<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.jupiterone.com</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/100x-engineering</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/aws-enterprises</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/careers</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/company</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/cyber-asset-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/cyber-therapy</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/events</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-of-terms</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/incident-response</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/industry-financial-services</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/industry-healthcare</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/industry-saas</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/launch-sequence</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/learn-more</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/legal-and-security-hub</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/lower-cloud-spend</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/newsroom</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partners</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/platform</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/press-kit</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/resources</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/riddle-me-this</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/riddle-me-this-boston</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/riddle-me-this-lv</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/riddle-me-this-seattle</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/sbom</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/search</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/security-operations-engineering</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/service-terms</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/solutions</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/team</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/legal-and-security/master-services-agreement</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/legal-and-security/subprocessors</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/legal-and-security/data-processing-addendum</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/legal-and-security/platform-security-addendum</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/continuous-threat-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partner-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partner-deal-registration-wt</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/ask-j1</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/jupiterone-caasm-solution-demo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/try/smarter-with-ai</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/jupiterone-caasm-platform-demo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/webinar-replays/watch</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/j1-vs-axonious</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/stop-wrestling-with-security-data</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/shake-secure-mix-cocktails-master-mcp</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/compliance-uncorked-thanksgiving-pairings-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/caf-ready-cyber-visibility</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/products/ccm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/jupiterone-ccm-demo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/demo-center</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/a-seat-at-the-table-pasta-night-in-cardiff-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/no-phish-just-filet-an-after-hours-fs-isac-dinner-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/newsletter</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/compliance/cmmc</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/building-the-future-of-control-testing-from-manual-evidence-to-continuous-validation</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/compliance/dora</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/jupiterone-evotek-engineer-lunch-learn</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/financial-services</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/thank-you</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/wine-tasting</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/webinar-replays/create-account</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/webinar-replays/login</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/webinar-replays/forgot-password</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/webinar-replays/reset-password</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/locked-loaded-a-night-at-the-range-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/products/ai-asm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/products/uvm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/try/uvm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/contact</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/12-cyber-resilience-questions-for-the-c-suite-and-board</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/12-predictions-2023-security-predictions-panel</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/13-resources-for-cybersecurity-pros-how-to-avoid-burnout</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/16-free-or-open-source-security-and-incident-response-tools-to-try-in-2023</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2019-security-awareness-training-program</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2019-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2020-year-in-review-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2022-lunar-new-year-video-greeting-from-erkang-zheng</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2023-prediction-cloud-security-will-move-beyond-cspm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2023-scar-expands-on-context-and-depth-of-analysis-over-inaugural-report</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/2024-a-year-of-innovation-and-impact</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/25-cybersecurity-conferences-you-should-attend-in-2023</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/25-on-point-cybersecurity-conferences-in-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/3-steps-for-continuous-improvement-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/4-things-every-business-should-do-after-a-public-data-breach</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/5-cybersecurity-risk-assessment-frameworks-to-secure-digital-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/5-essential-tips-for-using-jupiterone-mcp-server</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/6-foundational-tips-for-aws-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/a-data-privacy-day-call-to-arms-the-shared-responsibility-to-protect-customer-data</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/a-fresh-consistent-user-experience-for-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/a-modern-definition-for-cyber-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/a-nation-state-attack-surface-software-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/a-summer-of-awards-for-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/accelerating-cloud-migrations-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/accelerating-incident-response-with-jupiterones-new-insights-dashboards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/achieving-continuous-compliance-with-a-cyber-asset-attack-surface-management-platform</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/ai-is-everywhere-at-rsac-accuracy-is-not</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/attack-surface-and-attack-paths-research-whats-next</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/attack-surface-growth-exceeds-security-team-expansion-at-unmanageable-pace</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/automating-data-classification-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/automating-nuclei-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/azure-access-review-using-optional-traversals-in-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/back-to-basics-why-better-asset-visibility-matters-in-your-security-program</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/best-of-2021-downloads-and-resources</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/best-of-cyber-therapy-season-1</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/better-together-cmdb-cspm-cloud-native-cyber-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/better-together-cybersecurity-asset-management-and-external-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/black-hat-bsides-and-defcon-wrap-up-hacker-summer-camp-2023</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/blind-spots-turn-cybersecurity-into-a-big-data-search-problem</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-1</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-3</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-4</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-5</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-6</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boardroom-conversations-on-security-part-7</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/book-preview-hardening-the-value-stream-by-bryan-finster</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/book-preview-knowledge-without-action-is-a-wasted-opportunity</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/book-preview-reinventing-the-cybersecurity-workforce</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/book-release-modern-cybersecurity-tales-from-the-near-distant-future</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/book-release-reinventing-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/boston-events-recap-aws-reinforce-2022-and-fwdcloudsec</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/brand-mission-vision-values</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/bridge-the-gap-how-the-jupiterone-collector-brings-on-prem-visibility-into-your-security-graph</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/building-a-healthy-cybersecurity-culture</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/building-an-effective-security-program</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/building-streamlined-cyber-risk-assessment-process-using-jira-and-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/building-with-functional-pipeline</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/caasm-and-iam-to-strengthen-your-security-posture</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/caasm-for-the-blue-team</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/caasm-is-officially-a-must-in-your-tech-stack-and-dont-just-take-it-from-us</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/caasm-is-the-future-cspm-is-dead</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/caasm-should-be-an-early-security-investment-in-every-cisos-playbook</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/capital-one-data-breach</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/case-study-auth0-reduces-third-party-cloud-asset-risk-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cisco-investments-splunk-ventures-jupiterone-strategic-investors</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cisco-jupiterone-partnership-beyond-traditional-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/closing-the-software-supply-chain-risk</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cnapp-meets-the-graph-why-cloud-native-security-needs-asset-context</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/compliance-automation-without-coding-how-ai-is-making-continuous-controls-monitoring-a-team-sport</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/compliance-doesnt-matter</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/compliance-is-cumbersome-but-cloud-can-help</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/connect-your-cybersecurity-dots-with-a-graph-database</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cost-savings-or-suck-how-to-turn-the-cloud-into-a-cost-saver</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/covering-your-assets-5-most-common-questions-about-cyber-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cyber-asset-context-is-like-six-degrees-of-kevin-bacon</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cyber-asset-management-what-it-is-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cyber-asset-relationships-matter-analyzing-relationship-mapping</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cyber-assets-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cyber-security-levels</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cybersecurity-doesnt-have-to-suck-lets-fight-cynicism-and-burnout</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cybersecurity-summit-2021-charlotte</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cybersecurity-summit-2021-nashville</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cybersecurity-summit-2021-siliconvalley</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/cybersecurity-summit-2021-spotlight-demo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/data-centric-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/data-visualization-tadpole-viewer-rolled-out-to-all-account</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/de-morgans-law-in-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/deferred-maintenance-cli-tool</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/democratizing-graph-based-security-introducing-starbase</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/design-update-compliance-2-0-app</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/does-your-caasm-capture-transitive-risk-it-really-should</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/dont-be-a-privilege-creep-31-best-practices-for-effective-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/doomed-in-the-cyber-pandemic</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/empowering-security-with-critical-assets-connecting-business-context</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/engineering-spotlight-ben-johnson</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/engineering-spotlight-neal-patel</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/engineering-spotlight-samuel-poulton</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/expanding-attack-surface-and-cybersecurity-alert-fatigue-hinder-cyber-hygiene-basics</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/fast-track-vulnerability-prioritization-with-orca-security-and-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/finding-a-cure-to-the-cyber-breach-pandemic-jupiterone-is-here</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/finding-a-shared-experience-as-an-lgbtq-ally</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/finding-risky-oauth-scopes-in-gsuite</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/fireside-chat-security-as-a-basic-right</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/five-strategic-priorities-for-the-modern-ciso</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/forresters-total-economic-impact-study-jupiterone-yields-332-roi</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/gartner-shares-innovative-tech-for-your-shifting-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/get-easy-answers-complex-questions-ai-natural-language-search-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/github-secrets-management-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/google-cloud-storage-access-analysis</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/got-graph-connect-the-dots-for-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/granted-full-access-to-someone-other-than-the-account-owner</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/greater-visibility-and-faster-incident-response-with-tines-and-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/growing-security-skills-gap-calls-for-a-new-approach-to-training</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/harnessing-the-state-of-cyber-assets-report-to-make-positive-security-changes-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/healthcare-cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/highlights-from-hacker-summer-camp-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/highlights-of-rsac-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/hipaa-versus-gdpr</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-and-why-to-visualize-breaches-with-the-cyber-defense-matrix</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-are-caasm-and-cspm-different</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-ctem-prioritizes-critical-threats-and-safeguards-your-most-valuable-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-cyber-assets-are-like-tribbles</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-jupiterone-simplifies-security-and-compliance-operations-with-amazon-neptune</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-jupiterones-devops-team-uses-caasm-to-understand-service-coupling-deployment-order</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-jupiterones-security-team-manages-meeting-evidence-as-code</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-one-compliance-as-a-service-provider-uses-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-reddit-uses-a-graph-based-cmdb</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-secureworks-observes-unobservable-assets-across-aws-organizations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-automate-meeting-evidence-as-code</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-choose-a-caasm-vendor</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-create-customized-dashboards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-find-rank-and-triage-open-source-dependency-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-get-started-with-it-security-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-identify-critical-assets-in-cybersecurity-to-alleviate-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-improve-attack-surface-visibility-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-map-grc-policies-and-procedures</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-measure-the-cost-of-risk</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-to-visualize-your-data-by-use-case-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/how-we-generate-a-software-bill-of-materials-sbom-with-cyclonedx</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/i-didnt-want-to-be-ciso</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/iam-cspm-vm-ir-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/identify-compromised-versions-of-github-using-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/identifying-avoiding-insider-threats-in-todays-remote-workforce-age-0</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/identity-theft-and-ransomware-changes-in-how-to-secure-software</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/in-2020-did-we-open-a-security-pandoras-box-we-have-yet-to-close</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/infographic-the-state-of-cyber-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/integrations-and-apis-oh-my</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/interview-with-damon-edwards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-compliance-2-0</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-continuous-controls-monitoring</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-continuous-threat-exposure-management-with-jupiterone-and-watchtowr</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-critical-assets-building-blocks-to-secure-your-cyber-asset-crown-jewels</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-insights-dashboards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-jupiterone-stellar-partner-program</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-our-new-chief-revenue-officer-paul-forte</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-the-2022-state-of-cyber-assets-report</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/introducing-the-ask-j1-community</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/investigate-new-toxic-combination-default-common-configurations-in-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/iso-iec-27001-2022-cheap</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/j1-rapid-response-travis-ci-flaw</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/j1-spotlight-kenan-warren-principal-software-engineer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/j1-spotlight-patricia-arnedo-software-engineer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-achieves-1b-valuation-with-70m-series-c-the-next-step-in-our-journey</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-adds-microsoft-365-salesforce-and-google-workspaces-saas-applications-to-integrations-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-adds-orca-security-snyk-qualys-and-veracode-integrations-to-expand-vulnerability-management-capabilities</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-adds-strategic-investors-to-drive-expansion-of-its-innovative-cyber-asset-security-and-governance-platform</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-and-aws-together-help-customers-strengthen-security-posture</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-and-devops-connect-at-rsac-2021</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-and-orca-security-partner-to-improve-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-announces-19m-a-round</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-cares-serving-our-local-communities</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-completes-soc-2-type-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-compliance-dashboard</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-contributes-starbase-to-open-source-community</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-finalist-for-nc-tech-cybersecurity-award</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-founder-named-top-25-cyber-ceo-of-2021</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-named-winner-in-worldfestival-2021-innovation-in-cloud-computing</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-named-winner-of-top-10-ciso-black-unicorn-award</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-participates-in-new-open-cybersecurity-schema-framework-ocsf-industry-initiative</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-press-releases-new-book-cyber-defense-matrix</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-raises-30-million-series-b-led-by-sapphire-ventures</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-reddit-at-rsa</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-splunk-greater-visibility-and-context-to-optimize-security-operations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-takes-home-the-gold-in-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-visual-query-buildervideo-overview-4-minutes</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterone-wins-start-up-of-the-year-at-big-awards-for-business</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/jupiterones-latest-product-release-moves-beyond-cloud-to-support-hybrid-environments-and-modern-enterprise-asset-analysis</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/keeping-security-up-to-the-speed-of-devops</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/launching-the-jupiterone-mcp-server-supercharging-agentic-ai-for-cybersecurity-first-enterprises</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/lessons-from-log4shell-mapping-code-dependencies-and-investigating-code-deployments</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/level-up-kubernetes-security-with-our-new-rule-pack-built-on-the-cis-benchmark</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/log4shell-remediation-visibility-with-jupiterone-and-log4shell-sentinel</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/make-compliance-real-security-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/making-security-a-feature-of-your-saas-tool</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/making-the-case-for-security-budget</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/map-your-cyber-relationship-graph</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/map-your-cybersecurity-gaps-with-the-cyber-defense-matrix</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/marketing-wouldnt-let-me-call-this-before-preaching-stop-punching-yourself</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/metadata-details</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/metrics-that-matter-the-business-context-of-cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/mitigate-cve-risks-faster-with-asset-visibility</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/mitigating-cloud-risks-how-caasm-helps-manage-permissions-and-stop-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/modern-cybersecurity-book-preface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/my-bucket-my-data-or-is-it</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/navigating-cloud-security-posture-management-vendors</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/network-segmentation-visibility-and-third-party-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/new-integrations-gsuite-veracode</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/new-j1-ai-offering-helps-power-unified-cyber-insights-and-drive-security-efficiency</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/new-unified-device-matrix</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/next-gen-cloud-security-posture-management-cspm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/next-gen-cmdb-or-paradigm-shift-caasm-leads-the-way-to-proactive-defense</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/next-stop-in-the-summer-of-jupiterone-cisco-live-and-splunk-conf22</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/no-time-for-secops</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/now-available-jupiterones-public-postman-workspace</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/open-source-compliance-endpoint-and-vulnerability-management-with-fleet</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/optimizing-your-splunk-soar-deployment-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/our-company-retreat-camp-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/out-of-the-box-insights</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/overcoming-the-data-navigation-challenge</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/people-process-technology-podcast</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/people-process-technology-the-missing-factor</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-cya-cover-your-assets-with-chris-roberts</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-new-ideas-new-voices-new-hosts</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-owasp-flagship-projects-episode-01</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-owasp-flagship-projects-episode-02</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-talking-about-caasm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-the-2021-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-the-cyber-defense-matrix</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/podcast-the-infosec-color-wheel-with-jasmine-henry</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/policy-as-code-how-we-do-it</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/potential-cloudfront-s3-takeover-risks</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/preliminary-research-on-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/preparing-your-organization-to-adopt-a-security-practice</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/priming-your-security-operations-for-a-productive-2019</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/prioritizing-exploitable-vulnerabilities-to-protect-your-business-critical-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/project-glasswing-proves-that-just-patch-the-criticals-is-dead</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/query-anywhere</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/quickly-spot-desk-top-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/rapid-response-another-google-chrome-zero-day-exploit</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/rapid-response-finding-npm-libs-colors-and-faker</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/rapid-response-macos-zero-day</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/rapid-response-search-for-malicious-discord-tokens-in-the-npm-repository</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/reach-compliance-75-faster-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/recapping-the-top-new-jupiterone-product-developments-from-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/red-team-go</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/redesigning-the-widget-editor-a-faster-more-intuitive-way-to-visualize-insights</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/reduce-hours-spent-on-cyber-asset-identification-by-85</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/reduce-noise-when-analyzing-user-mfa-status</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/relationships-matter-part-one</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/remediating-security-concerns</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/rsac-2023-things-we-learned</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/say-hello-in-san-francisco-rsac-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/say-hi-to-the-new-jupiterone-and-our-new-products</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/scalable-security-analysis-of-your-aws-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/second-annual-state-of-cyber-assets-report-reveals-growth-in-cyber-asset-value-and-scale</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/secops-an-exercise-in-time-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/secops-breadth-vs-depth-which-wins</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-is-a-basic-right</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-leaders-debate-does-security-awareness-training-work</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-prediction-for-2023-security-teams-will-use-engineering-tools</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-remediation</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-should-fuel-business-growth</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-vs-safety-should-we-reframe-cybersecurity-to-make-it-more-recession-proof</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/security-will-give-up-on-users-as-a-line-of-defense-in-2023</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/shopping-for-dspm-tools-what-to-know-and-where-jupiterone-fits-in</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/sinet-16-awards-winner-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/solving-a-20s-problem-when-the-market-offers-solutions-from-the-90s</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/solving-for-endpoint-compliance-in-a-cloud-first-landscape</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/statisticsinsecurity</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/stop-blaming-the-users</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/stop-stitching-user-data-together-get-a-unified-identity-instead</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/streamline-mac-endpoint-management-with-jamf-integration-for-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/streamlining-workflows-with-jupiterone-and-jira-cloud</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/stunt-kites-and-security-tools</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/summer-of-jupiterone-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-3-biggest-challenges-of-cyber-asset-management-caasm-and-how-to-solve-them</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-absolute-minimum-every-developer-must-know-about-aws-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-debate-should-you-build-or-buy-caasm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-future-of-compliance-is-continuous</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-importance-of-cybersecurity-asset-management-in-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-lastpass-breach-using-jupiterone-to-prioritize-which-users-you-need-to-focus-on</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-next-evolution-of-itam-beyond-cmdb-and-itsm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-path-to-soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-power-of-problem-solving</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-rise-of-security-engineering-cultures-or-mindset</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-summer-of-jupiterone-continues</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-top-10-questions-that-every-engineering-leader-should-be-able-to-answer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-top-11-questions-that-every-ciso-should-be-able-to-answer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-top-5-jupiterone-articles-from-2021</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-ultimate-caasm-guide-2022</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-ultimate-caasm-guide-for-2025</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/the-vulnerability-management-industrial-complex</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/third-party-code-and-supply-chain-security-increase-complexity-and-risk</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/three-dimensional-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/three-dimensional-security-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-5-lessons-in-building-and-scaling-cybersecurity-at-a-cloud-native-startup</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-5-most-creative-booths-we-admired-at-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-5-reasons-your-attack-surface-is-growing-along-with-your-cyber-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-5-things-to-consider-when-selecting-a-cyber-asset-management-solution</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-5-things-to-know-this-cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/top-takeaways-from-the-cyentia-institutes-inaugural-study-of-epss-data-and-performance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/transforming-security-operations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/transitioning-from-vulnerability-management-to-exposure-management-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/turn-10000-appsec-findings-into-10-actual-risks</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/two-truths-and-a-lie-about-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/type-and-go-new-jupiterone-search-bar-enhancements</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/ultra-reliable-dynamic-network-architecture-demands-automated-security</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/understanding-and-accelerating-cybersecurity-mesh-architecture</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/understanding-suspicious-updates-to-aws-managed-policies</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/understanding-the-cyber-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/understanding-the-differences-between-cloud-native-application-protection-platforms-and-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/unencrypted-s3-buckets-containing-cloudtrail-logs</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/unified-device-simplifying-the-complex</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/unlocking-proactive-security-how-okta-and-jupiterone-elevate-iam-insights</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/using-jupiterone-to-find-unqualified-lambda-arns-before-they-cause-a-production-outage</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-evidence-collection-with-the-compliance-app</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-how-to-modify-out-of-the-box-dashboards</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-insights-application-overview</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-managing-grc-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-update-your-vulnerable-npm-packages</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/video-workflows-within-the-j1-compliance-app</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/vulnerability-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/vulnerability-management-tools</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/vulnerability-management-workflow</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/vuls-gitleaks-integrations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/we-turned-off-aws-config</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-does-digital-transformation-mean-for-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-a-modern-cyber-asset</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-a-vulnerability-management-system</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-asset-discovery</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-attack-surface-analysis</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-hitrust</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-nist-csf</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-soc-2-for-cloud-native-platforms</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-is-soc2-compliance</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-to-do-after-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-to-do-if-you-spot-an-unauthorized-member-in-your-google-groups</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/what-you-need-to-know-from-gartner-innovation-insight-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/whats-new-in-jupiterone-powerful-intuitive-queries-part-1</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/whats-new-in-jupiterone-reducing-time-to-value-with-the-new-query-builder-part-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/whats-new-in-kubernetes-security-more-cis-rules-smarter-detection-and-expanded-coverage</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/whats-the-difference-between-attack-surface-management-and-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/when-the-control-plane-becomes-the-battlefield-lessons-from-the-stryker-incident</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-do-compliance-as-code</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-i-joined-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-i-quit-being-a-jupiterone-customer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-it-teams-should-be-using-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-it-teams-should-be-using-jupiterone-part-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-it-teams-should-be-using-jupiterone-part-3</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-jupiterone-security-redefined-the-vendor-security-risk-assessment-process</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-security-practitioners-often-misjudge-risk-to-cyber-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-smart-security-teams-plan-for-caasm-vendor-change</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/why-your-business-needs-cloud-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/you-can-not-secure-what-you-can-not-see</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/blog/your-ai-agents-have-keys-to-the-kingdom-do-you-know-which-ones</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/achieving-full-asset-visibility-how-socotra-gained-control-over-a-growing-and-complex-inventory</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/american-financial-services-company-achieves-actionability-across-vulnerabilities-and-assets-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/auth0</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/aver</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/blend</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/codoxo</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/databricks</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/eagleview-maps-risk-and-identity-across-the-cloud-with-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/how-jupiterone-used-jupiterone-to-power-soc-2-type-2-evidence-collection</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/how-mirriad-strengthened-security-and-compliance-to-support-business-growth</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/indeed</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/liveintent</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/mercury-financial</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/okta</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/case-study/zephyr-ai-overcomes-compliance-hurdles-achieves-drastic-audit-efficiency</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/akash-ganapathi</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/ale-espinosa</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/alex-dyer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/ashleigh-lee</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/austin-kelleher</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/ben-johnson</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/brandon-hoe</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/brandon-hoe-and-james-mountifield</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/brandon-pfeiffer</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/bryan-embrey</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/bryan-finster</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/cameron-griffin</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/caroline-wong</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/carter-hesterman</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/catherine-jobe</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/chad-richts</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/chasen-bettinger</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/chris-doyle</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/chris-hughes</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/chum-wongrassamee</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/colin</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/corey-tomlinson</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/daniel-miessler</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/danielle-schmidt</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/eric-wahlquist</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/erich-smith</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/erin-crawford</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/erkang-zheng</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/george-tang</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/guillaume-ross</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/hema-nair</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/henry-garrett</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/j1-labs</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/james-mountifield</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jasmine-henry</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jayson-jensen</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jeff-whalen</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jeffery-lee</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jenn-cardamone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jennie-duong</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jennifer-czaplewski</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jim-grundner</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/john-le</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jose-ignacio</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/josh-mattox</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/jupiterone-team</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/karson-kalt</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/kenneth-kaye</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/kevin-miller</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/keyaan-williams</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/latha-maripuri</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/mark-miller</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/melissa-pereira</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/michael-knoedel</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/neal-patel</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/nick-dowmon</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/nishant-thorat</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/patrick-morgan</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/rebecca-sanda</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/sarah-hartland</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/sean-catlett</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/sounil-yu</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/steve-king</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/sushila-nair</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/tanvi-tapadia</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/tony-ramirez</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/tyler-shields</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/valerie-zargarpur</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/yolonda-smith</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/author/yvie-djieya</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/access-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/asset-analysis</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/attack-surface-analysis</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cloud-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cloud-native-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/common-vulnerabilities-and-exposures-cve</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/common-weakness-enumeration-cwe</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/configuration-management-database</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/continuous-controls-monitoring</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/continuous-threat-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/critical-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/crown-jewels</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-asset-attack-surface-management-caasm</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-asset-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-hygiene</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/data-breach</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/data-integration</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/devops-continuous-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/digital-operational-resilience-act-dora</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/epss</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/exploitable-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/external-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/governance-risk-and-compliance-grc</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/identity-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/internal-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/model-context-protocol</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/nist</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/privilege-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/security-operations</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/security-posture</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/soc-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/software-bill-of-materials</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/glossary-topics/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partner/aws</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partner/cisco</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/partner/splunk</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/customer-enablement-videos/intro-to-assets</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/customer-enablement-videos/intro-to-assets-part-2</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/customer-enablement-videos/intro-to-insights</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/customer-enablement-videos/intro-to-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/ben-j-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/ben-mayo-cpa-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/brian-skrocki-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/chad-richts-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/james-mountifield-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/kat-walenty-mshrm-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/kevin-tonkin-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/kurt-fisette-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/paul-forte-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.jupiterone.com/personalized-landing-page/reece-rooney-jupiterone</loc>
    </url>
</urlset>