<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.oasis.security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/about-us</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/demo</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/product</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/legal/sla</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/newsroom</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/legal/dpa</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/careers</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/non-human-identity-management-glossary-non-human-identity-lifecycle-management-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/non-human-identity-management-glossary-non-human-identitiy-security-violations-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/non-human-identity-management-glossary-identity-tyeps-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/non-human-identity-management-glossary-iam-concepts-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary-vendors</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary-regulation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/events</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/secret-rotation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/asset-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/energy</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/governance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/itdr</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/operational-resiliency</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/posture-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/insurance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/retail</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/solutions/finance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/why-oasis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/oasis-register-a-deal</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/oasis-newsletter</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/legal/saas-subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/nhim-certification</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/lp/thank-you-for-joining-us-nyc</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/agentic-access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/aam-capsule</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/ai-access-partnership</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/5-ways-non-human-identity-ownership-impacts-your-security-program</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/agent-365-oasis-for-ai-agent-governance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/agentic-access-management-framework</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/agentic-ai-security-gartner-ai-trism</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/ai-agents-human-or-non-human</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/ai-identities-visibility</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/ai-native-engineering-speed-culture-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/ai-nhi-security-challenge</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/automation-is-key-dhs-report-unveils-lessons-from-the-microsoft-exchange-incident</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/best-practices-to-secure-data-access-in-snowflake</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/breaking-down-non-human-identity-security-5-critical-challenges-in-2025</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/celebrating-the-first-year-of-oasis-nhi-security-cloud</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cisco-breach-non-human-identities-nhi-compromise-and-implications-for-devops-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cisos-new-reality-leadership-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/claude-ai-prompt-injection-data-exfiltration-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/claude-mythos-project-glasswing-security-teams</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cline-kanban-websocket-hijack</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cursor-oasis-governing-agentic-access</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cursor-security-flaw</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cyber-beyond-human---newsletter-may-2025</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cyber-beyond-human-december-2024</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cyber-beyond-human-newsletter-july-2025</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cyber-beyond-humans-agentic-ai-security-brief</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/cyber-beyond-humans-from-shadow-ai-to-trusted-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/decommissioning-orphaned-and-stale-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/deleting-git-commits-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/dont-look-back-in-anger-how-cloudflares-outage-highlights-the-need-for-safer-rotations</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/enhancing-github-security-with-oasis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/exposed-aws-env-configuration</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/financial-service-institution-secures-azure-nhis-with-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/gainsight-salesforce-oauth-incident</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/governing-static-dynamic-nhi-mix</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/how-a-healthcare-provider-gained-comprehensive-nhi-visibility-with-oasis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/how-nhis-are-reshaping-the-responsibilities-of-identity-security-professionals</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/how-oasis-solves-itdr-for-nonhumanidentities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/how-to-kickstart-your-ispm-program</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/identity-aware-secret-scanning</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/identity-security-2025-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/introducing-oasis-agentic-access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/introducing-oasis-nhi-provisioning-transforming-nhi-security-from-day-1</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/introducing-oasis-the-non-human-identity-management-platform</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/lessons-from-the-mcp-breach-shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/mcdonalds-ai-hiring-breach-nonhuman-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/microsoft-oauth-start-here</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/multi-vault-pam-governance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/navigating-mandatory-mfa-for-azure</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/navigating-the-complexity-of-decentralized-secrets-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/new-oasis-integration-for-databricks-secures-access-to-data-and-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhi-certification</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhi-discovery-going-beyond-inventory</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhi-enrichment-layer</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhi-ownership</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhi-security-metrics-15-kpis-your-board-needs-in-2025</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/nhis-employee-offboarded</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-complement-privileged-access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-governance-why-iga-falls-short</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-management-vs-cspm</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-ownership-attestation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-risks-lessons-from-dropboxs-security-incident</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-security-why-now</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/non-human-identity-threat-center</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-crowdstrike-marketplace-partnership</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-joins-the-wiz-integration-network-win</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-security-appoints-michael-decesare-as-president</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-security-emerges-from-stealth</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-security-integration-with-microsoft-active-directory</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/onedrive-file-picker-security-flaw-oasis-research</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/openclaw-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/own-it-prove-it-secure-it</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/posture-trap-nhi-policy-intelligence</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/reflecting-on-our-journey-at-oasis-and-looking-ahead</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/rpa-to-ai-agents-secure-access</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/rsa-2025-5-takeaways-on-ai-third-party-risk-the-future-of-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/salesforce-data-loader-oauth-impersonation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/secret-rotation-asis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/securing-generative-ai-with-non-human-identity-management-and-governance</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/securing-non-human-identities-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/securing-non-human-identities-in-mergers</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/securing-non-human-identities-lessons-from-the-cloudflare-breach</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/service-principal-vs-managed-identity-in-azure</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/stop-worrying-start-rotating</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/the-feast-of-security-what-thanksgiving-can-teach-us-about-protecting-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/the-future-of-identity-security-lessons-from-the-change-health-breach</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/the-non-human-identity-threat-storm-0501-attack-is-expanding-to-hybrid-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/the-salesloft-oauth-compromise-what-it-changed-and-what-to-do-next</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/three-frontiers-one-challenge</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/tj-actions</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/top-10-security-architect-to-follow-on-linkedin</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/top-15-identity-pros-to-follow-on-linkedin</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/top-15-identity-security-accounts-to-follow-on-twitter</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/trivy-breach-non-human-identity-risk</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/understanding-pci-dss-4-0-nhim-essential-guide</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/what-are-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/what-are-service-accounts-and-how-should-you-secure-them</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/what-are-storage-accounts</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/what-is-agentic-access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/what-is-non-human-identity-provisioning-and-why-is-it-broken</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/whats-broken-with-identity-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/why-do-i-need-nhim-if-i-already-have-a-great-iga-tool</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/blog/why-should-active-directory-hygiene-be-part-of-your-nhi-security-program</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/access-key</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/agentic-access-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/application</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/attestation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/aws-rds-user</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/break-glass-account</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/ciem</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/conditional-access</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/decommission</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/device-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/external-account</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/gcp-secret-vault</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/generative-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/hashicorp-vault</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/human-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/iam</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/iam-user</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/identity-fabric</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/identity-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/identity-threat-detection-and-response-itdr</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/idp</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/iga</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/just-in-time</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/kms-key</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/machine-credentials</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/machine-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/mfa</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/msa-key</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/oauth-2-0</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/oauth-tokens</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/offboarded-employee</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/okta-application</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/orphaned-accounts</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/out-of-sync-application</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/overconsumed</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/overprivileged</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/pam</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/parameter-store</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/pci-4-0</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/principle-of-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/provisioning</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/rbac-role-based-access</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/role</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/sas-token</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/secret-manager-secret</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/secret-rotation</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/secret-sprawl</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/secure-parameter</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/service-account</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/service-principal</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/spiffe-verifiable-identity-document</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/sso</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/stale-accounts</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/vault</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/vault-certificate</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/vault-key</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/vault-secret</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/what-are-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/workload-iam</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/workload-identity</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/glossary/workload-iga</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/best-practices-to-secure-nhis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/breaking-the-identity-perimeter-an-attackers-perspective</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/case-study-how-leading-organizations-solved-security-challenges-leveraging-nhim</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/ciso-briefing-how-to-achieve-board-ready-ai-governance-at-speed-and-scale-by-oasis-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/from-pam-to-nhi-management-how-technology-is-opening-up-new-challenges-to-securing-machine-to-machine-access</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/how-an-industrial-company-optimized-nhis-in-their-azure-environment</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/how-to-secure-non-human-identities-in-the-era-of-ai</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/non-human-identity-lifecycle-governance-provisioning-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/oasis-non-human-identity-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/oasis-x-lifelabs</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/securing-non-human-identities-insight-from-recent-breaches</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/webinars/securing-non-human-identities-insights-from-recent-breaches</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/account/bank-of-america-7bf48</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers/ai-agents-human-or-non-human</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers/cross-origin-websocket-exploitation-openclaw</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers/lessons-from-recent-nhi-breaches</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers/next-phase-of-pam</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/whitepapers/securing-non-human-identities-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/how-oasis-complements-cspm-with-non-human-identity-management</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/manage-and-secure-the-lifecycle-of-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/non-human-agentic-access-management-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/oasis-completes-pam-strategy</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/oasis-for-aws</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/solution-briefs/the-collaborative-approach-of-secret-managers-and-oasis</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/infographics/non-human-identity-management-infographic</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/2024-esg-report-managing-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/claude-ai-prompt-injection-vulnerability-technical-report</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/cline-kanban-websocket-hijack-technical-report</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/cursor-workspace-trust-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/oasis-discovers-microsoft-azure-mfa-bypass</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/the-state-of-non-human-identity-and-ai-security</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/reports/web-apps-may-access-all-files-in-your-onedrive</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/ebooks/non-human-identity-management-101</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/ebooks/non-human-identity-management-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/videos/non-human-identity-management-what-is-it-why-its-important</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/videos/non-human-identity-security-at-scale-mars-case-study</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/videos/oasis-security-ceo-danny-brickman-on-ismg</loc>
    </url>
    <url>
        <loc>https://www.oasis.security/resources/videos/solving-the-risk-of-unmanaged-non-human-identities</loc>
    </url>
</urlset>