<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.token.security/product</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/company/about</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security</loc>
        <priority>1</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/company/careers</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/resources</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/book-a-demo</loc>
        <priority>1</priority>
    </url>
    <url>
        <loc>https://www.token.security/integrations</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/news</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/non-human-identity-management</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/guides</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/research</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/aws-built-a-security-tool-it-introduced-a-security-risk</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/azures-role-roulette-how-over-privileged-roles-and-api-vulnerabilities-expose-enterprise-networks</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/how-to-discover-prioritize-and-safely-enable-ai-agents</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/iac-ownership---tag-based-approach</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/iam-role-trust-policies-misconfigurations-hiding-in-plain-sight</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/identity-due-diligence-managing-non--human-identity-security-in-an-ma</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/introducing-the-first-nhi-mcp-server-ai-powered-smarter-driving-fast-remediation</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/ip-hardening-in-the-real-world-a-story-from-the-trenches</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/itdr-for-nhis-how-token-security-detects-risky-behaviors-and-materialized-threats</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/new-ai-security-guide-provides-a-maturity-model-for-secure-agentic-ai-adoption</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/nhi-and-the-rise-of-ai-agents-the-security-risks-enterprises-cant-ignore</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/non-human-identity-management</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/offboarded-employees-and-the-non-human-identities-they-leave-behind-the-complete-guide</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/reclaiming-control-over-secrets-correlating-credentials-to-nhis-for-safe-and-automated-remediation</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/salesforce-connected-apps-navigating-nhi-security-risks-and-best-practices</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/salesloft-oauth-breach-via-drift-ai-chat-agent-exposes-salesforce-customer-data</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/secure-cross-account-access-is-tricky-four-common-dangerous-misconceptions</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/securing-agentic-ai-defining-permissions-for-unpredictable-ai-agents</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/securing-agentic-ai-why-everything-starts-with-identity</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/securing-non-human-identities-in-complex-hybrid-multi-cloud-and-agentic-ai-environments</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-10-most-critical-risks-in-non-human-identity-security-management</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-hidden-threats-of-non-human-identities-lessons-from-snowflakes-attack</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-machine-identity-attack-surface---mitre-attack-framework-redefined</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-machine-identity-crisis-navigating-uncharted-waters-in-cloud-identity-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-top-10-identity-centric-security-risks-of-autonomous-ai-agents</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/the-urgency-of-securing-ai-agents--from-shadow-ai-to-governance</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/token-integrates-with-active-directory</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/token-security-extends-identity-governance-to-autonomous-ai-with-ai-agent-identity-lifecycle-management</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/token-security-welcomes-cybersecurity-industry-veterans-rene-bonvanie-and-jesse-rothstein-as-advisors</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/unmasking-ai-agents-how-to-discover-and-manage-identity-in-the-age-of-autonomous-systems</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/what-are-the-hidden-risks-of-custom-gpts-token-security-launches-new-tool-to-help-you-find-them</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/what-is-the-machine-first-identity-security-approach</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/why-anthropics-new-compliance-api-is-a-game-changer-for-secure-agentic-ai-access</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/why-full-non-human-identity-coverage-requires-connecting-to-systems-everyone-else-cant-see</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/why-i-joined-token-security-tackling-the-ai-identity-crisis-no-one-sees-coming</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/why-remediation-is-the-hardest-problem-in-nhi-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/why-we-backed-token-security-securing-non-human-identities-for-the-agentic-ai-era</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/legal/privacy-policy</loc>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://www.token.security/legal/terms-of-use</loc>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/agentic-ai-datasheet</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/anecdotes-success-with-token-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/ebook-blind-spots-to-control-non-human-identity-security-remediation-at-scale</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/ebook-reimagining-non-human-identity-discovery-and-visibility-in-the-age-of-ai</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/identity-first-security-for-ai-agents</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/identity-jedi-show-from-gamer-to-founder---featuring-ido-shlomo-and-david-lee</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/nhi-security-buyers-guide</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/pov-summary</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/secure-ai-guide</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/securing-non-human-identities-and-agentic-ai</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/svci-why-we-invested</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/the-identity-at-the-center-podcast-with-ido-shlomo</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/the-ultimate-non-human-identity-security-guide</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/token-security-one-pager</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/webinar-zero-trust-for-autonomous-agents-extending-identity-first-access-control</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/after-rigorously-evaluating-the-non-human-identity-space-svci-silicon-valley-ciso-investments-chooses-to-back-token-security</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/agentic-ai-demands-identity-governance-now</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/azure-api-vulnerabilities-expose-vpn-keys-and-grant-over-privileged-access-via-built-in-roles</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/azure-api-vulnerabilities-leak-vpn-keys-and-built-in-roles-allow-over-privileged-access</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/azure-api-vulnerability-and-roles-misconfiguration-compromise-corporate-networks</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/extending-zero-trust-to-ai-agents-never-trust-always-verify-goes-autonomous</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/hackers-are-targeting-machine-identities-token-security-just-raised-20m-to-stop-them</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/how-managing-nhis-can-help-teams-secure-ai-agents</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/rethinking-identity-security-in-the-age-of-autonomous-ai-agents</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/securing-agentic-ai-with-intent-based-permissions</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/shlomo-kramer-backed-token-security-emerges-from-stealth-with-7-million</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-and-descope-unite-with-cybersecurity-leaders-to-launch-security-guide-for-agentic-ai-adoption</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-ceo-itamar-apelblat-on-securing-non-human-identities-in-the-age-of-ai-agents</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-emerges-from-stealth-with-7m-introducing-the-machine-first-era-in-identity-security</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-extends-identity-governance-to-autonomous-ai-with-launch-of-ai-agent-identity-lifecycle-management</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-has-been-awarded-the-best-machine-identity-management-award-from-cyber-defense-magazine</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-launches-industrys-first-mcp-server-for-non-human-identity-nhi-security</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-launches-token-research-to-deliver-actionable-insights-into-agentic-ai-security-risks</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-named-one-of-the-top-50-most-promising-startups-of-2025-by-the-information</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-raises-20m-series-a-to-combat-rising-machine-identity-threats</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-raises-20m-to-secure-enterprises-machine-identities----from-legacy-applications-to-ai-agents</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/token-security-unveils-ai-discovery-engine-and-ai-agent-to-secure-the-agentic-future</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/when-ai-agents-join-the-teams-the-hidden-security-shifts-no-one-expects</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/why-non-human-identity-security-is-a-big-data-problem</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/why-we-invested-in-token-security</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/news/zero-trust-has-a-blind-spot--your-ai-agents</loc>
        <priority>0.7</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/agentic-ai-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/ai-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/compliance-and-governance</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/discover-hidden-ai-agents-and-mcp-servers</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/enforce-ai-agent-access-control-and-right-sizing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/ensure-traceability-in-a-multi-agent-ecosystem</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/establish-ai-agent-ownership-and-accountability</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/mergers-and-acquisitions</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/third-party-nhi-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/use-cases/zero-trust-nhi-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/mcp-server-and-ai-agent</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/nhi-discovery-and-visibility</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/nhi-automation-and-remediation</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/nhi-identity-detection-and-response</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/nhi-lifecycle-management</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/product/nhi-security-posture-management</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://www.token.security/assets/webinar-securing-the-ai-first-enterprise</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/2025-a-year-of-momentum-and-innovation-for-token-security</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/a-year-of-protecting-claude-code-the-identity-problem-no-one-was-ready-for</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/agentic-ai-attack-vectors-emerging-threats-and-defense-strategies</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://www.token.security/blog/agentic-ai-lifecycle-management-from-training-to-decommissioning-securely</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/agentic-ai-threat-simulation-predicting-unintended-behaviors-before-they-happen</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/ai-agent-and-identity-verification-securing-the-identities-that-act-on-your-behalf</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/blog-ai-agent-security-fails-identity-configuration-problem</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/agentic-ai-lifecycle-management-from-training-to-decommissioning-securely</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/claude-code-security-is-a-leap-forward-for-application-security-but-who-governs-it</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/cloud-security-challenges-risks-threats-and-ai-driven-complexity</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/cloud-security-compliance-standards-risks-and-identity-first-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/collaborative-ai-agents-securing-multi-agent-networks</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/compliance-and-audit-frameworks-for-agentic-ai-systems</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/cve-2026-21858-when-your-workflow-automation-becomes-an-attack-vector</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/forging-trust-in-agentic-ai-ecosystems-through-identity-and-authorization</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/free-tool-ai-privilege-guardian-right-size-permissions</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/hidden-machine-identity-security-risks-in-ai-agent-architectures</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/how-access-sprawl-emerges-when-tokens-are-treated-as-credentials</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/how-autonomous-systems-expose-gaps-in-identity-governance</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/identity-first-security-architecture-ai-native-enterprises</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/identity-orchestration-for-non-human-identities-in-modern-enterprises</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/inside-the-security-gaps-of-custom-ai-assistants</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/machine-identity-governance-best-practices-for-non-human-entities</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/machine-identity-management-at-scale-risks-gaps-and-the-future-of-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/mitigating-the-gainsight-salesforce-breach-risk</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/over-privileged-tokens</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/owasp-top-10-and-the-identity-first-security-imperative-for-autonomous-ai-agents</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/problem-with-secrets-only-approaches-to-machine-access-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/react-server-components-vulnerability-proper-permissions-make-react-rce-zero-day-a-non-issue</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/scaling-agentic-ai-security-in-cloud-native-environments</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/shadow-ai-is-creating-invisible-access-paths-security-teams-cant-see</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/shadow-ai-to-shadow-access-how-tokens-enable-untracked-ai-behavior</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/short-lived-credentials-token-abuse</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/tagging-identities-with-ai-access-token-security-finds-shadow-ai-in-your-enterprise</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/the-clawdbot-enterprise-ai-risk-one-in-five-have-it-installed</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/the-hidden-security-cost-of-machine-to-machine-trust</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/the-privacy-misconception-in-ai-services</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/the-shift-from-credentials-to-capabilities-in-ai-access-control-systems</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/token-security-2026-ai-agent-identity-security-predictions</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/token-security-mcp-server-discovery-capability-uncovers-hidden-ai-servers-and-secrets</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/transparency-and-explainability-in-agentic-ai-decision-making</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/what-is-cloud-workload-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/when-an-ai-agent-logs-in-a-zero-trust-story-every-ciso-is-now-living</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-access-governance-must-include-tokens-apis-and-agents</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-ai-agent-identity-is-the-new-control-plane-for-enterprise-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-ai-agent-lifecycle-security-must-start-with-identity-not-prompt-filtering</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-cloud-access-audits-fail-token-risk</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-least-privilege-fails-without-visibility-into-token-usage</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-nhi-security-requires-continuous-access-governance-instead-of-static-policies</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-non-human-identities-security-risks-are-rising-in-ai-enterprises</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/why-token-based-access-control-breaks-traditional-iam-assumptions</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/blog/zero-trust-for-machines-how-non-human-identities-fit-in</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/non-human-identity-management/non-human-identity</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/non-human-identity-management/non-human-identity-lifecycle</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/non-human-identity-management/non-human-identity-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/agentic-identity-risks</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/ai-agent-identity-lifecycle-management-and-governance</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/ciso-guide-to-agentic-ai-and-non-human-identity-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/ebook-non-human-identity-challenges-in-mergers-and-acquisitions</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/nhi-security-buyers-guide</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/pov-summary</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/the-ai-security-guide</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/lp/top-10-security-risks-of-autonomous-ai-agents</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/2026-excellence-awards-finalists-announced-winners-revealed-at-rsa-conference</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/agentic-ai-is-an-identity-problem-and-cisos-will-be-accountable-for-the-outcome</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-agent-identity-management-a-new-security-control-plane-for-cisos</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-agents-are-about-to-make-access-control-obsolete</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-agents-are-undermining-sox-and-cisos-are-on-the-hook</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-agents-to-become-most-powerful-identities-this-year</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-agents-to-outnumber-humans-warns-token-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/ai-is-rewriting-compliance-controls-and-cisos-must-take-notice</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/how-ai-agents-are-breaking-traditional-identity-assumptions</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/identity-first-ai-security-why-cisos-must-add-intent-to-the-equation</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/openclaw-ai-runs-wild-in-business-environments</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/over-privileged-ai-agents-are-the-next-enterprise-blind-spot</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/securing-ai-agents-by-default-today-to-prevent-risks-from-unretired-identities-resurfacing-tomorrow</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/securing-the-ai-first-enterprise-access-controls-for-ai-agents-and-non-human-identities</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/shadow-ai-assistant-clawdbot-raises-workplace-risks</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/technewsday-agentic-ai-security-is-broken-token-security-on-identity-intent-guardrails-for-autonomous-agents</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/the-new-frontier-of-identity-security-governing-ai-agent-lifecycles</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-achieves-rapid-growth-in-2025</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-ai-agent-identity-governance-that-cleans-up-machine-identity-messes</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-develops-free-tool-for-organizations-to-assess-ai-agent-risk</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-expands-leadership-team-to-accelerate-go-to-market-and-product-innovation-for-agentic-ai-security</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-named-finalist-in-two-categories-of-the-2026-sc-awards</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-top-10-finalist-for-rsac-2026-innovation-sandbox-contest</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/token-security-warns-of-widespread-clawdbot-use-inside-enterprises</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/why-ai-governance-needs-separate-models-for-internal-and-external-agents</loc>
        <priority>0.8</priority>
    </url>
<url>
        <loc>https://www.token.security/news/zero-trust-isnt-optional-anymore--its-your-ai-agent-fire-drill</loc>
        <priority>0.8</priority>
    </url>
</urlset>