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/artifact-repository</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/artifact-signing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/attack-surface-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/attestation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/b</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/base-image-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/binary-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/blockchain-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/branch-protection</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/bug-bounty</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/build-automation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/build-provenance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/c</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/cache-poisoning</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/chain-of-custody</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/ci-cd-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/cloud-native-computing-foundation-cncf</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/code-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/code-quality</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/code-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/container-image-scanning</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/container-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/coverage-percentage</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/cryptographic-signing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/cve-system</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/d</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/dependencies-and-provenance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/dependency-management</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/digital-signature</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/e</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/eu-cyber-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/eu-cyber-resilience-act-cra-2025-2027</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/eu-mdr-2017-745</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/f</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/fda-524b-b</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/firmware-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/forensic-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/g</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/gated-check-in</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/gdpr-2016-679</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/governance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/governance-risk-compliance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/granular-access</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/h</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/hardware-security-module-hsm</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/hashing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/helm-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/hermetic-builds</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/hitrust</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/i</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/iec-62304</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/imdrf-cybersecurity-guidance-2020-2022</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/incident-response</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/infrastructure-as-code</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/integrity-verification</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/iso-14971</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/ivdr-2017-746</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/j</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/java-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/jenkins-pipeline-security-2</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/jwt-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/k</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/kernel-protection</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/known-exploitable-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/l</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/least-privilege</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/license-compliance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/log4j</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/logging</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/m</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/mean-time-to-remediate-mttr</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/medical-device-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/medical-device-cybersecurity-premarket-guidance-us-fda-2023</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/medical-device-postmarket-cybersecurity-guidance-us-fda-2016</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/medical-device-software-lifecycle-processes-iec-62304</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/medtech-devsecops</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/metadata-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/n</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/nist-800-171</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/nist-compliance</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/non-repudiation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/npm-attacks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/o</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/open-source-project-security-baseline</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/open-source-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/openssf</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/operational-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/orchestration-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/p</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/package-verification</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/pipeline-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/policy-compliance-rate</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/preventing-attacks</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/prompt-injection-attack</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/prompt-injection-attack-2</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/q</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/quarantine</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/query-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/r</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/react4shell</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/remediation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/remediation-automation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/risk-distribution</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/risk-mitigation</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/runtime-protection</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/s-eb3g8</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/sbom-basics</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/sboms-for-healthcare-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/sdlc-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/secure-coding-practices</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/security-information-and-event-management-siem</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/security-operations-center</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/shai-halud</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/slopsquatting</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/slsa-supply-chain-levels-for-software-artifacts</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/software-composition-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/software-supply-chain-risk-management</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/software-supply-chain-security-101</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/static-analysis</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/t</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/telemetry</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/tokenization</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/transitive-dependencies</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/typosquatting</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/u</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/universal-trust</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/update-management</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/us-fda-cybersecurity-premarket-guidance-2023</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/us-fda-postmarket-cybersecurity-guidance-2016</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/user-behavior-analytics</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/v</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/verification</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/version-control-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/vex---vulnerability-exploitability-exchange</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/vulnerability-landscape</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/w</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/webhook-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/workflow-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/x</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/x-509-certificates</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/xml-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/xz-utils</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/y</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/yaml-security</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/yara-rules</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/z</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/zero-day-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.kusari.dev/learning-center/zero-trust</loc>
    </url>
</urlset>