<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.obsidiansecurity.com/itdr</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/prevent-saas-configuration-drift</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/stop-token-compromise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/prevent-saas-spearphishing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/detect-threats-pre-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/manage-shadow-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/govern-app-to-app-data-movement</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/manage-excessive-privileges-in-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/automate-saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/technology</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/partners</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource-center</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news-and-press</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/careers</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/what-is-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/responsible-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/contact</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/search</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/saas-security-threat-report</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/complimentary-risk-assessment-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/how-to-build-an-effective-saas-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-identitaten-im-visier</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/10-bewahrte-praktiken-zur-sicherung-von-saas-identitaten</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/how-to-adopt-a-unified-saas-security-solution</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/wie-nis2-und-dora-die-saas-compliance-beeinflussen</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/how-nis2-and-dora-impact-saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/how-to-secure-your-snowflake-environment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/five-ways-attackers-are-targeting-your-saas-identities</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/10-best-practices-for-securing-saas-identities</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/gain-practical-tips-to-safeguard-your-saas-against-mounting-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-security-guide-for-financialservices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/operationalize-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/obsidian-security-saas-threat-landscape-2023</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-security-guide-healthcare</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/comprehensive-guide-to-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/guide-to-salesforce-integration-risk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/demo-vereinbaren</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/demo-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/contact-us-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/assessment-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/partners-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/de-risking-innovation-safely-adopting-genai-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/best-practices-how-elevatebio-navigates-saas-security-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/privacy-compliance-in-north-america-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/tackling-third-party-risks-in-saas-integrations-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/navigating-the-saas-landscape-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/what-is-session-hijacking-a-technique-used-by-lapsus-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/mid-market</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/mid-market-shadow-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/obsidian-security-get-started-for-free</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/obsidian-security-mid-market-contact</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/free-phishing-detection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/free-genai-and-shadow-saas-detection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-security-insights-from-the-frontlines-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customers</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/trial</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/pricing-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/trial-thank-you</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/company</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/why-saas-security-posture-management-sspm-is-essential</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/get-started</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-phishing-detection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/prompt-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/gen-ai-data-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/genai-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/complete-cybersecurity-ai-checklist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/browser-security-in-the-age-of-ai-ebook</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/sspm-saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/trust</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/sitemap</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/free-risk-assessment-for-salesforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/saas-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/n8n</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/microsoft-copilot</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/salesforce-agentforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-security-demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/youre-building-ai-obsidian-secures-it</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/every-supply-chain-breach-starts-with-an-unseen-connection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/obsidian-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/platform-overview</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/obsidian-connectors</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/obsidian-integrations-hub</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/reviews</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/openai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/chatgpt</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/stop-saas-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/breach-clarity-across-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/access-violations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/secure-ai-agents-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/discover-and-secure-shadow-saas-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/discover-and-secure-shadow-ai-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/secure-saas-supply-chain-end-to-end-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/stop-direct-logins-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/remove-excessive-priviledge-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/stop-saas-account-takeover-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/prove-breach-impact-across-saas-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/vertex</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/microsoft-azure-ai-foundry</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/amazon-bedrock</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/platform/data-that-matters</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/platform/network-effects</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent/claude-code</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/shadow-ai-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/aispm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/govern-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/mcp-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent-runtime-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-agent-visibility</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/ai-agent-visibility-demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/ai-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/lp/see-and-secure-all-ai-end-to-end</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog-categories/ai-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog-categories/data-science-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog-categories/saas-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/143k-claude-copilot-chatgpt-chats-publicly-accessible-were-you-exposed</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/16-billion-passwords-leaked-online</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/2025-breach-landscape-inside-the-year-of-the-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/5-security-assumptions-ai-agents-break</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/achieve-192-roi-with-obsidian-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/agentic-security-platform-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/ai-agent-visibility-demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/ai-agents-are-running-your-business</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/allianz-data-leaked-in-major-wave-of-salesforce-attacks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/anthropic-ai-used-by-nation-state-hackers-to-automate-and-scale-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/bearer-tokens-explained-the-hidden-risk-behind-your-ai-agent-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/behind-the-breach-malicious-attack-on-cyberhavens-chrome-extension-developer-team</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/best-practices-webinar-saas-compliance-regulated-industries</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/best-practices-webinar-saas-spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/best-practices-webinar-sspm-bigger-picture</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/best-practices-webinar-what-is-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/bigcommerce-enhances-saas-threat-detection-with-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/boost-your-security-teams-productivity-with-obsidian-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/breaking-down-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/ciso-webinar-ai-agent-security-blueprint-for-ungoverned-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/claude-code-sign-up</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/complete-app-coverage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/continuous-saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/databricks-brief</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/demo-vereinbaren</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/discover-and-secure-shadow-ai-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/discover-and-secure-shadow-saas-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/enterprise-security-layer-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/extend-your-saas-security-coverage-introducing-obsidian-community-sdk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/extend-your-security-teams-with-obsidian-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/fireside-saas-check-up-strategies-for-combating-saas-threats</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/five-security-steps-for-copilot-studio</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/free-risk-assessment-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/genai-cybersecurity-checklist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/hold-cisco-tradecraft-podcast-sspm-with-ben-johnson</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/how-sigma-computing-secures-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/how-to-build-an-effective-saas-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/how-to-deploy-runtime-security-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/how-to-secure-saas-against-emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/how-to-secure-your-snowflake-environment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/identify-and-mitigate-saas-session-hijacking</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/identity-ai-and-the-saas-supply-chain-the-next-security-reckoning</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/identity-threat-prevention-brief</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/inheriting-access-no-one-is-watching</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/inside-t-mobiles-work-with-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/interim-security-guidance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/itdr-stop-every-attack-targeting-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/malicious-browser-extensions-infect-2-3-million-users</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/nydfs-cybersecurity-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-secure-ai-agent-demo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-available-on-the-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-customer-alert-on-malicious-chrome-extension</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-customer-alert-on-risky-ai-assistant-clawdbot</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-customer-alert-on-salesforce-gainsight-data-breach</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-for-saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-vs-abnormal</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/obsidian-security-vs-proofpoint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/prevent-and-detect-threats-to-your-slack-environment-with-obsidian-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/prevent-oauth-abuse-in-saas-environment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/product-webinar-ai-agent-security-from-discovery-to-runtime</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/prove-breach-impact-across-saas-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/remove-excessive-priviledge-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/rethink-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/runtime-governance-of-the-invisible-ai-workforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-backdoors-the-risks-of-oauth-integrations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-incident-response</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-security-posture-management-sspm-checklist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-security-standards-program-join</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-security-threat-report-2025</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/saas-supply-chain-security-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/scattered-spider-now-targeting-airlines-and-transportation-fbi-warns-of-imminent-data-theft</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/secure-ai-agents-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/secure-and-govern-ai-agents-in-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/secure-saas-supply-chain-end-to-end-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/secure-your-browser-based-workplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/secure-your-saas-and-ai-integrations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/security-where-you-need-it-most</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/see-and-secure-all-ai-end-to-end</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/servicenow-vulnerability-exposes-sensitive-data-to-unauthorized-users</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/shadow-saas-management-brief</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/shinyhunters-breach-workday-in-latest-salesforce-attack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/snowflake-secures-saas-with-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/sspm-eliminate-risk-across-saas-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/sspm-guide-to-saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/sspm-the-obsidian-way</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/start-your-journey-to-safer-saas-today-with-a-customized-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/stop-ai-agent-threats-before-they-trigger</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/stop-direct-logins-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/stop-saas-account-takeover-webinar</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/t-mobile-case-study</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/take-control-of-your-ai-usage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/taming-the-unknown-of-saas-security-a-discussion-of-the-challenges</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/techniques-of-saas-compromise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/the-elements-of-comprehensive-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/the-obsidian-security-platform-total-protection-for-your-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/the-three-pillars-of-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/third-party-saas-integration-risk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/unc6040-breaches-saas-apps-at-google-and-other-major-companies</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/unc6040-vishing-targets-salesforce-for-data-theft</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/what-is-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/what-is-saas-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/what-is-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/resource/zero-trust-security-for-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/2020-the-year-of-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/2025-nydfs-deadlines-expose-saas-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/a-guide-to-saas-supply-chain-solutions</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/a-practical-guide-to-handling-unauthorized-access-to-snowflake</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/accelerate-your-security-operations-with-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/access-token-vs-refresh-token-key-differences-explained</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/account-takeover-ato-attacks-explained</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/adversarial-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/adversarial-prompt-engineering</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-market-landscape</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-monitoring-tools</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-protection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-security-framework</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-security-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agent-toxic-risk-combinations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-agents-security-tools-cant-see</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-application-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-data-poisoning</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-exploits</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-guardrails</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-pentesting-tools</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-red-teaming-services</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-risk-mitigation</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-risk-repository</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-safety-benchmarks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-automation</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-governance-framework</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ai-security-testing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/aispm-market-guide</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/an-open-letter-to-the-saas-industry</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/anatomy-of-a-phish</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/architecture-gap-agent-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/are-your-servicenow-lists-publicly-exposing-data</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-cross-tenant-impersonation-in-okta</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-malicious-attack-on-cyberhavens-chrome-extension-developer-team</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-mfa</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-pass-the-cookie-attack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-phishing-token-compromise-saas-environments</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-self-service-password-reset-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-breach-shinyhunters-2026-voice-phishing-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/behind-the-shield-cracking-the-limits-of-okta-fastpass</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/better-oauth-security-for-core-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/building-an-ethical-ai-framework</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/butcher-shop-phishing-campaign-targets-organizations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/circleci-and-token-threat-integration-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/closing-the-saas-security-coverage-gap</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/cloud-detection-and-response-deepdive</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/consent-phishing-how-oauth-attacks-bypass-mfa-and-traditional-security-controls</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/continuous-saas-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/cps-230-impact-on-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/credential-theft-vs-token-theft</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/custom-alerts</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platform</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/cybersecurity-for-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/cybersecurity-in-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/data-guardianship-data-inventories-and-data-mappings</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/defeat-fake-captcha-attacks-from-the-source</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/demystifying-okta-aitm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/detecting-aitm-phishing-sites-with-fuzzy-hashing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/detecting-blocking-tycoons-latest-aitm-phishing-kit</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/dissecting-real-world-help-desk-social-engineering-attacks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/emerging-identity-threats-the-muddy-waters-of-residential-proxies</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/extending-zero-trust-to-your-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/feature-highlight-the-obsidian-app-kit</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/fighting-account-bloat-and-identity-sprawl</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/five-challenges-of-workday-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/fortify-okta-against-session-token-compromise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/from-dns-takeover-to-org-admin-secondary-attacks-on-atlassian-cloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/from-saas-sprawl-to-a-knowledge-graph</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/from-well-known-to-well-pwned-common-vulnerabilities-in-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/gartner-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/genai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/growth-of-saas-security-astrophysical-perspective</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/healthy-remote-work</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-do-attackers-bypass-email-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-obsidian-integrates-with-next-gen-siem</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-build-ai-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-build-your-dynasty-hire-for-passion-train-for-skill-coach-for-performance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-choose-a-security-vendor-for-enterprise-scale</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-enact-a-saas-compliance-strategy-for-nis2-and-dora</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-think-about-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/how-to-use-client-ip-addresses-in-okta-audit-logs</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/hr-system-compromise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/identity-governance-non-employee-access</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/identity-threat-prevention-email-security-vs-in-browser-detections</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/innovationsandboxfinalist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/inside-t-mobiles-work-with-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/introducing-obsidian-integration-risk-management</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/javascript-arrow-functions-are-overhyped</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/learn-with-obsidian-lightboards</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/lessons-learned-from-the-deepseek-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/log4j-vulnerability-impact-on-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/malicious-browser-extensions-what-security-teams-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/mamba-2fa-phishing-kit-why-email-protection-is-not-enough</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/meet-cisa-configuration-baselines-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/mfa-arbitrage-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/mfa-bypass-attacks-defense-strategies</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/mfa-bypass-explained-why-traditional-auth-fails-prevention-tips</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/microsoft-breach-russian-hackers-midnight-blizzard</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/microsoft-teams-phishing-exploit</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/mitre-attack-v15-a-deeper-dive-into-saas-identity-compromise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/modern-threat-detection-impossible-travel</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/my-journey-to-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/navigating-saas-posture-regulatory-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/navigating-saas-security-financial-sector</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/next-gen-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/nist-framework-for-cloud-access-protection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/oauth-phishing-threat-exploiting-saas-integration-platforms</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/oauth-scopes-permissions-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/oauth-security-integration-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/oauth-vulnerabilities-security-teams</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-crowdstrike-integration</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-for-workday-is-here</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-makes-the-cnbc-2019-upstart-100-list</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-outlook-2023-saas-security-predictions</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-search</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-and-privacy-compliance-journey</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-databricks-lakewatch</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-expanded-reach-to-google-cloud-marketplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-for-databricks-and-delta-sharing-connector-unifies-security-insights-to-accelerate-ai-deployment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-receives-2023-sinet16-innovator-award</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-recognized-as-strong-performer-by-independent-research-firm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-welcomes-investor-promod-haque-and-norwest-venture-partners</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-security-wins-global-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-sspm-customization</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/obsidian-support-for-zoom</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/onedrive-security-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/owasp-ai-security-guidance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/prevent-idp-bypass-to-salesforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/pure-storage-launching-saas-security-program</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/recent-trends-in-advanced-saas-ttps</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/redefining-saas-security-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/reducing-risks-and-threats-with-continuous-saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/reflecting-on-the-obsidian-internship-experience</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/refresh-token-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/regulatory-amendments-have-one-thing-in-common-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/responding-to-cybersecurity-risks-russia-ukraine-war</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/responding-to-twilio-sms-incident-with-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/rethinking-identity-threat-detection-the-ip-geolocation</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/risk-detected-from-argyle-hr-management-integration</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-attack-techniques-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-integration-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-security-in-healthcare-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-security-shared-responsibility-model</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-security-soars-at-falcon-2022</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-security-workflows-that-scale</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-session-hijacking-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-supply-chain-security-vs-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/saas-under-siege-nation-state-actors-target-identities</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/salesforce-graphql-guest-user-exploit-key-actions-to-take</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/salesforce-misconfiguration-continues-to-expose-links-to-the-public</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/salesforce-misconfigurations-expose-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/scattered-spider-saas-attack-analysis</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/secure-your-entire-saas-estate-obsidian-extend</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/securing-against-oauth-exploitation-a-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/securing-generative-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/securing-local-access-in-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/securing-oauth-for-microsoft-environments</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/securing-your-snowflake-environments</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/security-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/security-for-space-as-a-service-aka-co-working-spaces</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/service-account-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/servicenow-security-with-obsidian-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/session-hijacking-how-it-works-how-to-stop-it</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/shadow-ai-risks-chatgpt-features</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/shadow-linking-the-persistence-vector-of-saas-identity-threat</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/shadow-saas-discovery-emails-scanning-vs-in-browser-monitoring</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/shinyhunters-and-scattered-spider-a-merger-of-chaos-in-the-2025-salesforce-attacks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/should-you-diy-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/small-tools-big-risk-when-browser-extensions-start-stealing-api-keys</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/solving-insider-risk-in-the-age-of-saas-and-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/spotting-saas-application-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/sso-bypass-attack-techniques</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/sso-support</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/sspm-rescue-accelering-saas-incident-response-90-percent</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/stop-identity-provider-session-hijacking</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/supply-chain-security-for-modern-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/ten-tactics-for-introverts-in-open-office-plans</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-bearer-token-problem-hidden-inside-your-ai-agent-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-beauty-of-code-a-painting-series</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-components-of-a-holistic-saas-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-evolution-of-sspm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-four-pillars-of-data-guardianship</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-importance-of-incident-response-for-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-new-attack-surface-oauth-token-abuse</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-power-of-audit-logs-storm-0558-threat</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-rise-of-byod-how-to-secure-personal-devices</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-rise-of-saas-supply-chain-attacks-why-you-arent-safe-from-the-next-salesloft-drift-attack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/the-scoop-on-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/tips-to-manage-data-privacy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/token-based-attacks-how-attackers-bypass-mfa</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/token-replay-attacks-detection-prevention</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/trashing-shared-documents-is-harder-than-it-looks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/unc6395-salesloft</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/understanding-ai-regulations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/understanding-social-engineering-attacks-on-helpdesk-agents</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/unlock-saas-security-intelligence-with-splunk-and-obsidian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/welcome-to-sspm-week-2023</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-are-machine-identities-security-risks-management</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-are-man-in-the-middle-mitm-attacks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-are-non-human-identities-nhi-security-guide</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-are-oauth-tokens-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-are-refresh-tokens-secure-usage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-does-data-privacy-really-mean</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-ai-model-governance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-aispm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-api-security-fundamental-strategies-for-saas-integrations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-lateral-movement-in-saas-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-llm-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-shadow-saas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-the-obsidian-code</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-token-theft-oauth-session-api-token-attacks-explained</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/what-is-webhook-security-securing-saas-integrations-2026</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/when-mcp-meets-oauth-common-pitfalls-leading-to-one-click-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/who-is-building-your-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/why-are-unauthorized-genai-apps-risky</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/blog/why-to-stop-writing-negative-code</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/0mega-ransomware-gang-changes-tactics</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/create-the-right-early-gtm-strategy</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/cyber-essentialism-doing-less-with-less</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/hackers-used-obscure-texas-it-vendor-to-attack-u-s-agencies</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/how-businesses-can-protect-their-saas-cloud-security-tips-from-a-former-nsa-agent</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/magma-channel-program</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-a-top-10-finalist-in-rsa-innovation-sandbox-contest-2020</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-announces-new-partner-program-with-100-percent-channel-commitment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-appoints-laura-noren-as-vp-of-privacy-trust</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-closes-the-saas-security-coverage-and-intelligence-gap</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-expands-in-germany</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-integration-with-crowdstrike-nextgen-siem</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-launches-emea-cio-advisory-board-partnership-with-norma-cyber</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-launches-new-data-center-in-australia</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-launches-new-saas-security-and-compliance-tools</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-launches-zoom-protection</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-makes-the-cnbc-2019-upstart-100-list</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-now-available-on-google-cloud-marketplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-partners-with-snowflake-to-consolidate-security-visibility-at-scale</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-achieves-iso-iec-42001-2023-certification-for-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-advances-security-capabilities-for-ai-data-cloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-announces-end-to-end-saas-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-expands-to-australia</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-hires-industry-leader-xinran-wang-new-evp-of-engineering</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-lands-90m-to-detect-and-fix-major-saas-risks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-launches-2025-saas-security-threat-report</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-names-reena-choudhry-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-now-available-on-crowdstrike-marketplace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-partners-with-databricks-bolster-data-governance</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-raises-90-million-series-c-round</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-ranked-among-the-fastest-growing-companies-in-north-america-on-the-2025-deloitte-technology-fast-500-tm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-receives-2022-cloud-computing-security-excellence-award</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-recognized-as-strong-performer-by-independent-research-firm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-releases-industry-first-saas-session-hijacking-detection-feature-to-protect-todays-cloud-first-organizations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-strengthens-european-customer-data-sovereignty</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-strengthens-public-sector-credentials-with-irap-assessment</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-security-unveils-next-gen-sspm-solution</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/obsidian-solidifies-market-leadership-position-expanding-posture-support-11-new-applications</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/saas-ransomware-attack-hit-sharepoint-online-without-using-a-compromised-endpoint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/solarwinds-hack-ap</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/sunil-seshadri-joins-the-board-of-obsidian-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/the-gap-in-saas-security-techstrong-tv</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/wechat-and-tiktok-app-store-bans</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/news/why-data-ethics-is-a-growing-ciso-priority</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/algolia</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/bigcommerce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/enterprise-saas-security-at-5g-speed-inside-the-t-mobile-obsidian-partnership</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/leading-finserv-company</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/snowflake</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/trade-me</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/customer-stories/upwork</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt28-fancy-bear-targets-western-logistics-supporting-ukraine</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt29-targets-diplomatic-it-via-token-theft-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt32-targets-dissidents-and-corporate-media-via-fake-site-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt33-targets-aerospace-and-energy-firms-via-spear-phishing-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt34-oilrig-earth-simnavaz-targets-middle-east-government-microsoft-exchange-abuse</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/apt41-barium-targets-telecom-providers-via-kernel-level-backdoor-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/blindeagle-apt-c-36-targets-latin-america-spear-phishing-espionage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/iran-hacktivist-group-handala-weaponizes-microsoft-intune</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/scattered-spider-targets-airlines-retail-social-engineering-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/unc2452-targets-government-it-supply-chain-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/incident-watch/void-arachne-silver-fox-targets-taiwan-government-tech-spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/1password</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/abnormal-ai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/adobe-acrobat-sign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/adobe-marketo-engage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/aha</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/airtable</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/akamai</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/arista</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/artifactory</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/asana</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/atlassian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/auditboard</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/auth0</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/azure-devops</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/box</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/calendly</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/checkpoint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/checkr</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/circle-ci</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cisco-thousandeyes</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/clickup</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/clockify</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cloudflare</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/coda</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cohesity</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/commvault</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/confluent-cloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/copilot</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/coupa</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cradlepoint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cribl</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/custom-connect</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/cyberark</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/datadog</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/dealcloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/dialpad</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/docusign</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/drata</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/dropbox</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/druva</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/duo</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/engagis</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/everbridge</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/exabeam</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/expensify</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/fabric</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/fastly</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/figma</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/fireblocks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/firetail</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/fivetran</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/freshcaller</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/freshchat</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/freshdesk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/freshsales</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/freshservice</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/genesys-cloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/gitguardian</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/github</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/github-posture</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/gitlab</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/glean</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/gong</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/google-security-operations</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/grammarly</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/greenhouse-recruiting</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/hackerone</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/hps</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/hubspot</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/iboss</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/imanage</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/informatica</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/insightly</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/iru</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/jamf</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/jenkins</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/jumpcloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/juniper-mist</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/keeper</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/kintone</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/knowbe4</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/kong</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/lastpass</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/launchdarkly</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/logz</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/looker</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/lucid</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/mailchimp</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/meraki</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-azure-devops</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-fabric</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-graph-entra-id</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-office-365</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-power-platform</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-power-platform-d213d</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/microsoft-powershell-access</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/mimecast</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/miro</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/monday-com</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/mongodb-atlas</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/moveworks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/mulesoft</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/mural</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/n8n</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/netskope</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/netsparker</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/new-relic</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/notion</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/odessa</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/onelogin</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/opal-security</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/oracle-fusion-apps</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/oracle-fusion-hcm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/oracle-netsuite</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/pagerduty</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/personetics</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/ping</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/ping-federate</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/postman</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/pyrus</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/qualys</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/rapid7</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/relativityone</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/rubrik</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-databricks</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-github</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-okta</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-salesforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-servicenow</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-snowflake</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saas-security-workday</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sailpoint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/salesforce-agentforce</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/salesforce-commerce-cloud-b2c</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/salesforce-marketing-cloud</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sap-ariba</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sap-cloud-identity-services</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sap-fieldglass</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sap-s-4hana</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/saviynt</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/secure-code-warrior</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sendgrid</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sentry</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sharefile</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/shopify</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/sigma-computing</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/slack</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/slack-enterprise</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/smartsheet</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/snyk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/successfactors</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/tableau</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/tanium</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/teamviewer</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/teamviewer-9fa35</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/temporal</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/tenable</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/teradata</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/terraform</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/tines</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/trackvia</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/trello</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/twilio</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/unqork</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/vanta</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/veeva</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/veeva-vault-quality-docs</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/verint</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/versa-concerto</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/webex</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/whispli</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/wiz</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/wordpress</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/workato</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zendesk</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zoho-crm</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zoom</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zscaler</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zscaler-private-access</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/integrations/zuora</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/compare/appomni</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/compare/crowdstrike-falcon-shield</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/compare/reco</loc>
    </url>
    <url>
        <loc>https://www.obsidiansecurity.com/academy/what-are-agentic-guardrails-deterministic-controls-for-probabilistic-systems</loc>
    </url>
</urlset>