<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.scapien.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/excellent-penetration-tester/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/single-pane-of-glass-verified-risk/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/ai-powered-pentesting/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/noise-vs-signal-vulnerability-management/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/ctem-continuous-threat-exposure-management/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/identity-exposure-iam-drift/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/limits-of-automated-exploit-detection/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/compliance-mapping-dora-nist-iso/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/why-detection-and-alerts-fail/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/when-is-a-breach-material/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/security-risk-management/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/cvss-scores/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/vulnerability-scanning-vs-pentesting/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/attack-surface-management/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/risk-quantification/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.scapien.com/resources/concept-explainers/zero-trust-architecture/</loc>
		<lastmod>2026-05-09T06:11:09+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->