<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://go.cycode.com/7-github-security-controls</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2021-04-14</lastmod></url><url><loc>https://go.cycode.com/fixing-hardcoded-secrets-ondemand</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Imported%20images/Cycode_logo.svg</image:loc><image:caption>Cycodelogo</image:caption><image:title>Cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-cover-3-1.jpg</image:loc><image:caption>webinarcover31</image:caption><image:title>webinarcover31</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Webinar%20(1).png</image:loc><image:caption>Webinar1</image:caption><image:title>Webinar1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/ronen.png</image:loc><image:caption>ronen</image:caption><image:title>ronen</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/andrew-1.png</image:loc><image:caption>andrew1</image:caption><image:title>andrew1</image:title></image:image><lastmod>2022-10-29</lastmod></url><url><loc>https://go.cycode.com/prevent-code-tampering-ondemand</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2021-02-11</lastmod></url><url><loc>https://go.cycode.com/supplychainsec</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Book%20Cover%20-%20KC%20-%20Software%20Supply%20Chain%20Security_%20Don%E2%80%99t%20Get%20Your%20Code%20Tampered.webp</image:loc><image:caption>BookCoverKCSoftwareSupplyChainSecurityDontGetYourCodeTampered</image:caption><image:title>BookCoverKCSoftwareSupplyChainSecurityDontGetYourCodeTampered</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/cycodes-expert-panel-rethinking-your-source-code-security-strategy</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/panelist%20(3).png</image:loc><image:caption>panelist3</image:caption><image:title>panelist3</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/expert%20panel%20(1).png</image:loc><image:caption>expertpanel1</image:caption><image:title>expertpanel1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/text%20top.png</image:loc><image:caption>texttop</image:caption><image:title>texttop</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/background.png</image:loc><image:caption>background</image:caption><image:title>background</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/under.png</image:loc><image:caption>under</image:caption><image:title>under</image:title></image:image><lastmod>2020-12-28</lastmod></url><url><loc>https://go.cycode.com/sdlcmistakes</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2022-04-28</lastmod></url><url><loc>https://go.cycode.com/3-recent-supply-chain-attacks</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2021-03-31</lastmod></url><url><loc>https://go.cycode.com/top15sourcecodeleaks</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20Top%2015%20Most%20Important%20Source%20Code%20Leaks%20of%202020%20&amp;%202021-1.jpg</image:loc><image:caption>CycodeTop15MostImportantSourceCodeLeaksof202020211</image:caption><image:title>CycodeTop15MostImportantSourceCodeLeaksof202020211</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cover-2.png</image:loc><image:caption>Cover2</image:caption><image:title>Cover2</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-light.svg</image:loc><image:caption>logolight</image:caption><image:title>logolight</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/esg-code-leakage-report</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cover%20-%20Modern%20Development%20Practices%20Open%20the%20Door%20for%20Code%20Leakage.webp</image:loc><image:caption>CoverModernDevelopmentPracticesOpentheDoorforCodeLeakage</image:caption><image:title>CoverModernDevelopmentPracticesOpentheDoorforCodeLeakage</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/landing%20cats/ar.svg</image:loc><image:caption>ar</image:caption><image:title>ar</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/ESG-Logo-1.svg</image:loc><image:caption>ESGLogo1</image:caption><image:title>ESGLogo1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20Modern%20Development%20Practices%20Open%20the%20Door%20for%20Code%20Leakage.jpg</image:loc><image:caption>CycodeModernDevelopmentPracticesOpentheDoorforCodeLeakage</image:caption><image:title>CycodeModernDevelopmentPracticesOpentheDoorforCodeLeakage</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://go.cycode.com/githubondemand</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Webinar%20(1).png</image:loc><image:caption>Webinar1</image:caption><image:title>Webinar1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-GitHub-2.webp</image:loc><image:caption>webinarGitHub2</image:caption><image:title>webinarGitHub2</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/alex.png</image:loc><image:caption>alex</image:caption><image:title>alex</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Imported%20images/Cycode_logo.svg</image:loc><image:caption>Cycodelogo</image:caption><image:title>Cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-GitHub-1.png</image:loc><image:caption>webinarGitHub1</image:caption><image:title>webinarGitHub1</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/simplesdlc</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Compliance_WebinarCover.webp</image:loc><image:caption>ComplianceWebinarCover</image:caption><image:title>ComplianceWebinarCover</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Webinar%20(1).png</image:loc><image:caption>Webinar1</image:caption><image:title>Webinar1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/orion-1.png</image:loc><image:caption>orion1</image:caption><image:title>orion1</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://go.cycode.com/foundationalrole</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20Top%2015%20Most%20Important%20Source%20Code%20Leaks%20of%202020%20&amp;%202021-1.jpg</image:loc><image:caption>CycodeTop15MostImportantSourceCodeLeaksof202020211</image:caption><image:title>CycodeTop15MostImportantSourceCodeLeaksof202020211</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/The%20Foundational%20Role%20of%20Security%20and%20Governance%20in%20the%20Software%20Supply%20Chain.png</image:loc><image:caption>TheFoundationalRoleofSecurityandGovernanceintheSoftwareSupplyChain</image:caption><image:title>TheFoundationalRoleofSecurityandGovernanceintheSoftwareSupplyChain</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-light.svg</image:loc><image:caption>logolight</image:caption><image:title>logolight</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/cloudinfrastructureconfiguration</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cloud_infrastructure.png</image:loc><image:caption>cloudinfrastructure</image:caption><image:title>cloudinfrastructure</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-light.svg</image:loc><image:caption>logolight</image:caption><image:title>logolight</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/IDC%20-%20Cloud%20Infrastructure%20Configuration%20Is%20a%20Critical%20Component%20of%20a%20Holistic%20Secure%20Software%20Supply%20Chain%20Strategy%EF%BB%BF.jpg</image:loc><image:caption>IDCCloudInfrastructureConfigurationIsaCriticalComponentofaHolisticSecureSoftwareSupplyChainStrategy</image:caption><image:title>IDCCloudInfrastructureConfigurationIsaCriticalComponentofaHolisticSecureSoftwareSupplyChainStrategy</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/2021-software-supply-chain-security-priorities-survey</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%202021%20software%20supply%20chain%20security%20priorities%20survey-3.jpg</image:loc><image:caption>Cycode2021softwaresupplychainsecurityprioritiessurvey3</image:caption><image:title>Cycode2021softwaresupplychainsecurityprioritiessurvey3</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cover%20Image.png</image:loc><image:caption>CoverImage</image:caption><image:title>CoverImage</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://go.cycode.com/4-keys-video</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2021-08-05</lastmod></url><url><loc>https://go.cycode.com/gartner2021</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20How%20Software%20Engineering%20Leaders%20Can%20Mitigate%20Software%20Supply%20Chain%20Security%20Risks-2.jpg</image:loc><image:caption>CycodeHowSoftwareEngineeringLeadersCanMitigateSoftwareSupplyChainSecurityRisks2</image:caption><image:title>CycodeHowSoftwareEngineeringLeadersCanMitigateSoftwareSupplyChainSecurityRisks2</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/path3345.svg</image:loc><image:caption>path3345</image:caption><image:title>path3345</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cover-1.png</image:loc><image:caption>Cover1</image:caption><image:title>Cover1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><lastmod>2022-11-04</lastmod></url><url><loc>https://go.cycode.com/infrastructure-as-code-security-webinar</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-cover-1.jpg</image:loc><image:caption>webinarcover1</image:caption><image:title>webinarcover1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Webinar%20(1).png</image:loc><image:caption>Webinar1</image:caption><image:title>Webinar1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-light.svg</image:loc><image:caption>logolight</image:caption><image:title>logolight</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Orion_Edited_sqaure-150x150.jpg</image:loc><image:caption>OrionEditedsqaure150x150</image:caption><image:title>OrionEditedsqaure150x150</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/amnon.png</image:loc><image:caption>amnon</image:caption><image:title>amnon</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/secretsmgmt</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/secrets-thumb.png</image:loc><image:caption>secretsthumb</image:caption><image:title>secretsthumb</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/analyst-research.svg</image:loc><image:caption>analystresearch</image:caption><image:title>analystresearch</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://go.cycode.com/github</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/logo-2.png</image:loc><image:caption>logo2</image:caption><image:title>logo2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://go.cycode.com/frameworks</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Ellipse-101-2.png</image:loc><image:caption>Ellipse1012</image:caption><image:title>Ellipse1012</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/tony.png</image:loc><image:caption>tony</image:caption><image:title>tony</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20Google%20SLSA%20&amp;%20NIST%20SSDF_%20Emerging%20Software%20Supply%20Chain%20Security%20Best%20Practices-1.webp</image:loc><image:caption>CycodeGoogleSLSANISTSSDFEmergingSoftwareSupplyChainSecurityBestPractices1</image:caption><image:title>CycodeGoogleSLSANISTSSDFEmergingSoftwareSupplyChainSecurityBestPractices1</image:title></image:image><lastmod>2022-06-07</lastmod></url><url><loc>https://go.cycode.com/securitycontrols</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/julie.png</image:loc><image:caption>julie</image:caption><image:title>julie</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/cycode_logo.png</image:loc><image:caption>cycodelogo</image:caption><image:title>cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-SecurityTeams.webp</image:loc><image:caption>webinarSecurityTeams</image:caption><image:title>webinarSecurityTeams</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Webinar%20(1).png</image:loc><image:caption>Webinar1</image:caption><image:title>Webinar1</image:title></image:image><lastmod>2022-05-11</lastmod></url><url><loc>https://go.cycode.com/code-tampering-4-keys-ondemand</loc><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Imported%20images/Cycode_logo.svg</image:loc><image:caption>Cycodelogo</image:caption><image:title>Cycodelogo</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/andrew-1.png</image:loc><image:caption>andrew1</image:caption><image:title>andrew1</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/ronen.png</image:loc><image:caption>ronen</image:caption><image:title>ronen</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/Cycode%20-%20Code%20Tampering%204%20Keys%20to%20Risk%20Reduction.jpg</image:loc><image:caption>CycodeCodeTampering4KeystoRiskReduction</image:caption><image:title>CycodeCodeTampering4KeystoRiskReduction</image:title></image:image><image:image><image:loc>https://6224488.fs1.hubspotusercontent-na1.net/hubfs/6224488/webinar-cover-2.jpg</image:loc><image:caption>webinarcover2</image:caption><image:title>webinarcover2</image:title></image:image><lastmod>2022-08-02</lastmod></url></urlset>