<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://spektion.com</loc>
    </url>
    <url>
        <loc>https://spektion.com/demo</loc>
    </url>
    <url>
        <loc>https://spektion.com/company</loc>
    </url>
    <url>
        <loc>https://spektion.com/contact</loc>
    </url>
    <url>
        <loc>https://spektion.com/terms</loc>
    </url>
    <url>
        <loc>https://spektion.com/privacy</loc>
    </url>
    <url>
        <loc>https://spektion.com/user</loc>
    </url>
    <url>
        <loc>https://spektion.com/platform</loc>
    </url>
    <url>
        <loc>https://spektion.com/customers</loc>
    </url>
    <url>
        <loc>https://spektion.com/partners</loc>
    </url>
    <url>
        <loc>https://spektion.com/runtime-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://spektion.com/third-party-software-risk</loc>
    </url>
    <url>
        <loc>https://spektion.com/runtime-intelligence</loc>
    </url>
    <url>
        <loc>https://spektion.com/use-case/vulnerability-prioritization</loc>
    </url>
    <url>
        <loc>https://spektion.com/use-case/zero-day-defense</loc>
    </url>
    <url>
        <loc>https://spektion.com/resources</loc>
    </url>
    <url>
        <loc>https://spektion.com/blog</loc>
    </url>
    <url>
        <loc>https://spektion.com/video-library</loc>
    </url>
    <url>
        <loc>https://spektion.com/news</loc>
    </url>
    <url>
        <loc>https://spektion.com/use-case/detect-risk-beyond-cves</loc>
    </url>
    <url>
        <loc>https://spektion.com/use-case/manage-ai-exposure</loc>
    </url>
    <url>
        <loc>https://spektion.com/runtime-assurance-for-ai-coded-apps</loc>
    </url>
    <url>
        <loc>https://spektion.com/careers</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/ai-citizen-development-security-risks</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/ai-generated-code-security</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/assess-third-party-software-security</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/beyond-cves-pdf-editors</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/beyond-lolbas</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/claude-and-the-hidden-risk-of-end-user-ai</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/ctem-program-visibility-gaps</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/cve-2026-25866-fixed</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/dora-ict-third-party-risk</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/executable-memory-pages</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/exposure-management-vs-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/multiagent-security-checklist</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/named-most-innovative-in-runtime-exposure-management</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/negative-seven-days-when-cves-become-a-trailing-indicator</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/not-all-vuln-scanner-findings-matter</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/notepad-plus-plus-supply-chain-failures</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/patch-management-vs-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/public-directory-blind-spot</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/real-time-risk-clarity</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/runtime-behavioral-intelligence</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/runtime-definition-in-vuln-management</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/runtime-monitoring-detect-pipes</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/same-cve-different-risk</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/spektion-emerges-from-stealth</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/supply-chain-attacks-without-cves</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/tampering-with-macos-tcc</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/the-continuous-runtime-exposure-management-platform</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/the-cve-shaped-hole-in-the-industrys-mythos-response</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/third-party-guidance-financial-institutions</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/unquoted-path-flaw</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/unused-software</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/vuln-management-hasnt-evolved</loc>
    </url>
    <url>
        <loc>https://spektion.com/articles/vulnerability-management-paradox</loc>
    </url>
    <url>
        <loc>https://spektion.com/guides/how-runtime-vulnerability-detection-works-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://spektion.com/guides/what-is-runtime-vulnerability-management-rvm</loc>
    </url>
    <url>
        <loc>https://spektion.com/white-paper/how-to-transform-vulnerability-management-with-runtime-intelligence</loc>
    </url>
    <url>
        <loc>https://spektion.com/podcast/episode1</loc>
    </url>
    <url>
        <loc>https://spektion.com/podcast/episode2</loc>
    </url>
    <url>
        <loc>https://spektion.com/job-descriptions/senior-backend-developer</loc>
    </url>
</urlset>