<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cydenti.com/</loc>
<lastmod>2026-03-30T11:59:57.359Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/</loc>
<lastmod>2026-03-30T11:59:57.359Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/cloud-security-awareness-weekly-week-december-28-2025-january-3-2026/</loc>
<lastmod>2026-01-14T07:02:41.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-rise-of-agentic-ai-understanding-the-autonomous-identity-frontier/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/outcome-based-accountability-the-new-standard-for-digital-operations/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/jurisdiction-matters-ensuring-data-stewardship-in-the-digital-era/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-24-hour-window-preparing-for-modern-incident-reporting-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-4-minute-breakout-why-speed-is-the-only-metric-that-matters/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/beyond-mfa-why-attackers-are-shifting-to-token-based-exploits/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/zero-standing-rights-the-architectural-goal-of-modern-access-control/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/blog-16/</loc>
<lastmod>2026-03-09T11:56:42.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/blog-17/</loc>
<lastmod>2026-03-09T11:56:47.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/managing-intent-how-to-govern-ai-decisions-in-real-time/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/saas-sprawl-and-identity-managing-access-across-disparate-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/why-ai-agents-require-a-new-security-model-beyond-service-accounts/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-financial-cost-of-a-breach-analyzing-the-2026-global-benchmarks/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/digital-autonomy-why-local-control-enhances-business-resilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/hardware-keys-vs-push-mfa-evaluating-phishing-resistant-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/behavioral-baselines-using-intelligence-to-detect-identity-anomalies/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/orphaned-identities-identifying-the-8-leak-in-modern-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/dora-and-identity-a-guide-to-operational-resilience-in-finance/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/a-comprehensive-guide-to-securing-salesforce-identity-posture/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/securing-github-repositories-against-credential-misuse/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/identity-resilience-strategies-for-microsoft-365/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/governing-identity-and-permissions-in-slack-workspaces/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/shadow-ai-explained-how-unvetted-agents-enter-your-productivity-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/managing-high-privilege-access-in-aws-environments/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/ispm-best-practices-for-snowflake-data-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/secure-identity-integration-for-n8n-and-automation-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/dora-ready-identity-audits-for-financial-entities/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/understanding-the-nis2-requirements-for-critical-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/securing-non-human-identities-across-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-agentic-lifecycle-from-deployment-to-secure-offboarding/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/identity-debt-101-understanding-the-hidden-cost-of-stale-permissions/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/the-171-ratio-why-machine-identities-now-dominate-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/dormant-accounts-why-38-of-your-user-list-is-a-security-liability/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/mapping-the-universal-identity-graph-visualizing-cross-cloud-access/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cydenti.com/resources/blogs/personal-liability-and-cybersecurity-understanding-the-loi-rsilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
