<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://www.adaptive.live/blog/sebi-cscrf-checklist-2025-complete-compliance-requirements-and-guidelines-explained</loc><lastmod>2025-12-05T10:21:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/fedramp-compliance-checklist-step-by-step-technical-readiness-guide</loc><lastmod>2025-09-10T10:32:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/rbi-csite-audit-complete-guide-checklist-and-preparation-tips-2025</loc><lastmod>2025-09-05T13:31:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/simplevpn-minimal-and-extendable-vpn-in-go</loc><lastmod>2025-07-15T16:11:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/agentic-data-classification</loc><lastmod>2025-07-08T12:47:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/building-a-web-shell-from-scratch</loc><lastmod>2025-07-03T09:15:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/creating-an-effective-data-breach-response-plan-a-guide-for-preventing-breaches</loc><lastmod>2025-07-01T22:27:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/9-nerdy-ways-to-ssh-into-a-server</loc><lastmod>2025-06-26T07:56:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/access-is-the-new-exploit</loc><lastmod>2025-06-25T21:53:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/how-we-can-almost-solve-cyber-security-once-and-for-all</loc><lastmod>2025-06-24T08:00:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/aflac-cyberattack-exposes-customers-personal-data-what-we-know</loc><lastmod>2025-06-23T19:49:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/a-vault-agnostic-future-for-secrets-management</loc><lastmod>2025-06-20T16:58:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/saml-vs-sso-and-why-they-re-not-enough-for-databases-and-critical-assets</loc><lastmod>2025-06-20T05:20:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/security-vs-compliance-a-deep-dive-for-cisos-and-grc-architects</loc><lastmod>2025-06-19T05:12:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/10-real-life-insider-threat-examples-and-how-to-prevent-them</loc><lastmod>2025-06-18T05:01:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/zoomcar-data-breach-exposes-personal-information-of-8-4-million-users-what-you-need-to-know</loc><lastmod>2025-06-16T22:19:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/inside-ghostnet-the-cyber-espionage-operation-that-shocked-the-world</loc><lastmod>2025-06-16T18:27:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-to-expect-in-a-pci-dss-4-0-audit-a-step-by-step-guide</loc><lastmod>2025-06-14T16:45:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/evoke-wellness-data-breach-insider-employee-steals-sensitive-patient-information</loc><lastmod>2025-06-13T06:21:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/unfi-cyberattack-what-s-inside-the-june-9-sec-8-k-disclosure</loc><lastmod>2025-06-12T07:43:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-is-identity-governance-and-administration-iga-and-why-is-it-not-enough</loc><lastmod>2025-06-11T03:32:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/securing-your-mcp-server-essential-steps-for-robust-protection</loc><lastmod>2025-06-09T21:10:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/unlock-the-power-of-openai-agents-api-build-intelligent-task-oriented-ai-solutions</loc><lastmod>2025-06-06T18:12:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/the-impact-of-identity-and-access-security-on-next-gen-ai-agents-mcp-cursor-jules-copilot-and</loc><lastmod>2025-06-04T17:38:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/indian-grocery-startup-kiranapro-hacked-servers-deleted-and-customer-data-compromised</loc><lastmod>2025-06-03T22:39:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/roi-for-ai-agents-in-security-investment-for-future-proofing</loc><lastmod>2025-06-03T21:48:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/how-to-secure-identities-for-agentic-ai-best-practices-for-protecting-autonomous-ai-agents</loc><lastmod>2025-06-02T22:54:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-is-mcp-understanding-model-context-protocol-and-how-to-secure-it</loc><lastmod>2025-06-02T20:17:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/top-security-use-cases-for-ai-agents</loc><lastmod>2025-06-02T17:41:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/top-security-use-cases-for-mcp-model-context-protocol</loc><lastmod>2025-05-30T07:54:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-is-privileged-access-management</loc><lastmod>2025-05-30T07:48:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/the-impact-of-ai-agents-on-traditional-identity-and-access-management-iam-platforms</loc><lastmod>2025-05-29T17:44:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/understanding-the-access-maturity-model-a-guide-for-ciso</loc><lastmod>2025-05-28T00:16:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/the-history-and-evolution-of-privileged-access-management-pam-securing-your-infrastructure</loc><lastmod>2025-05-22T23:54:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/access-security-requirements-across-major-compliance-frameworks</loc><lastmod>2025-05-20T17:28:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/unlocking-the-future-of-ai-agents-secure-a2a-protocol-with-adaptive</loc><lastmod>2025-05-19T17:22:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/coinbase-cybersecurity-breach-what-happened-and-what-you-need-to-know</loc><lastmod>2025-05-16T04:34:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/iso-42001-explained-the-new-global-standard-for-ethical-and-responsible-ai-governance</loc><lastmod>2025-05-12T14:59:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/5-essential-llm-design-patterns-for-building-effective-intelligent-agents</loc><lastmod>2025-05-02T17:19:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/securing-model-context-protocol-mcp-servers-complete-2025-guide</loc><lastmod>2025-04-21T20:07:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/understanding-non-human-identities-nhi-the-hidden-threat-in-secrets-management</loc><lastmod>2025-04-17T20:11:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/press-release-oct-10-24</loc><lastmod>2024-10-02T05:37:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/firewalls-and-vpns</loc><lastmod>2024-07-04T13:02:12.678Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/the-data-fabric-layer</loc><lastmod>2024-06-04T16:24:45.691Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/secure-your-postgres-database</loc><lastmod>2024-05-14T20:02:04.302Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/iam-vs-pam</loc><lastmod>2024-04-12T17:42:03.436Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/is-your-network-safe-from-the-one-click-attack</loc><lastmod>2024-03-07T19:05:29.544Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/3-attack-vectors-in-the-age-of-ai</loc><lastmod>2024-02-13T21:27:08.665Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/healthcare-and-data-security</loc><lastmod>2024-01-22T23:42:43.824Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/ai-regulations-and-data-security</loc><lastmod>2023-12-19T20:30:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/ways-to-monitor-database-activity</loc><lastmod>2023-12-12T22:00:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/dam-vs-ddr</loc><lastmod>2023-12-06T18:48:23.258Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/ai-and-unstructured-data</loc><lastmod>2023-11-28T10:03:43.558Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/zero-trust-and-activity-monitoring</loc><lastmod>2023-11-16T12:30:46.329Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/dam-vs-dspm</loc><lastmod>2023-11-14T12:30:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/network-access-control-nac</loc><lastmod>2023-11-08T09:56:25.198Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-is-sensitive-data</loc><lastmod>2023-10-26T19:01:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/view-ssh-logs</loc><lastmod>2023-09-01T07:32:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/rethink-infrastructure-access</loc><lastmod>2023-08-14T08:58:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/adaptive-has-completed-soc2-type-ii-audit</loc><lastmod>2023-07-18T07:45:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/bits-and-breaches-sony-pictures</loc><lastmod>2023-07-12T12:34:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/bits-and-breaches-target</loc><lastmod>2023-06-22T13:03:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/evolution-of-internal-networking-and-access</loc><lastmod>2023-06-15T10:13:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/understanding-sox-compliance</loc><lastmod>2023-06-09T04:43:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/kubernetes-in-docker-kind</loc><lastmod>2023-05-23T13:04:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/ssh-into-docker-container</loc><lastmod>2023-05-19T10:50:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/adaptive-has-completed-soc-2-type-i-audit</loc><lastmod>2023-04-12T07:38:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/privileged-identity-management-a-brief-guide</loc><lastmod>2023-04-06T12:42:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/what-is-the-principle-of-least-privilege-polp</loc><lastmod>2023-03-16T04:14:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/hipaa-compliance-checklist-2023</loc><lastmod>2023-03-10T10:53:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/alternative-use-cases-for-a-bastion-host</loc><lastmod>2023-03-03T10:16:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/identity-and-access-management-iam-explained</loc><lastmod>2023-02-14T15:46:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/understanding-soc-2-types-principles-and-benefits</loc><lastmod>2023-02-08T16:40:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/credential-management-explained-best-practices-and-the-future</loc><lastmod>2023-01-25T14:43:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/authentication-protocols-types-and-uses</loc><lastmod>2023-01-15T16:32:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
<url><loc>https://www.adaptive.live/blog/how-to-set-up-an-aws-bastion-host-or-a-jump-server</loc><lastmod>2023-01-10T15:59:00.000Z</lastmod><priority>0.9</priority><changeFreq>daily</changeFreq></url>
</urlset>