<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.cydenti.com/en/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/solution/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/solution/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/ai-risk-engine/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/ai-risk-engine/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/blast-radius-analysis/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/blast-radius-analysis/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/cloud-identity-exposure/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/cloud-identity-exposure/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/compliance-reporting/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/compliance-reporting/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/identity-graph/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/identity-graph/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/identity-risk-scoring/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/identity-risk-scoring/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/integrations/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/integrations/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/ispm/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/ispm/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/itdr/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/itdr/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/platform/oauth-risk-management/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/platform/oauth-risk-management/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/itdr/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/itdr/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/documentation/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/documentation/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/gallery/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/gallery/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/company/about/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/company/about/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/company/customers/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/company/customers/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/company/updates/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/company/updates/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/contact/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/contact/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/pricing/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/pricing/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/why-cydenti/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/why-cydenti/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/audit-flash/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/audit-flash/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/diagnostic/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/diagnostic/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/demo/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/demo/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/updates/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/updates/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/legal/privacy-policy/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/legal/privacy-policy/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/legal/terms-of-use/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/legal/terms-of-use/</loc>
<lastmod>2026-04-06T07:30:59.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/cloud-security-awareness-weekly-week-december-28-2025-january-3-2026/</loc>
<lastmod>2026-01-14T07:02:41.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/cloud-security-awareness-weekly-week-december-28-2025-january-3-2026/</loc>
<lastmod>2026-01-14T07:02:41.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-rise-of-agentic-ai-understanding-the-autonomous-identity-frontier/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-rise-of-agentic-ai-understanding-the-autonomous-identity-frontier/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/outcome-based-accountability-the-new-standard-for-digital-operations/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/outcome-based-accountability-the-new-standard-for-digital-operations/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/jurisdiction-matters-ensuring-data-stewardship-in-the-digital-era/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/jurisdiction-matters-ensuring-data-stewardship-in-the-digital-era/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-24-hour-window-preparing-for-modern-incident-reporting-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-24-hour-window-preparing-for-modern-incident-reporting-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-4-minute-breakout-why-speed-is-the-only-metric-that-matters/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-4-minute-breakout-why-speed-is-the-only-metric-that-matters/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/beyond-mfa-why-attackers-are-shifting-to-token-based-exploits/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/beyond-mfa-why-attackers-are-shifting-to-token-based-exploits/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/zero-standing-rights-the-architectural-goal-of-modern-access-control/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/zero-standing-rights-the-architectural-goal-of-modern-access-control/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/blog-16/</loc>
<lastmod>2026-03-09T11:56:42.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/blog-16/</loc>
<lastmod>2026-03-09T11:56:42.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/blog-17/</loc>
<lastmod>2026-03-09T11:56:47.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/blog-17/</loc>
<lastmod>2026-03-09T11:56:47.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/managing-intent-how-to-govern-ai-decisions-in-real-time/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/managing-intent-how-to-govern-ai-decisions-in-real-time/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/saas-sprawl-and-identity-managing-access-across-disparate-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/saas-sprawl-and-identity-managing-access-across-disparate-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/why-ai-agents-require-a-new-security-model-beyond-service-accounts/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/why-ai-agents-require-a-new-security-model-beyond-service-accounts/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-financial-cost-of-a-breach-analyzing-the-2026-global-benchmarks/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-financial-cost-of-a-breach-analyzing-the-2026-global-benchmarks/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/digital-autonomy-why-local-control-enhances-business-resilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/digital-autonomy-why-local-control-enhances-business-resilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/hardware-keys-vs-push-mfa-evaluating-phishing-resistant-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/hardware-keys-vs-push-mfa-evaluating-phishing-resistant-standards/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/behavioral-baselines-using-intelligence-to-detect-identity-anomalies/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/behavioral-baselines-using-intelligence-to-detect-identity-anomalies/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/orphaned-identities-identifying-the-8-leak-in-modern-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/orphaned-identities-identifying-the-8-leak-in-modern-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/dora-and-identity-a-guide-to-operational-resilience-in-finance/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/dora-and-identity-a-guide-to-operational-resilience-in-finance/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/a-comprehensive-guide-to-securing-salesforce-identity-posture/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/a-comprehensive-guide-to-securing-salesforce-identity-posture/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/securing-github-repositories-against-credential-misuse/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/securing-github-repositories-against-credential-misuse/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/identity-resilience-strategies-for-microsoft-365/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/identity-resilience-strategies-for-microsoft-365/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/governing-identity-and-permissions-in-slack-workspaces/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/governing-identity-and-permissions-in-slack-workspaces/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/shadow-ai-explained-how-unvetted-agents-enter-your-productivity-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/shadow-ai-explained-how-unvetted-agents-enter-your-productivity-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/managing-high-privilege-access-in-aws-environments/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/managing-high-privilege-access-in-aws-environments/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/ispm-best-practices-for-snowflake-data-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/ispm-best-practices-for-snowflake-data-clouds/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/secure-identity-integration-for-n8n-and-automation-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/secure-identity-integration-for-n8n-and-automation-tools/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/dora-ready-identity-audits-for-financial-entities/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/dora-ready-identity-audits-for-financial-entities/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/understanding-the-nis2-requirements-for-critical-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/understanding-the-nis2-requirements-for-critical-infrastructure/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/securing-non-human-identities-across-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/securing-non-human-identities-across-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-agentic-lifecycle-from-deployment-to-secure-offboarding/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-agentic-lifecycle-from-deployment-to-secure-offboarding/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/identity-debt-101-understanding-the-hidden-cost-of-stale-permissions/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/identity-debt-101-understanding-the-hidden-cost-of-stale-permissions/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/the-171-ratio-why-machine-identities-now-dominate-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/the-171-ratio-why-machine-identities-now-dominate-the-enterprise/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/dormant-accounts-why-38-of-your-user-list-is-a-security-liability/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/dormant-accounts-why-38-of-your-user-list-is-a-security-liability/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/mapping-the-universal-identity-graph-visualizing-cross-cloud-access/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/mapping-the-universal-identity-graph-visualizing-cross-cloud-access/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/en/resources/blogs/personal-liability-and-cybersecurity-understanding-the-loi-rsilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cydenti.com/fr/resources/blogs/personal-liability-and-cybersecurity-understanding-the-loi-rsilience/</loc>
<lastmod>2026-03-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
