<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.breachlock.com/</loc>
  <lastmod>2024-01-21T11:31:46+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/pentesting-services/</loc>
  <lastmod>2024-01-21T12:25:35+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/breachlock-platform/</loc>
  <lastmod>2024-01-21T12:25:36+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/ptaas/</loc>
  <lastmod>2024-01-21T13:34:22+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/attack-surface-management/</loc>
  <lastmod>2024-01-21T13:34:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/red-teaming-as-a-service/</loc>
  <lastmod>2024-01-21T13:34:25+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/what-is-cyber-security-validation/</loc>
  <lastmod>2024-01-21T13:01:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/breachlock-ai-technology/</loc>
  <lastmod>2024-01-21T13:34:29+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/penetration-testing-service/</loc>
  <lastmod>2024-01-21T13:02:28+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/breachlock-pricing/</loc>
  <lastmod>2024-01-21T13:34:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/our-story/</loc>
  <lastmod>2024-01-21T13:34:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/</loc>
  <lastmod>2024-01-21T13:00:51+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/careers/</loc>
  <lastmod>2024-01-21T13:00:15+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/partner-deals/</loc>
  <lastmod>2024-01-21T13:34:35+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/contact/</loc>
  <lastmod>2024-01-21T13:34:36+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/schedule-a-discovery-call/</loc>
  <lastmod>2024-01-21T13:34:38+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/clients/</loc>
  <lastmod>2024-01-21T12:25:15+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/application-penetration-testing/</loc>
  <lastmod>2024-01-21T13:03:54+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/web-application-pen-testing/</loc>
  <lastmod>2024-01-21T13:34:41+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/api-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:43+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/network-penetration-testing/</loc>
  <lastmod>2024-01-21T13:02:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/mobile-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:45+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/thick-client-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:46+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/cloud-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:47+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/devops-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/iot-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:50+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/products/social-engineering/</loc>
  <lastmod>2024-01-21T13:03:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/pci-dss-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/hipaa-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:53+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/gdpr-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:55+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/iso-27001-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/soc2-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:57+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/crest-penetration-testing/</loc>
  <lastmod>2024-01-21T13:34:59+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/nist-penetration-testing/</loc>
  <lastmod>2024-01-21T13:35:00+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/compliance/vendor-assessment/</loc>
  <lastmod>2024-01-21T13:35:02+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/</loc>
  <lastmod>2024-01-21T12:14:21+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-faq/</loc>
  <lastmod>2024-01-21T13:35:04+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news-press/</loc>
  <lastmod>2024-01-21T12:49:16+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/</loc>
  <lastmod>2024-01-21T13:00:13+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/privacy-policy/</loc>
  <lastmod>2024-01-21T12:14:14+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/terms-of-use/</loc>
  <lastmod>2024-01-21T13:35:09+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-continuous-threat-exposure-management-program/</loc>
  <lastmod>2024-01-21T11:37:21+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-select-a-pentesting-as-a-service-provider/</loc>
  <lastmod>2024-01-21T11:36:29+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/10-benefits-of-attack-surface-management-asm-for-enterprises/</loc>
  <lastmod>2024-01-21T11:36:57+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-attack-surface-management/</loc>
  <lastmod>2024-01-21T11:36:56+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-as-a-service-ptaas-why/</loc>
  <lastmod>2024-01-21T11:37:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/ai-penetration-testing-and-the-future-of-devsecops/</loc>
  <lastmod>2024-01-21T11:37:44+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/seemant-sehgal/</loc>
  <lastmod>2024-01-21T13:12:16+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/himanshu-nautiyal/</loc>
  <lastmod>2024-01-21T13:01:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/mitchel-koster/</loc>
  <lastmod>2024-01-21T13:35:22+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/ann-chesbrough/</loc>
  <lastmod>2024-01-21T13:01:54+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/vijay-venkataraman/</loc>
  <lastmod>2024-01-21T11:36:24+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/juriaan-karsten/</loc>
  <lastmod>2024-01-21T13:01:59+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/shravan-kumar-konthalapally/</loc>
  <lastmod>2024-01-21T13:35:27+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/christopher-clark/</loc>
  <lastmod>2024-01-21T13:02:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/vishal-verma/</loc>
  <lastmod>2024-01-21T13:35:29+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/mastering-application-security-your-sdlc-roadmap/</loc>
  <lastmod>2024-01-21T11:34:26+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/web-application-penetration-testing-checklist/</loc>
  <lastmod>2024-01-21T12:03:52+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-fix-xss-vulnerabilities-on-web-app-links/</loc>
  <lastmod>2024-01-21T11:34:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/navigating-api-security-with-owasp-top-10-api-security-risks/</loc>
  <lastmod>2024-01-21T11:35:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/why-network-penetration-testing-is-critical-for-security/</loc>
  <lastmod>2024-01-21T11:35:41+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/navigating-nist-csf/</loc>
  <lastmod>2024-01-21T11:35:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-the-mobile-application-security-verification-standard-masvs/</loc>
  <lastmod>2024-01-21T11:35:56+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/understanding-thick-client-application-penetration-testing/</loc>
  <lastmod>2024-01-21T11:35:13+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-security-on-google-cloud/</loc>
  <lastmod>2024-01-21T11:35:29+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/7-steps-to-improve-iot-security/</loc>
  <lastmod>2024-01-21T13:35:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/security-awareness-and-phishing-security-testing/</loc>
  <lastmod>2024-01-21T11:35:08+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/phishing-as-a-service/</loc>
  <lastmod>2024-01-21T11:35:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/pci-dss-4-0-and-penetration-testing-what-you-need-to-know/</loc>
  <lastmod>2024-01-21T11:35:54+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/cloud-pentesting-for-pci-dss-compliance/</loc>
  <lastmod>2024-01-21T11:35:54+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/a-comprehensive-guide-on-hipaa-compliance/</loc>
  <lastmod>2024-01-21T11:34:20+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/understanding-gdpr/</loc>
  <lastmod>2024-01-21T11:34:45+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-for-gdpr/</loc>
  <lastmod>2024-01-21T11:34:44+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-iso-27001/</loc>
  <lastmod>2024-01-21T11:36:11+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/iso-270022022-control-5-23-information-security-for-use-of-cloud-services/</loc>
  <lastmod>2024-01-21T11:36:11+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/breachlock-is-crest-pen-test-certified/</loc>
  <lastmod>2024-01-21T11:36:15+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/nist-cybersecurity-framework-2-0-paving-the-future-of-information-security/</loc>
  <lastmod>2024-01-21T11:36:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-third-party-risk-management-tprm/</loc>
  <lastmod>2024-01-21T11:36:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-solarwinds-hack-and-the-arrival-of-software-supply-chain-attacks/</loc>
  <lastmod>2024-01-21T11:35:57+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-15-cybersecurity-trends-to-watch-out-for-in-2024/</loc>
  <lastmod>2024-01-21T11:35:11+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/automated-pentesting-and-red-teaming-a-powerful-approach-for-stronger-cybersecurity/</loc>
  <lastmod>2024-01-21T11:35:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/why-ptaas-is-gaining-momentum-over-traditional-pentesting/</loc>
  <lastmod>2024-01-21T11:35:13+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/beyond-the-firewall-unmasking-hidden-threats-through-internal-network-penetration-testing/</loc>
  <lastmod>2024-01-21T11:35:20+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/video-press/</loc>
  <lastmod>2024-01-21T13:35:59+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-recognized-as-fast-mover-in-2023-gigaom-ptaas-radar-report/</loc>
  <lastmod>2024-01-21T11:35:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-mentioned-in-new-gartner-emerging-tech-impact-radar-security-report-for-exposure-management/</loc>
  <lastmod>2024-01-21T13:12:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-named-most-innovative-in-penetration-testing-in-the-top-infosec-innovator-awards-for-2023/</loc>
  <lastmod>2024-01-21T13:36:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-named-pentesting-solution-provider-of-the-year-in-7th-annual-cybersecurity-breakthrough-awards/</loc>
  <lastmod>2024-01-21T13:36:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-penetration-testing-intelligence-report-2023-reveals-critical-insights-from-thousands-of-penetration-tests/</loc>
  <lastmod>2024-01-21T13:36:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-recognized-in-2023-gartner-hype-cycle-for-application-security-report/</loc>
  <lastmod>2024-01-21T11:35:30+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-modern-pen-testing-improves-cybersecurity-risk-management/</loc>
  <lastmod>2024-01-21T11:37:38+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-owasp-top-10-framework/</loc>
  <lastmod>2024-01-21T13:12:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/get-set-for-external-attack-surface-management-easm-breachlock/</loc>
  <lastmod>2024-01-21T11:38:20+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/manual-pentesting-versus-automated-pentesting-explained/</loc>
  <lastmod>2024-01-21T11:36:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/see-external-threats-with-easm-platform/</loc>
  <lastmod>2024-01-21T11:38:17+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-digital-supply-chain-breaches-of-2022/</loc>
  <lastmod>2024-01-21T13:36:22+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/5-reasons-to-avoid-traditional-pentesting/</loc>
  <lastmod>2024-01-21T11:37:59+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-does-penetration-testing-help-with-compliance/</loc>
  <lastmod>2024-01-21T11:38:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-tools-for-automated-security-testing/</loc>
  <lastmod>2024-01-21T11:37:59+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/difference-between-soc-1-and-soc-2/</loc>
  <lastmod>2024-01-21T13:36:24+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-controls-for-iso-27001/</loc>
  <lastmod>2024-01-21T11:37:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-as-a-service/</loc>
  <lastmod>2024-01-21T13:36:27+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/automated-penetration-testing-a-myth-or-reality/</loc>
  <lastmod>2024-01-21T13:36:28+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/automated-penetration-testing-tools/</loc>
  <lastmod>2024-01-21T13:12:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/devsecops-best-practices/</loc>
  <lastmod>2024-01-21T11:36:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/decode-black-box-grey-box-and-white-box-in-pentesting/</loc>
  <lastmod>2024-01-21T13:28:02+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-cross-site-scripting-xss-and-how-can-you-fix-it/</loc>
  <lastmod>2024-01-21T11:36:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/nist-cybersecurity-framework-compliance/</loc>
  <lastmod>2024-01-21T11:56:07+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-nist-penetration-testing/</loc>
  <lastmod>2024-01-21T13:36:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/introduction-to-penetration-testing/</loc>
  <lastmod>2024-01-21T13:15:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/cloud-based-application-security-testing-challenges/</loc>
  <lastmod>2024-01-21T13:36:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-in-cloud/</loc>
  <lastmod>2024-01-21T13:36:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/soc-2-certification-for-your-saas-company/</loc>
  <lastmod>2024-01-21T13:36:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/vendor-risk-management-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:36:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/security-awareness-basics-for-your-devops/</loc>
  <lastmod>2024-01-21T11:36:58+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-test-your-incident-response-using-red-teaming/</loc>
  <lastmod>2024-01-21T13:36:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/third-party-penetration-testing-basics/</loc>
  <lastmod>2024-01-21T13:36:38+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/pci-dss-asv-scanning-explained-for-dummies/</loc>
  <lastmod>2024-01-21T13:36:39+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-security-rule-simplified/</loc>
  <lastmod>2024-01-21T13:36:41+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-compliance-for-aws-hosted-saas/</loc>
  <lastmod>2024-01-21T13:36:42+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-controls-for-nydfs/</loc>
  <lastmod>2024-01-21T11:36:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/iso-27001-certification-for-a-saas-company/</loc>
  <lastmod>2024-01-21T11:37:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/assuring-the-cia-triad-in-pentesting/</loc>
  <lastmod>2024-01-21T13:36:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/pci-dss-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:36:46+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-5-open-source-osint-tools/</loc>
  <lastmod>2024-01-21T12:57:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/cybersecurity-risk-assessment/</loc>
  <lastmod>2024-01-21T11:50:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-20-it-security-breaches-in-2022/</loc>
  <lastmod>2024-01-21T11:37:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/5-common-attacks-against-web-applications/</loc>
  <lastmod>2024-01-21T11:36:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/maze-ransomware/</loc>
  <lastmod>2024-01-21T11:36:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-2023-gigaom-ptaas-radar-report-breachlock-named-market-leader-and-fast-mover/</loc>
  <lastmod>2024-01-21T11:36:49+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/gartner-emerging-tech-impact-radar-security-report-breachlock-and-exposure-management/</loc>
  <lastmod>2024-01-21T11:36:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cloud-penetration-testing/pentesting-in-cloud-and-hybrid-environments/</loc>
  <lastmod>2024-01-21T13:36:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/zombie-apis/</loc>
  <lastmod>2024-01-21T11:36:56+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/ultimate-api-pentesting-checklist-from-breachlock/</loc>
  <lastmod>2024-01-21T13:13:19+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/embracing-change-googles-move-to-reduce-tls-certificate-lifespans/</loc>
  <lastmod>2024-01-21T11:36:57+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-apis-can-cause-a-breach/</loc>
  <lastmod>2024-01-21T11:36:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/what-is-api-penetration-testing/</loc>
  <lastmod>2024-01-21T11:36:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/key-findings-from-breachlock-pentesting-intelligence-report-2023/</loc>
  <lastmod>2024-01-21T11:36:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-gray-box-penetration-testing/</loc>
  <lastmod>2024-01-21T11:36:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/xaas-a-paradigm-shift-in-business-services/</loc>
  <lastmod>2024-01-21T13:37:02+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-a-black-box-pen-test/</loc>
  <lastmod>2024-01-21T13:37:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/uncovering-cve-2023-3519-critical-remote-code-execution-vulnerability-in-citrix-adc/</loc>
  <lastmod>2024-01-21T13:37:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-white-box-penetration-testing/</loc>
  <lastmod>2024-01-21T13:37:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/t-mobile-hacked-via-api-security-breach/</loc>
  <lastmod>2024-01-21T13:37:06+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/can-chatgpt-help-with-pen-testing-can-it-perpetrate-cybercrimes/</loc>
  <lastmod>2024-01-21T13:37:07+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/breachlock-pen-testing-as-a-service-ptaas-recognized-as-a-leader-by-reuters/</loc>
  <lastmod>2024-01-21T11:38:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/breachlock-founder-ceo-on-offensive-security-at-cybersecurity-ventures/</loc>
  <lastmod>2024-01-21T13:37:09+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/breachlock-inc-saas-platform/</loc>
  <lastmod>2024-01-21T13:37:09+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/2023-gartner-hype-cycle-reports-security-operations-xaas/</loc>
  <lastmod>2024-01-21T13:37:11+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/close-security-gaps-with-continuous-threat-exposure-management/</loc>
  <lastmod>2024-01-21T13:37:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/improving-cyber-resilience-with-continuous-threat-exposure-management/</loc>
  <lastmod>2024-01-21T13:37:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/why-cisos-are-shifting-to-penetration-testing-as-a-service-ptaas/</loc>
  <lastmod>2024-01-21T13:37:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-unveils-rtaas-solution-enhancing-red-teaming-services-for-global-clients/</loc>
  <lastmod>2024-01-21T13:37:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/evolve-your-security-testing-with-pen-testing-as-a-service-in-2023/</loc>
  <lastmod>2024-01-21T13:37:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/firewall-penetration-testing-explained-breachlock/</loc>
  <lastmod>2024-01-21T12:59:16+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/integrating-owasp-zap-in-devsecops-pipeline/</loc>
  <lastmod>2024-01-21T13:37:36+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-named-sample-vendor-for-penetration-testing-as-a-service-ptaas-in-gartner-hype-cycle-for-security-operations-2022-and-2021-for-2-years-in-a-row/</loc>
  <lastmod>2024-01-21T13:37:37+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/gdpr-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:37:38+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-and-penetration-testing-part-ii/</loc>
  <lastmod>2024-01-21T13:37:39+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-requirements-for-pci-dss/</loc>
  <lastmod>2024-01-21T11:38:09+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-cited-in-2023-gartner-how-to-select-devsecops-tools-for-secure-software-delivery-report/</loc>
  <lastmod>2024-01-21T13:37:41+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/dast-v-sast-which-one-is-better/</loc>
  <lastmod>2024-01-21T13:37:42+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-at-devsecops-speed/</loc>
  <lastmod>2024-01-21T13:37:43+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-penetration-testing/</loc>
  <lastmod>2024-01-21T13:37:44+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/ethical-hacking-vs-pen-testing-whats-the-difference/</loc>
  <lastmod>2024-01-21T11:39:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/importance-of-black-box-penetration-testing-in-application-security/</loc>
  <lastmod>2024-01-21T13:32:02+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-security-rule-for-dummies/</loc>
  <lastmod>2024-01-21T13:37:46+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-requirements-for-nist-sp-800-53/</loc>
  <lastmod>2024-01-21T11:42:33+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/10-questions-to-ask-your-penetration-testing-service-provider/</loc>
  <lastmod>2024-01-21T13:37:48+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/introduction-to-devsecops/</loc>
  <lastmod>2024-01-21T13:37:49+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-for-pci-dss/</loc>
  <lastmod>2024-01-21T13:37:49+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-compliance-on-aws-cheatsheet/</loc>
  <lastmod>2024-01-21T13:37:50+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/hipaa-and-penetration-testing-part-i/</loc>
  <lastmod>2024-01-21T13:37:51+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/breachlock-guide-on-nydfs-cybersecurity-regulation/</loc>
  <lastmod>2024-01-21T13:37:52+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-vulnerability-scanners-for-cybersecurity-professionals/</loc>
  <lastmod>2024-01-21T13:37:52+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/uber-breach/</loc>
  <lastmod>2024-01-21T13:37:53+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-sql-injection-sql/</loc>
  <lastmod>2024-01-21T13:37:54+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-11-step-pen-test-plan/</loc>
  <lastmod>2024-01-21T12:06:32+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/understanding-your-penetration-testing-quote/</loc>
  <lastmod>2024-01-21T13:37:55+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-manage-vulnerabilities-in-your-external-asset-inventory/</loc>
  <lastmod>2024-01-21T13:37:56+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-identify-vulnerabilities-on-the-attack-surface-with-easm/</loc>
  <lastmod>2024-01-21T13:37:58+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-cybersecurity-framework-works-best-for-penetration-testing/</loc>
  <lastmod>2024-01-21T13:05:35+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-api-penetration-testing/</loc>
  <lastmod>2024-01-21T13:23:38+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/recommended-online-platform-for-testing-ssl-tls-and-the-latest-vulnerabilities/</loc>
  <lastmod>2024-01-21T13:38:03+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-releases-set-see-external-threats-for-external-attack-surface-management/</loc>
  <lastmod>2024-01-21T13:38:03+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-best-practices-to-improve-vulnerability-identification/</loc>
  <lastmod>2024-01-21T13:38:04+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/5-ways-to-strengthen-your-vulnerability-management-program-now/</loc>
  <lastmod>2024-01-21T13:38:06+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/the-basics-of-penetration-testing/</loc>
  <lastmod>2024-01-21T13:38:07+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/types-of-application-security-testing/</loc>
  <lastmod>2024-01-21T13:38:08+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/third-party-security-breach-is-ubers-third-breach-in-6-months/</loc>
  <lastmod>2024-01-21T13:38:09+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/your-api-security-is-calling-you/</loc>
  <lastmod>2024-01-21T13:38:10+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-releases-api-penetration-testing-service-to-improve-api-security-testing-for-companies/</loc>
  <lastmod>2024-01-21T13:38:11+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/videos/devsecops-ready-dast-and-penetration-testing-by-breachlock/</loc>
  <lastmod>2024-01-21T13:38:13+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/a-web-application-security-scanner-dast-sast-iast-rasp/</loc>
  <lastmod>2024-01-21T13:38:28+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/3-opensource-tools-for-dast/</loc>
  <lastmod>2024-01-21T13:38:29+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/fisma-penetration-testing/</loc>
  <lastmod>2024-01-21T13:38:30+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/cybersecurity-checklist-for-saas-applications/</loc>
  <lastmod>2024-01-21T13:38:30+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/web-application-security-testing-basics/</loc>
  <lastmod>2024-01-21T13:38:31+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-of-an-aws-based-application/</loc>
  <lastmod>2024-01-21T13:38:32+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/why-is-breachlock-the-best-penetration-testing-as-a-service-for-saas-companies/</loc>
  <lastmod>2024-01-21T13:38:33+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/ransomware-new-gangs-and-strains/</loc>
  <lastmod>2024-01-21T13:38:34+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/red-teaming-as-a-service-what-it-is-and-what-it-should-do/</loc>
  <lastmod>2024-01-21T13:38:34+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-wins-cybersecurity-excellence-award-for-pentest-as-a-service-ptaas/</loc>
  <lastmod>2024-01-21T13:38:35+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/5-hr-data-security-best-practices/</loc>
  <lastmod>2024-01-21T13:38:36+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/penetration-testing-as-a-service/</loc>
  <lastmod>2024-01-21T13:38:37+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/introduction-to-penetration-testing/</loc>
  <lastmod>2024-01-21T13:38:39+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/10-questions-to-ask-your-penetration-testing-service-provider/</loc>
  <lastmod>2024-01-21T13:38:40+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/hipaa-security-rule-simplified/</loc>
  <lastmod>2024-01-21T13:38:41+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/pci-dss-compliance/penetration-testing-and-vulnerability-scanning-for-pci-dss/</loc>
  <lastmod>2024-01-21T13:38:42+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/penetration-testing-for-iso-27001-control-a-12-6-1/</loc>
  <lastmod>2024-01-21T13:38:43+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/vulnerability-assessment-and-penetration-testing-in-aws-for-soc-2-compliance/</loc>
  <lastmod>2024-01-21T13:38:45+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/nydfs/breachlock-guide-on-nydfs-cybersecurity-regulation/</loc>
  <lastmod>2024-01-21T13:38:46+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cloud-penetration-testing/what-is-cloud-based-application-security-testing/</loc>
  <lastmod>2024-01-21T13:38:50+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/pci-dss-compliance/pci-dss-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:38:51+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/network-penetration-test/network-penetration-testing-fundamentals/</loc>
  <lastmod>2024-01-21T13:38:52+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/hipaa-and-penetration-testing-part-ii/</loc>
  <lastmod>2024-01-21T13:38:54+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/vulnerability-assessment-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:38:55+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/10-step-guide-for-making-your-aws-application-compliant-with-pci-dss/</loc>
  <lastmod>2024-01-21T13:38:56+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/penetration-testing-in-cloud/</loc>
  <lastmod>2024-01-21T13:38:56+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/penetration-testing-of-apis-and-microservices/</loc>
  <lastmod>2024-01-21T11:39:43+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/hipaa-and-penetration-testing-part-i/</loc>
  <lastmod>2024-01-21T11:39:09+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/how-to-choose-a-web-application-security-scanner/</loc>
  <lastmod>2024-01-21T13:39:00+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/security-testing-for-web-applications/</loc>
  <lastmod>2024-01-21T13:39:01+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/dast-things-you-should-know/</loc>
  <lastmod>2024-01-21T13:39:02+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/preventing-cyber-attacks-in-2022-strategy-must-haves/</loc>
  <lastmod>2024-01-21T13:39:02+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/penetration-testing-and-vulnerability-scanning-controls-for-ccpa/</loc>
  <lastmod>2024-01-21T13:39:03+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cloud-penetration-testing/penetration-testing-and-security-on-google-cloud/</loc>
  <lastmod>2024-01-21T11:37:04+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/gdpr/gdpr-and-penetration-testing/</loc>
  <lastmod>2024-01-21T11:40:00+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/penetration-testing-of-an-aws-based-application/</loc>
  <lastmod>2024-01-21T11:40:02+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-recognized-for-cyber-security-leadership-in-reuters-50-leaders-of-change/</loc>
  <lastmod>2024-01-21T11:40:02+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/osint-penetration-testing/top-5-open-source-osint-tools/</loc>
  <lastmod>2024-01-21T11:38:59+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/devsecops/introduction-to-devsecops/</loc>
  <lastmod>2024-01-21T11:39:45+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-recognized-cyber-security-testing-reuters/</loc>
  <lastmod>2024-01-21T11:40:11+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/hipaa-compliance-on-aws-cheatsheet/</loc>
  <lastmod>2024-01-21T11:39:03+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/dummies-guide-to-aws-penetration-testing-i/</loc>
  <lastmod>2024-01-21T11:40:13+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/devsecops/penetration-testing-and-devops/</loc>
  <lastmod>2024-01-21T11:40:10+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-appoints-brent-plow-as-vp-of-sales-positioning-company-to-accelerate-growth-initiatives/</loc>
  <lastmod>2024-01-21T11:40:12+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/vulnerability-assessment-and-penetration-testing/</loc>
  <lastmod>2024-01-21T12:46:36+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/best-penetration-testing-toolstop-picks/</loc>
  <lastmod>2024-01-21T11:40:22+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/pentest-vendor-retention-or-rotation-what-is-the-right-approach/</loc>
  <lastmod>2024-01-21T11:40:20+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/penetration-testing-market-to-grow-at-a-cagr-of-13-1-through-2031/</loc>
  <lastmod>2024-01-21T11:40:19+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/the-basics-of-penetration-testing/</loc>
  <lastmod>2024-01-21T11:39:29+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/why-network-penetration-testing-is-critical-for-security/</loc>
  <lastmod>2024-01-21T13:39:16+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/pentesting-at-the-forefront-of-offensive-security/</loc>
  <lastmod>2024-01-21T13:39:17+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/manual-pentesting-versus-automated-pentesting-explained/</loc>
  <lastmod>2024-01-21T13:39:19+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/iso-270022022-control-5-23-information-security-for-use-of-cloud-services/</loc>
  <lastmod>2024-01-21T11:37:50+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/uber-breach/</loc>
  <lastmod>2024-01-21T13:39:20+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/dast-dynamic-application-security-testing/top-vulnerability-scanners-for-cybersecurity-professionals/</loc>
  <lastmod>2024-01-21T13:39:21+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/what-is-the-difference-between-vulnerability-scans-and-pen-tests/</loc>
  <lastmod>2024-01-21T13:39:21+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/benefits-of-dast-testing-for-application-security/</loc>
  <lastmod>2024-01-21T13:39:24+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/does-the-ccpa-require-penetration-testing/</loc>
  <lastmod>2024-01-21T13:39:25+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/phishing-as-a-service/what-is-open-source-intelligence-and-how-is-it-used/</loc>
  <lastmod>2024-01-21T13:39:25+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/top-cybersecurity-statistics-for-2022/</loc>
  <lastmod>2024-01-21T13:39:26+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/seemant-sehgal-recognized-as-10-inspiring-entrepreneurs-in-2022/</loc>
  <lastmod>2024-01-21T13:39:27+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/how-does-penetration-testing-help-with-compliance/</loc>
  <lastmod>2024-01-21T13:39:28+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/top-5-penetration-testing-services-for-application-network-security/</loc>
  <lastmod>2024-01-21T13:39:28+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/what-is-penetration-testing/</loc>
  <lastmod>2024-01-21T13:39:30+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-selects-new-ciso-marielle-nigg-droog/</loc>
  <lastmod>2024-01-21T13:39:31+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/sql-injection-xss-vulnerabilities-continue-to-plague-organizations/</loc>
  <lastmod>2024-01-21T13:39:32+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/seemant-sehgal-interview-on-dotcom-magazine/</loc>
  <lastmod>2024-01-21T13:39:33+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-awarded-as-2022-impact-company-of-the-year/</loc>
  <lastmod>2024-01-21T13:39:33+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/web-application-security/preventing-cyber-attacks-in-2022-strategy-must-haves/</loc>
  <lastmod>2024-01-21T13:39:34+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/f5-big-ip-vulnerability-cve-2022-1388-advisory/</loc>
  <lastmod>2024-01-21T13:39:37+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/1-penetration-test-is-worth-100-vulnerbility-scan/</loc>
  <lastmod>2024-01-21T13:39:37+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/cybersecurity-risk-assessment/</loc>
  <lastmod>2024-01-21T13:39:38+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/are-we-witnessing-a-great-resignation-wave-or-the-beginning-of-a-revolution-in-cybersecurity/</loc>
  <lastmod>2024-01-21T13:39:40+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/decode-black-box-grey-box-and-white-box-in-pentesting/</loc>
  <lastmod>2024-01-21T13:39:41+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/5-reasons-why-penetration-testing-should-be-a-top-priority-for-your-business/</loc>
  <lastmod>2024-01-21T13:39:43+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/automated-penetration-testing-manual-or-both-what-works-best/</loc>
  <lastmod>2024-01-21T13:39:44+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/pioneering-penetration-as-a-service-platform-ptaas-breachlock-is-approved-for-penetration-testing-services-by-crest/</loc>
  <lastmod>2024-01-21T13:39:45+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-releases-annual-pentest-intel-report-breachlock/</loc>
  <lastmod>2024-01-21T13:39:46+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/fedramp-penetration-testing-requirements/</loc>
  <lastmod>2024-01-21T13:39:48+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/most-innovative-penetration-testing-solutions-provider-2021/</loc>
  <lastmod>2024-01-21T13:39:51+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/himanshu-nautiyal-successfully-disrupting-traditional-security-testing/</loc>
  <lastmod>2024-01-21T13:39:52+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cybersecurity/log4shell-the-log4j-vulnerability-cve-2021-44228/</loc>
  <lastmod>2024-01-21T13:39:53+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/dast-dynamic-application-security-testing/vulnerability-scanning-top-5-best-practices/</loc>
  <lastmod>2024-01-21T13:39:54+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/vendor-risk-management-and-penetration-testing/</loc>
  <lastmod>2024-01-21T13:39:54+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/top-devsecops-innovator-for-2021/</loc>
  <lastmod>2024-01-21T13:39:55+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-3-red-teaming-frameworks-tiberaasecbest/</loc>
  <lastmod>2024-01-21T12:53:31+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/fedramp-penetration-testing-requirements/</loc>
  <lastmod>2024-01-21T13:39:58+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-named-sample-vendor-for-penetration-testing-as-a-service-in-gartner-hype-cycle-for-security-operations-2021/</loc>
  <lastmod>2024-01-21T13:39:58+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/third-party-penetration-testing-basics/</loc>
  <lastmod>2024-01-21T13:39:59+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/pen-testing-as-a-service-ptaas-what-it-is-and-what-it-should-do/</loc>
  <lastmod>2024-01-21T13:40:00+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/can-automated-pentesting-fix-cybersecuritys-human-capital-issue/</loc>
  <lastmod>2024-01-21T13:40:02+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/about/leadership/marielle-nigg-droog/</loc>
  <lastmod>2024-01-21T13:40:04+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cloud-penetration-testing/top-5-open-source-tools-for-network-vulnerability-scanning/</loc>
  <lastmod>2024-01-21T13:39:17+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/annual-penetration-testing-v-continuous-monitoring/</loc>
  <lastmod>2024-01-21T13:40:06+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/5-cybersecurity-lessons-from-the-solarwinds-breach/</loc>
  <lastmod>2024-01-21T13:40:07+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/breachlock-was-featured-in-a-tech-round-article/</loc>
  <lastmod>2024-01-21T13:40:08+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/cybersecurity/are-free-pci-asv-scans-possible/</loc>
  <lastmod>2024-01-21T13:40:09+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/who-needs-pci-asv-scans-and-why/</loc>
  <lastmod>2024-01-21T13:40:09+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/hipaa-compliance-for-aws-hosted-saas/</loc>
  <lastmod>2024-01-21T13:40:12+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/gdpr/penetration-testing-and-vulnerability-scanning-for-gdpr/</loc>
  <lastmod>2024-01-21T11:36:17+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/dast-dynamic-application-security-testing/automated-retest-for-dast-penteration-test/</loc>
  <lastmod>2024-01-21T13:40:13+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/uncategorized/automated-retest-for-external-infrastructure/</loc>
  <lastmod>2024-01-21T13:40:13+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/dast-dynamic-application-security-testing/security-awareness-basics-for-your-devops/</loc>
  <lastmod>2024-01-21T13:40:14+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/phishing-as-a-service/top-3-red-teaming-frameworks-tiberaasecbest/</loc>
  <lastmod>2024-01-21T13:40:15+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/devsecops-best-practices-for-vulnerability-scanning/</loc>
  <lastmod>2024-01-21T13:40:16+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/phishing-as-a-service/how-to-test-your-incident-response-using-red-teaming/</loc>
  <lastmod>2024-01-21T13:40:17+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/support/integrate-trello-with-breachlock-saas-platform/</loc>
  <lastmod>2024-01-21T13:40:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/10-hot-penetration-testing-companies-to-watch-in-2022/</loc>
  <lastmod>2024-01-21T13:40:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/network-penetration-test/why-should-your-company-implement-http-strict-transport-security-or-hsts/</loc>
  <lastmod>2024-01-21T13:40:19+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/web-application-security/information-disclosure-issues-in-web-applications/</loc>
  <lastmod>2024-01-21T13:40:20+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/web-application-security/crlf-injection-and-http-response-splitting-vulnerability/</loc>
  <lastmod>2024-01-21T13:40:21+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/nist-800-171-penetration-testing-and-vulnerability-scanning/</loc>
  <lastmod>2024-01-21T13:40:23+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/web-application-security/shellshock-bash-remote-code-execution-vulnerability-explained/</loc>
  <lastmod>2024-01-21T13:40:24+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/seemant-sehgal-introducing-game-changing-innovations-in-security-testing/</loc>
  <lastmod>2024-01-21T13:40:25+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/phishing-as-a-service/benefits-of-phishing-simulations/</loc>
  <lastmod>2024-01-21T13:40:25+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/hitrust-compliance-for-dummies/</loc>
  <lastmod>2024-01-21T13:40:26+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/hipaa/pci-dss-compliance-for-saas-companies-an-overview/</loc>
  <lastmod>2024-01-21T13:40:27+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/aws-penetration-testing/soc-2-certification-for-your-saas-company/</loc>
  <lastmod>2024-01-21T13:40:28+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/success-story-of-cyber-security-entrepreneur-mr-seemant-sehgal/</loc>
  <lastmod>2024-01-21T13:40:29+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/why-is-breachlock-the-best-penetration-testing-as-a-service-for-saas-companies/</loc>
  <lastmod>2024-01-21T13:40:30+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/fisma-penetration-testing/</loc>
  <lastmod>2024-01-21T13:40:30+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/news/and-in-this-corner-fighting-out-of-new-york-city-is-breachlocks-seemant-sehgal/</loc>
  <lastmod>2024-01-21T13:40:31+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/penetration-testing-as-a-service-ptaas-why/</loc>
  <lastmod>2024-01-21T11:38:59+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/penetration-testing-as-a-service/agile-security-devops/</loc>
  <lastmod>2024-01-21T13:40:33+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/pci-dss-compliance-for-saas-companies-an-overview/</loc>
  <lastmod>2024-01-21T13:40:34+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/10-step-guide-for-making-your-aws-application-compliant-with-pci-dss/</loc>
  <lastmod>2024-01-21T13:40:35+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/what-is-the-difference-between-vulnerability-scans-and-pen-tests/</loc>
  <lastmod>2024-01-21T13:40:37+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/top-5-open-source-tools-for-network-vulnerability-scanning/</loc>
  <lastmod>2024-01-21T11:37:26+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/blog/agile-security-testing-process/</loc>
  <lastmod>2024-01-21T13:40:38+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.breachlock.com/resources/application-security-testing/agile-security-testing-for-applications-the-way-forward/</loc>
  <lastmod>2024-01-21T13:40:38+00:00</lastmod>
  <priority>0.09</priority>
</url>


</urlset>