<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.blackduck.com/blog.html</loc><lastmod>2026-03-24T19:30:56.464Z</lastmod></url><url><loc>https://www.blackduck.com/blog/aspm-implementation-guide.html</loc><lastmod>2025-10-09T19:22:28.213Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors.html</loc><lastmod>2023-09-19T20:49:33.941Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/taylor-h-armerding.html</loc><lastmod>2025-09-22T09:45:14.08Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/phil-odence.html</loc><lastmod>2025-09-16T18:43:44.231Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/johnathan-knudsen.html</loc><lastmod>2025-02-13T21:59:49.156Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/charlotte-freeman.html</loc><lastmod>2025-02-13T21:51:29.334Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/tim-mackey.html</loc><lastmod>2025-09-15T06:27:57.243Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/cyrc.html</loc><lastmod>2025-02-13T21:55:52.288Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/mike-mcguire.html</loc><lastmod>2025-02-13T22:02:30.901Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/fred-bals.html</loc><lastmod>2025-06-05T18:54:47.655Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/meer-rao.html</loc><lastmod>2024-09-13T16:57:02.122Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/jason-schmitt.html</loc><lastmod>2025-02-13T21:58:58.763Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/apoorva-phadke.html</loc><lastmod>2024-09-13T15:31:09.944Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/chai-bhat.html</loc><lastmod>2025-02-13T21:51:56.235Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/natasha-gupta.html</loc><lastmod>2024-09-13T16:52:43.087Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/matt-jacobs.html</loc><lastmod>2024-09-13T16:57:39.119Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/dr-dennis-kengo-oka.html</loc><lastmod>2025-02-13T21:57:23.155Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/scott-johnson.html</loc><lastmod>2024-09-04T23:08:19.098Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/ashutosh-agrawal.html</loc><lastmod>2025-02-05T17:24:32.629Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/boris-cipot.html</loc><lastmod>2024-09-13T15:40:56.806Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/david-johansson.html</loc><lastmod>2024-09-13T15:38:03.782Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/jacob-wilson.html</loc><lastmod>2025-02-05T17:51:37.037Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/james-rabon.html</loc><lastmod>2024-09-04T23:17:27.047Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/john-steven.html</loc><lastmod>2023-10-05T01:23:46.068Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/anna-chiang.html</loc><lastmod>2023-10-03T21:04:02.866Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/gary-mcgraw.html</loc><lastmod>2023-09-19T21:42:15.448Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/ashutosh-rana.html</loc><lastmod>2023-10-03T21:13:06.769Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/kari-hulkko.html</loc><lastmod>2024-09-13T16:50:38.312Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/michael-white.html</loc><lastmod>2024-09-13T16:54:26.758Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/black-duck-security-advisory-team.html</loc><lastmod>2025-02-05T17:29:04.691Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/debrup-ghosh.html</loc><lastmod>2025-06-04T17:10:43.623Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/scott-tolley.html</loc><lastmod>2025-02-05T17:30:01.883Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/sneha-kokil.html</loc><lastmod>2024-09-13T17:09:26.949Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/sakthi-mohan.html</loc><lastmod>2024-09-13T17:10:20.759Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/chandu-ketkar.html</loc><lastmod>2025-02-13T21:53:11Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/christopher-fearon.html</loc><lastmod>2024-09-13T15:39:13.815Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/kimm-yeo.html</loc><lastmod>2024-09-04T23:29:50.746Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/ksenia-peguero.html</loc><lastmod>2024-09-13T16:59:31.652Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/jamie-boote.html</loc><lastmod>2024-09-13T17:00:26.651Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/steven-zimmerman.html</loc><lastmod>2025-02-13T22:08:25.268Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/vishrut-iyengar.html</loc><lastmod>2024-09-13T17:04:31.813Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/nivedita-murthy.html</loc><lastmod>2024-09-04T23:35:02.582Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/mantej-singh-rajpal.html</loc><lastmod>2024-09-13T16:58:58.605Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/raj-kesarapalli.html</loc><lastmod>2024-09-13T17:10:42.315Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/allon-mureinik.html</loc><lastmod>2024-09-13T15:35:22.614Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/asma-zubair.html</loc><lastmod>2025-02-05T17:53:40.493Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/travis-biehn.html</loc><lastmod>2024-09-13T17:06:01.816Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/arvinder-saini.html</loc><lastmod>2024-09-13T15:41:40.468Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/shandra-gemmiti.html</loc><lastmod>2024-09-13T17:09:58.377Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/damon-weinstein.html</loc><lastmod>2024-09-06T21:32:19.269Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/ashwin-ala.html</loc><lastmod>2023-10-02T21:39:44.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/amit-sethi.html</loc><lastmod>2024-09-13T15:34:21.743Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/steven-power.html</loc><lastmod>2024-09-13T17:08:09.511Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/kris-balarama.html</loc><lastmod>2024-09-06T21:56:58.383Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/anil-gajawada.html</loc><lastmod>2024-09-13T15:31:56.7Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/jim-ivers.html</loc><lastmod>2024-09-13T16:29:09.259Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/thomas-richards.html</loc><lastmod>2024-09-13T20:48:09.338Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/matias-karhumaa.html</loc><lastmod>2024-09-13T16:58:09.658Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/matthew-hogg.html</loc><lastmod>2025-02-05T17:21:36.94Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/mike-lyman.html</loc><lastmod>2025-02-13T22:01:40.056Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/tuomo-untinen.html</loc><lastmod>2024-09-13T17:05:37.387Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/apoorva-patankar.html</loc><lastmod>2024-09-13T15:31:35.908Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/kris-diefenderfer.html</loc><lastmod>2024-09-13T17:00:00.546Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/monika-chakraborty.html</loc><lastmod>2024-09-06T22:20:02.318Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/pekka-oikarainen.html</loc><lastmod>2024-09-13T17:11:38.302Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/tanay-sethi.html</loc><lastmod>2024-09-13T17:06:55.745Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/brendan-sheairs.html</loc><lastmod>2024-09-13T15:40:32.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/christopher-cummings.html</loc><lastmod>2024-09-13T15:39:49.89Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/andrew-lee-thorp.html</loc><lastmod>2024-09-13T15:33:47.921Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/stephen-gardner.html</loc><lastmod>2024-09-13T20:47:32.31Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/john-waller.html</loc><lastmod>2025-02-13T22:00:44.656Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/kevin-collins.html</loc><lastmod>2025-02-05T17:52:17.63Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/patrick-carey.html</loc><lastmod>2025-02-13T22:04:56.747Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/jamie-harris.html</loc><lastmod>2025-02-05T17:50:56.505Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/zeeshan-shaikh.html</loc><lastmod>2024-09-13T17:04:05.837Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/chris-boyd.html</loc><lastmod>2024-09-06T22:51:57.493Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/john-mcshane.html</loc><lastmod>2024-09-06T23:02:34.991Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/julie-courtnay.html</loc><lastmod>2025-02-05T17:54:20.563Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/don-mulrenan.html</loc><lastmod>2025-02-05T17:28:07.741Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/umer-palla.html</loc><lastmod>2024-09-13T17:04:55.655Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/zvi-levitas.html</loc><lastmod>2024-09-06T23:14:43.565Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/corey-hamilton.html</loc><lastmod>2025-02-13T21:54:50.118Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/andy-pan.html</loc><lastmod>2025-04-25T17:06:53.268Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/moshe-apelbaum.html</loc><lastmod>2024-09-13T20:45:32.941Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/gary-oneall.html</loc><lastmod>2023-10-30T21:26:08.697Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/rich-kosinski.html</loc><lastmod>2025-02-13T22:07:05.679Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/susan-miller.html</loc><lastmod>2025-02-13T22:09:11.45Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/natalie-lightner.html</loc><lastmod>2025-02-13T22:03:33.889Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/vineeta-sangaraju.html</loc><lastmod>2024-03-19T19:03:25.987Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/mohammed-alshehri.html</loc><lastmod>2024-09-25T14:24:35.876Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/li-zhao.html</loc><lastmod>2024-06-13T20:26:35.258Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/vijay-dilwale.html</loc><lastmod>2024-09-06T23:23:56.62Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/rod-musser.html</loc><lastmod>2025-02-13T22:07:42.116Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/black-duck-editorial-team.html</loc><lastmod>2024-09-20T20:59:04.683Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/joy-burkholder-meier.html</loc><lastmod>2025-07-15T15:20:58.944Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/samantha-woollard-.html</loc><lastmod>2025-08-12T18:45:54.396Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/rachel-zahr.html</loc><lastmod>2025-11-14T19:41:56.296Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/chrissa-constantine.html</loc><lastmod>2026-01-07T17:12:24.761Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/dipto-chakravarty.html</loc><lastmod>2026-01-21T23:40:19.407Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/tom-herrmann.html</loc><lastmod>2026-02-11T02:33:01.761Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/daniela-giannini.html</loc><lastmod>2026-02-12T18:44:32.301Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/emmanuel-tournier.html</loc><lastmod>2026-03-04T18:55:34.379Z</lastmod></url><url><loc>https://www.blackduck.com/blog/authors/ben-ronallo.html</loc><lastmod>2026-03-23T19:54:04.881Z</lastmod></url><url><loc>https://www.blackduck.com/blog/category.html</loc><lastmod>2025-10-06T18:39:17.436Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-easy-deployment-with-polaris.html</loc><lastmod>2025-10-14T20:12:27.977Z</lastmod></url><url><loc>https://www.blackduck.com/blog/thankyou.html</loc><lastmod>2025-04-29T19:48:13.348Z</lastmod></url><url><loc>https://www.blackduck.com/blog/2020-devsecops-practices-survey.html</loc><lastmod>2025-09-30T19:15:28.936Z</lastmod></url><url><loc>https://www.blackduck.com/blog/3-benefits-application-security-training-strategy.html</loc><lastmod>2024-08-23T17:52:51.825Z</lastmod></url><url><loc>https://www.blackduck.com/blog/3-ways-improve-software-development-skills.html</loc><lastmod>2024-08-21T20:39:14.473Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5-essentials-devsecops-world.html</loc><lastmod>2025-10-28T14:18:13.804Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5-pillars-successful-threat-model.html</loc><lastmod>2024-09-09T18:26:37.736Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5-reasons-third-party-authentication.html</loc><lastmod>2024-07-16T21:14:52.152Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5-types-of-software-licenses-you-need-to-understand.html</loc><lastmod>2024-08-22T18:21:46.303Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5-ways-to-pay-your-technical-debt-back.html</loc><lastmod>2024-07-16T21:17:25.09Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5g-iot-device-security-enterprise-attack-surface.html</loc><lastmod>2025-10-15T17:52:32.954Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5g-networks-software-security.html</loc><lastmod>2025-01-08T19:33:52.602Z</lastmod></url><url><loc>https://www.blackduck.com/blog/5g-security-fuzzing.html</loc><lastmod>2025-10-09T19:16:26.263Z</lastmod></url><url><loc>https://www.blackduck.com/blog/7-myths-of-software-security-best-practices.html</loc><lastmod>2024-09-11T19:57:18.193Z</lastmod></url><url><loc>https://www.blackduck.com/blog/8-must-have-features-iast-solution.html</loc><lastmod>2024-07-16T21:14:52.146Z</lastmod></url><url><loc>https://www.blackduck.com/blog/a-deep-dive-on-pluck-cms-vulnerability-cve-2023-25828.html</loc><lastmod>2024-09-13T20:05:39.195Z</lastmod></url><url><loc>https://www.blackduck.com/blog/a-quick-guide-to-the-complex-ecto-multi.html</loc><lastmod>2023-10-03T16:01:54.92Z</lastmod></url><url><loc>https://www.blackduck.com/blog/aami-tir57-fda-medical-device-cybersecurity-standard.html</loc><lastmod>2023-09-25T17:59:05.632Z</lastmod></url><url><loc>https://www.blackduck.com/blog/abuse-cases.html</loc><lastmod>2024-07-16T21:14:52.154Z</lastmod></url><url><loc>https://www.blackduck.com/blog/abuse-cases-can-drive-security-requirements.html</loc><lastmod>2025-10-09T18:57:06.263Z</lastmod></url><url><loc>https://www.blackduck.com/blog/agile-application-security.html</loc><lastmod>2024-09-12T14:14:24.11Z</lastmod></url><url><loc>https://www.blackduck.com/blog/agile-cicd-devops-difference.html</loc><lastmod>2025-10-28T14:19:11.897Z</lastmod></url><url><loc>https://www.blackduck.com/blog/agile-security.html</loc><lastmod>2024-07-16T21:17:25.109Z</lastmod></url><url><loc>https://www.blackduck.com/blog/agpl-affero-gpl-3.html</loc><lastmod>2024-07-16T21:17:25.104Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-chatbots-in-software-development.html</loc><lastmod>2024-09-10T05:21:23.425Z</lastmod></url><url><loc>https://www.blackduck.com/blog/airline-software-glitch-crash.html</loc><lastmod>2024-09-16T15:41:18.981Z</lastmod></url><url><loc>https://www.blackduck.com/blog/amca-breach.html</loc><lastmod>2024-09-16T15:42:43.684Z</lastmod></url><url><loc>https://www.blackduck.com/blog/android-security-best-practices.html</loc><lastmod>2025-10-14T21:33:47.958Z</lastmod></url><url><loc>https://www.blackduck.com/blog/android-webviews-and-javascript-to-java-bridge.html</loc><lastmod>2024-08-16T18:45:26.384Z</lastmod></url><url><loc>https://www.blackduck.com/blog/angularjs-1-6-0-sandbox.html</loc><lastmod>2024-07-16T21:14:52.149Z</lastmod></url><url><loc>https://www.blackduck.com/blog/angularjs-sandbox.html</loc><lastmod>2024-07-16T21:14:52.146Z</lastmod></url><url><loc>https://www.blackduck.com/blog/angularjs-security-http-service.html</loc><lastmod>2024-07-16T21:14:52.142Z</lastmod></url><url><loc>https://www.blackduck.com/blog/another-threat-non-targeted-attacks.html</loc><lastmod>2025-10-14T21:07:09.809Z</lastmod></url><url><loc>https://www.blackduck.com/blog/anthem-healthcare-data-breach.html</loc><lastmod>2025-10-09T19:40:37.615Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-facebook-license.html</loc><lastmod>2024-09-12T14:15:52.854Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-joke-licenses-category-x.html</loc><lastmod>2025-10-09T18:49:46.686Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-2-zero-day-vulnerability.html</loc><lastmod>2025-01-17T14:24:09.844Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-remote-code-execution-vulnerabilities.html</loc><lastmod>2024-07-16T21:17:25.104Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-research-building.html</loc><lastmod>2024-09-16T15:43:46.863Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-research-environments.html</loc><lastmod>2025-08-14T13:42:48.257Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-research-exploitation.html</loc><lastmod>2024-09-16T15:45:09.286Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apache-struts-security-advisories-updated.html</loc><lastmod>2024-08-29T18:30:31.283Z</lastmod></url><url><loc>https://www.blackduck.com/blog/api-authentication-authorization-best-practices.html</loc><lastmod>2025-10-09T19:44:19.459Z</lastmod></url><url><loc>https://www.blackduck.com/blog/api-security-testing.html</loc><lastmod>2024-08-29T16:02:37.199Z</lastmod></url><url><loc>https://www.blackduck.com/blog/apollo-11-software-development.html</loc><lastmod>2025-10-09T19:45:12.783Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-security-incidents.html</loc><lastmod>2025-10-14T20:52:51.59Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-security-simple-developers.html</loc><lastmod>2024-09-04T14:59:32.122Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-security-toolchain.html</loc><lastmod>2024-09-16T15:46:19.988Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-security-vs-software-security.html</loc><lastmod>2025-09-19T17:01:19.668Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-transport-security.html</loc><lastmod>2024-08-29T13:54:14.781Z</lastmod></url><url><loc>https://www.blackduck.com/blog/applying-automotive-tara-method.html</loc><lastmod>2024-08-27T23:35:54.245Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-2022-software-vulnerability-snapshot-report-takeaways.html</loc><lastmod>2025-10-14T20:22:20.201Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-2022-software-vulnerability-snapshot-research.html</loc><lastmod>2024-09-13T20:25:11.446Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-asoc-benefits.html</loc><lastmod>2026-03-03T18:27:33.323Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-attack-model.html</loc><lastmod>2025-10-09T19:47:40.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-biden-cybersecurity-standards.html</loc><lastmod>2025-10-14T20:18:19.879Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-building-security-into-devsecops.html</loc><lastmod>2024-07-16T22:14:06.918Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-continuous-appsec-testing-in-devsecops-with-seeker-iast.html</loc><lastmod>2024-08-22T13:54:15.865Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-cybersecurity-research-center.html</loc><lastmod>2024-09-12T14:21:04.535Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-executive-order.html</loc><lastmod>2024-07-16T22:14:06.921Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-managing-software-supply-chain-risks.html</loc><lastmod>2024-07-16T21:17:25.089Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-managing-your-open-source-risks.html</loc><lastmod>2024-09-12T14:26:03.42Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-nist-supply-chain-risk-management.html</loc><lastmod>2024-07-16T22:14:06.915Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-open-source-software-ossra.html</loc><lastmod>2024-08-29T16:07:42.881Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-open-source-trends-ossra-report.html</loc><lastmod>2024-09-16T14:27:59.614Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-proactive-software-supply-chain-security.html</loc><lastmod>2024-07-16T22:14:06.917Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-sbom-silver-bullet-supply-chain-security.html</loc><lastmod>2024-07-16T21:17:25.618Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-scoping-data-gathering-in-threat-modeling.html</loc><lastmod>2025-10-14T20:17:21.213Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-secure-iot.html</loc><lastmod>2025-10-14T20:15:05.569Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-security-at-speed-of-devops.html</loc><lastmod>2026-02-13T20:43:35.701Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-security-iot-devices.html</loc><lastmod>2025-10-14T20:20:37.143Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-technology-buyers-suppliers-exec-order.html</loc><lastmod>2024-09-16T15:48:36.864Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-threat-modeling-risk-analysis.html</loc><lastmod>2025-10-14T20:13:55.278Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-understanding-your-risk-profile-nist-guidelines.html</loc><lastmod>2024-07-16T22:14:06.924Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-scalability-with-asoc-tools.html</loc><lastmod>2026-02-13T20:44:25.228Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ascdpm-standard-data-protection.html</loc><lastmod>2025-08-28T19:51:08.966Z</lastmod></url><url><loc>https://www.blackduck.com/blog/assessing-maturity-level-of-your-appsec-program.html</loc><lastmod>2026-03-03T18:26:52.852Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ator-burp-plugin-login-sequences.html</loc><lastmod>2023-09-25T19:44:28.203Z</lastmod></url><url><loc>https://www.blackduck.com/blog/attack-tree-diagram.html</loc><lastmod>2024-08-29T16:18:33.044Z</lastmod></url><url><loc>https://www.blackduck.com/blog/attacks-on-tls-vulnerabilities.html</loc><lastmod>2024-07-16T21:17:25.623Z</lastmod></url><url><loc>https://www.blackduck.com/blog/attributes-of-secure-web-application-architecture.html</loc><lastmod>2025-10-14T20:30:28.706Z</lastmod></url><url><loc>https://www.blackduck.com/blog/auditing-dependencies-software-due-diligence.html</loc><lastmod>2024-07-16T22:14:06.925Z</lastmod></url><url><loc>https://www.blackduck.com/blog/auto-software-security-connected-cars.html</loc><lastmod>2024-09-16T16:08:47.958Z</lastmod></url><url><loc>https://www.blackduck.com/blog/automate-your-devsecops-to-take-the-pressure-off-triage.html</loc><lastmod>2025-07-10T18:00:53.721Z</lastmod></url><url><loc>https://www.blackduck.com/blog/automation-in-devsecops.html</loc><lastmod>2025-03-13T14:05:36.329Z</lastmod></url><url><loc>https://www.blackduck.com/blog/automotive-cyber-security-challenges.html</loc><lastmod>2024-09-16T16:07:59.78Z</lastmod></url><url><loc>https://www.blackduck.com/blog/automotive-software-iso-sae-21434.html</loc><lastmod>2025-07-10T18:23:58.117Z</lastmod></url><url><loc>https://www.blackduck.com/blog/avoid-software-security-flaws.html</loc><lastmod>2024-07-16T21:10:03.12Z</lastmod></url><url><loc>https://www.blackduck.com/blog/avoiding-false-positives.html</loc><lastmod>2025-10-14T20:31:52.344Z</lastmod></url><url><loc>https://www.blackduck.com/blog/backdooring-jenkins-builds-and-security-measures.html</loc><lastmod>2024-07-16T21:17:25.625Z</lastmod></url><url><loc>https://www.blackduck.com/blog/beerware-open-source-license.html</loc><lastmod>2024-07-16T21:17:25.629Z</lastmod></url><url><loc>https://www.blackduck.com/blog/benefits-code-scanning-code-review.html</loc><lastmod>2024-08-22T13:57:49.516Z</lastmod></url><url><loc>https://www.blackduck.com/blog/biden-cyber-security-strategy.html</loc><lastmod>2024-09-16T16:10:39.161Z</lastmod></url><url><loc>https://www.blackduck.com/blog/biden-cybersecurity-executive-order.html</loc><lastmod>2026-03-03T15:53:41.225Z</lastmod></url><url><loc>https://www.blackduck.com/blog/binary-code-analysis-use-cases.html</loc><lastmod>2024-07-16T21:17:25.628Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bind-9-vulnerability-discovery.html</loc><lastmod>2024-09-12T13:29:27.544Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-audit-reports.html</loc><lastmod>2024-07-16T21:17:25.635Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-continues-to-expand-vulnerability-prioritization-methods.html</loc><lastmod>2024-09-16T16:12:34.708Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-google-grafeas.html</loc><lastmod>2024-09-12T14:31:48.285Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-iac.html</loc><lastmod>2024-09-03T17:34:26.352Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-new-year-enhancements.html</loc><lastmod>2025-01-17T14:26:04.232Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-rapid-scan.html</loc><lastmod>2024-09-11T15:38:22.707Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-red-hat-quay.html</loc><lastmod>2025-01-30T16:09:16.04Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-sca-vs-black-duck-audit-services.html</loc><lastmod>2024-09-11T17:48:05.143Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-security-advisories-benefits.html</loc><lastmod>2025-01-08T20:07:39.895Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-history-month-aliou-niane.html</loc><lastmod>2024-09-12T14:31:06.081Z</lastmod></url><url><loc>https://www.blackduck.com/blog/blueborne-bluetooth-flaws.html</loc><lastmod>2024-07-16T21:04:10.325Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bob-saget-open-source-license-compliance.html</loc><lastmod>2024-08-26T14:53:53.412Z</lastmod></url><url><loc>https://www.blackduck.com/blog/breach-gpl-license-breach-contract.html</loc><lastmod>2024-07-16T21:17:25.624Z</lastmod></url><url><loc>https://www.blackduck.com/blog/break-car-kits-with-bluetooth-fuzz-testing.html</loc><lastmod>2024-08-29T16:38:25.35Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bsimm-assessment-case-study-cred.html</loc><lastmod>2025-10-14T21:29:24.965Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bsimm-software-security-activities.html</loc><lastmod>2026-03-03T15:52:07.562Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bsimm-trends-and-recommendations.html</loc><lastmod>2025-01-13T21:38:59.483Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bug-bounty-programs.html</loc><lastmod>2024-09-16T16:20:07.823Z</lastmod></url><url><loc>https://www.blackduck.com/blog/build-holistic-appsec-program.html</loc><lastmod>2026-03-03T18:25:56.871Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-sbom-with-black-duck.html</loc><lastmod>2025-09-22T16:54:29.08Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-trust-mergers-and-acquisitions.html</loc><lastmod>2025-10-14T21:01:33.1Z</lastmod></url><url><loc>https://www.blackduck.com/blog/busting-the-sql-stored-procedure-myth.html</loc><lastmod>2024-07-16T21:14:52.645Z</lastmod></url><url><loc>https://www.blackduck.com/blog/byod-workforce-mdm-mam-microsoft-intune.html</loc><lastmod>2025-10-14T20:38:29.33Z</lastmod></url><url><loc>https://www.blackduck.com/blog/caching-security-architecture-knowledge-with-design-patterns.html</loc><lastmod>2024-09-10T19:37:54.897Z</lastmod></url><url><loc>https://www.blackduck.com/blog/case-for-developer-enablement.html</loc><lastmod>2024-08-30T19:48:24.119Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cathedral-and-bazaar-security-vulnerabilities.html</loc><lastmod>2024-09-16T16:21:36.625Z</lastmod></url><url><loc>https://www.blackduck.com/blog/celebrating-pride-month-open-source-community.html</loc><lastmod>2024-08-16T20:40:08.104Z</lastmod></url><url><loc>https://www.blackduck.com/blog/census-2-free-and-open-source-software-report.html</loc><lastmod>2024-09-12T14:52:31.91Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ciso-guide-data-protection.html</loc><lastmod>2025-08-14T13:49:12.513Z</lastmod></url><url><loc>https://www.blackduck.com/blog/clinton-email-security.html</loc><lastmod>2025-10-15T13:48:12.76Z</lastmod></url><url><loc>https://www.blackduck.com/blog/closed-source-open-source-software.html</loc><lastmod>2024-08-26T15:58:43.176Z</lastmod></url><url><loc>https://www.blackduck.com/blog/closing-gender-gap-tech-industry.html</loc><lastmod>2025-03-12T18:41:52.33Z</lastmod></url><url><loc>https://www.blackduck.com/blog/closing-the-cve-gap.html</loc><lastmod>2024-09-16T16:25:39.141Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-application-security-testing-essentials.html</loc><lastmod>2025-10-09T19:15:06.357Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-based-dast-continuous-dynamic.html</loc><lastmod>2026-02-13T21:10:13.078Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-detection-and-response.html</loc><lastmod>2024-07-16T20:51:19.279Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-migration-business.html</loc><lastmod>2024-09-11T14:14:09.339Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-security-with-azure-sentinel.html</loc><lastmod>2025-03-12T17:20:58.1Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-software-supply-chain-security.html</loc><lastmod>2024-07-16T21:17:25.631Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloudbees-synopsys-devsecops.html</loc><lastmod>2024-07-16T21:14:52.647Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloudbleed.html</loc><lastmod>2024-09-16T16:26:47.257Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloudera-ipo-risk-cyberattacks-lawsuits-loss-ip.html</loc><lastmod>2023-10-02T17:31:02.746Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-dependencies-static-analysis-sast.html</loc><lastmod>2025-08-14T13:38:29.264Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-quality-code-security.html</loc><lastmod>2024-07-16T20:51:20.213Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-quality-issues-static-analysis.html</loc><lastmod>2024-07-16T21:17:25.636Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-sight-ide-plugin-2019-4.html</loc><lastmod>2024-07-16T22:03:28.164Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-sight-ide-plugin-sca.html</loc><lastmod>2024-09-11T15:33:52.496Z</lastmod></url><url><loc>https://www.blackduck.com/blog/code-sight-standard-edition-for-developers.html</loc><lastmod>2026-02-13T21:10:56.466Z</lastmod></url><url><loc>https://www.blackduck.com/blog/codenomi-con-black-hat-usa-2019.html</loc><lastmod>2024-07-16T22:14:06.915Z</lastmod></url><url><loc>https://www.blackduck.com/blog/codenomicon-joins-synopsys.html</loc><lastmod>2024-09-11T15:20:07.387Z</lastmod></url><url><loc>https://www.blackduck.com/blog/commercial-software-licenses-software-due-diligence.html</loc><lastmod>2024-08-30T17:33:43.712Z</lastmod></url><url><loc>https://www.blackduck.com/blog/comparing-bdsa-with-nvd-version-accuracy.html</loc><lastmod>2024-08-27T23:32:25.627Z</lastmod></url><url><loc>https://www.blackduck.com/blog/complete-application-security-checklist.html</loc><lastmod>2024-08-26T15:37:54.788Z</lastmod></url><url><loc>https://www.blackduck.com/blog/complete-web-application-security-testing-checklist.html</loc><lastmod>2025-12-22T18:16:38.536Z</lastmod></url><url><loc>https://www.blackduck.com/blog/comply-with-privacy-laws-software-security.html</loc><lastmod>2024-08-23T20:13:09.881Z</lastmod></url><url><loc>https://www.blackduck.com/blog/configure-security-tools-devsecops.html</loc><lastmod>2025-03-12T18:48:09.179Z</lastmod></url><url><loc>https://www.blackduck.com/blog/container-scanning-black-duck-opssight.html</loc><lastmod>2025-01-30T16:10:47.408Z</lastmod></url><url><loc>https://www.blackduck.com/blog/container-security-essentials.html</loc><lastmod>2025-03-12T18:36:17.43Z</lastmod></url><url><loc>https://www.blackduck.com/blog/container-security-guide.html</loc><lastmod>2024-08-28T18:48:55.143Z</lastmod></url><url><loc>https://www.blackduck.com/blog/containerizing-fuzzing-targets.html</loc><lastmod>2024-10-14T20:06:44.829Z</lastmod></url><url><loc>https://www.blackduck.com/blog/continuous-security-testing-without-friction.html</loc><lastmod>2025-01-24T18:14:44.437Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cost-data-breach-2019-most-expensive.html</loc><lastmod>2024-08-29T17:53:31.735Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cost-to-fix-bugs-during-each-sdlc-phase.html</loc><lastmod>2024-09-04T14:58:33.732Z</lastmod></url><url><loc>https://www.blackduck.com/blog/coverity-and-issues-in-third-party-code.html</loc><lastmod>2025-08-28T12:42:23.211Z</lastmod></url><url><loc>https://www.blackduck.com/blog/coverity-development-workflows.html</loc><lastmod>2024-08-23T20:15:43.71Z</lastmod></url><url><loc>https://www.blackduck.com/blog/coverity-static-analysis-results.html</loc><lastmod>2024-08-26T21:02:18.147Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cracking-xenforo-corpuses.html</loc><lastmod>2023-09-08T19:52:20.363Z</lastmod></url><url><loc>https://www.blackduck.com/blog/creating-a-system-model-in-threat-modeling.html</loc><lastmod>2025-10-14T20:10:53.546Z</lastmod></url><url><loc>https://www.blackduck.com/blog/crn-channel-chiefs-tom-herrmann.html</loc><lastmod>2024-07-16T20:51:20.202Z</lastmod></url><url><loc>https://www.blackduck.com/blog/crns-2023-women-of-the-channel-awards.html</loc><lastmod>2024-07-16T20:51:20.183Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cross-browser-development-tips-css.html</loc><lastmod>2024-01-22T23:57:15.634Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cross-site-request-forgery-csrf.html</loc><lastmod>2024-09-11T18:37:11.78Z</lastmod></url><url><loc>https://www.blackduck.com/blog/crypto-mining-malware.html</loc><lastmod>2024-09-12T14:49:23.993Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cryptographic-hash-functions.html</loc><lastmod>2025-10-15T13:46:33.958Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cryptography-best-practices.html</loc><lastmod>2025-08-28T19:51:08.96Z</lastmod></url><url><loc>https://www.blackduck.com/blog/csrf-protection-on-a-login-form.html</loc><lastmod>2024-07-16T21:17:25.619Z</lastmod></url><url><loc>https://www.blackduck.com/blog/culture-management-human-resources.html</loc><lastmod>2025-09-26T13:19:44.702Z</lastmod></url><url><loc>https://www.blackduck.com/blog/custom-and-variant-licenses.html</loc><lastmod>2026-03-02T21:46:02.462Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2014-0073-inappbrowser-vulnerability.html</loc><lastmod>2023-10-03T16:52:29.405Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2017-2636-linux-kernel-double-free-vulnerability.html</loc><lastmod>2024-09-11T17:42:00.803Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2017-5638-apache-struts-vulnerability-explained.html</loc><lastmod>2024-08-21T22:27:03.602Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2018-11776-apache-struts-vulnerability.html</loc><lastmod>2024-08-28T18:05:57.143Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2018-11776-black-duck-security-advisories.html</loc><lastmod>2024-09-16T16:49:37.925Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2018-18907.html</loc><lastmod>2024-09-16T16:50:50.318Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2020-27223-jetty.html</loc><lastmod>2024-09-16T16:52:38.567Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2020-28052-bouncy-castle.html</loc><lastmod>2024-09-16T16:54:11.307Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2020-7958.html</loc><lastmod>2024-09-16T16:55:24.635Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2020-7958-trustlet-tee-attack.html</loc><lastmod>2024-08-29T17:59:41.446Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2021-4034-polkit-vulnerability.html</loc><lastmod>2024-08-16T16:40:50.685Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-backlog.html</loc><lastmod>2024-07-16T21:17:25.623Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-ids-missing.html</loc><lastmod>2024-07-16T21:17:25.629Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyber-physical-attacks.html</loc><lastmod>2026-03-03T15:51:11.555Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyber-security-assurance-levels.html</loc><lastmod>2024-08-16T20:31:18.378Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyber-security-education.html</loc><lastmod>2024-07-16T20:51:20.199Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyber-security-group-unicorn-donkey.html</loc><lastmod>2024-08-26T15:31:29.046Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyber-security-job-rewarding.html</loc><lastmod>2024-09-23T18:02:41.547Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cybersecurity-moonshot.html</loc><lastmod>2024-09-16T16:56:03.118Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cybersecurity-predictions.html</loc><lastmod>2024-09-13T20:21:54.056Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-buffer-overflow-vulnerabilities-linux-kernel-nfsd.html</loc><lastmod>2024-09-13T20:28:12.672Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-cross-site-scripting-vulnerability-black-duck-hub.html</loc><lastmod>2024-09-13T17:51:50.116Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-directus-xss.html</loc><lastmod>2024-08-29T16:04:55.709Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-goautodial-vulnerabilities.html</loc><lastmod>2024-09-16T16:58:39.915Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-ikea-tradfri-smart-lighting.html</loc><lastmod>2024-09-13T20:29:14.808Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-ikea-tradfri-smart-lighting-gateway.html</loc><lastmod>2024-09-13T20:30:08.722Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-kasperksy-vpn-microsoft-windows.html</loc><lastmod>2024-09-13T20:39:26.362Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-nagios-xi.html</loc><lastmod>2024-09-16T16:59:44.141Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-open5gs.html</loc><lastmod>2024-12-11T20:56:09.086Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-open5gs-gtp-library.html</loc><lastmod>2024-12-11T20:45:05.31Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-rabbitmq-emqx-vernemq.html</loc><lastmod>2024-09-16T17:02:24.657Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps.html</loc><lastmod>2024-09-13T20:26:36.782Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-sept2020.html</loc><lastmod>2024-09-13T19:58:06.593Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-spring-vulnerabilities-spring4shell-cve-2022-22963.html</loc><lastmod>2024-09-16T18:04:48.725Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-strapi.html</loc><lastmod>2024-09-13T20:42:08.201Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-zephyr-vulnerability.html</loc><lastmod>2024-09-16T18:47:12.012Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-case-study-linux-kernel-vulnerability.html</loc><lastmod>2024-08-23T18:05:47.081Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-case-study-securing-bind-9.html</loc><lastmod>2024-08-30T17:56:51.516Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-cybersecurity-research-center.html</loc><lastmod>2024-09-11T20:27:20.232Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-report-log4shell.html</loc><lastmod>2024-08-29T18:15:54.386Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-special-report-gaming-apps-security-analysis.html</loc><lastmod>2024-08-26T15:42:13.707Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-analysis-gzip.html</loc><lastmod>2024-07-16T21:17:25.629Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-analysis-repo-jacking.html</loc><lastmod>2024-09-11T20:10:35.874Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-month-curl.html</loc><lastmod>2024-07-16T21:17:25.634Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-month-spring-framework.html</loc><lastmod>2024-09-12T14:41:21.472Z</lastmod></url><url><loc>https://www.blackduck.com/blog/data-breach-attack-path-2019-dbir.html</loc><lastmod>2025-03-10T15:00:13.472Z</lastmod></url><url><loc>https://www.blackduck.com/blog/data-protection-threat-modeling-vulnerability-management.html</loc><lastmod>2024-08-29T18:02:58.109Z</lastmod></url><url><loc>https://www.blackduck.com/blog/data-security-strategy-compliance.html</loc><lastmod>2024-09-11T19:42:33.68Z</lastmod></url><url><loc>https://www.blackduck.com/blog/deep-dive-2023-ossra-report.html</loc><lastmod>2024-07-16T21:08:26.528Z</lastmod></url><url><loc>https://www.blackduck.com/blog/defensics-grpc-support-for-web-mobile-app-testing.html</loc><lastmod>2024-07-16T21:14:52.654Z</lastmod></url><url><loc>https://www.blackduck.com/blog/defensics-sdk-fuzz-custom-protocol.html</loc><lastmod>2024-08-16T20:54:08.306Z</lastmod></url><url><loc>https://www.blackduck.com/blog/defensics-sdk-fuzzing-bitcoin.html</loc><lastmod>2024-09-11T18:30:22.25Z</lastmod></url><url><loc>https://www.blackduck.com/blog/demystifying-cvss-scoring.html</loc><lastmod>2024-09-10T20:16:11.443Z</lastmod></url><url><loc>https://www.blackduck.com/blog/design-quality-software-due-diligence.html</loc><lastmod>2024-09-12T14:40:15.6Z</lastmod></url><url><loc>https://www.blackduck.com/blog/designing-severity-risk-ranking-systems.html</loc><lastmod>2024-07-16T21:17:25.622Z</lastmod></url><url><loc>https://www.blackduck.com/blog/detect-prevent-and-mitigate-buffer-overflow-attacks.html</loc><lastmod>2024-08-21T22:24:10.113Z</lastmod></url><url><loc>https://www.blackduck.com/blog/detecting-heartbleed-with-static-analysis.html</loc><lastmod>2024-07-16T21:17:25.624Z</lastmod></url><url><loc>https://www.blackduck.com/blog/detecting-spectre-vulnerability-exploits-with-static-analysis.html</loc><lastmod>2024-07-16T20:51:20.208Z</lastmod></url><url><loc>https://www.blackduck.com/blog/detection-strategies-to-unmask-the-source-of-malicious-code.html</loc><lastmod>2025-10-28T14:19:38.811Z</lastmod></url><url><loc>https://www.blackduck.com/blog/developers-need-more-than-nvd-vulnerability-data.html</loc><lastmod>2024-09-11T18:16:06.4Z</lastmod></url><url><loc>https://www.blackduck.com/blog/developing-covid-19-track-and-trace-app.html</loc><lastmod>2025-03-12T17:10:25.989Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-best-practices.html</loc><lastmod>2025-08-21T18:08:51.147Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-challenges-benefits.html</loc><lastmod>2024-08-16T15:23:28.849Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-life-cycle.html</loc><lastmod>2024-07-16T21:17:25.633Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-pipeline-checklist.html</loc><lastmod>2024-08-26T13:19:05.475Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-principles.html</loc><lastmod>2024-08-27T19:20:40.361Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-velocity.html</loc><lastmod>2025-10-28T14:18:43.499Z</lastmod></url><url><loc>https://www.blackduck.com/blog/differences-between-open-source-audit-vs-scans.html</loc><lastmod>2024-09-11T19:59:28.448Z</lastmod></url><url><loc>https://www.blackduck.com/blog/digital-shift-creates-fsi-security-challenges.html</loc><lastmod>2026-03-02T21:47:19.418Z</lastmod></url><url><loc>https://www.blackduck.com/blog/discovery-capabilities-black-duck-sca.html</loc><lastmod>2025-01-24T14:20:08.761Z</lastmod></url><url><loc>https://www.blackduck.com/blog/docker-black-duck-hub.html</loc><lastmod>2023-09-27T14:59:29.512Z</lastmod></url><url><loc>https://www.blackduck.com/blog/does-software-quality-equal-software-security.html</loc><lastmod>2025-07-10T17:53:22.04Z</lastmod></url><url><loc>https://www.blackduck.com/blog/doublepulsar.html</loc><lastmod>2024-07-16T21:17:25.62Z</lastmod></url><url><loc>https://www.blackduck.com/blog/dpd-vs-gdpr-key-changes.html</loc><lastmod>2024-07-16T21:17:25.626Z</lastmod></url><url><loc>https://www.blackduck.com/blog/due-diligence-for-private-equity-firms.html</loc><lastmod>2024-07-16T20:51:20.184Z</lastmod></url><url><loc>https://www.blackduck.com/blog/dyn-ddos-attack-iot-vulnerabilities.html</loc><lastmod>2023-09-11T19:00:21.062Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ecommerce-ssl-certificate.html</loc><lastmod>2024-07-16T21:17:25.63Z</lastmod></url><url><loc>https://www.blackduck.com/blog/effective-devsecops-version-control.html</loc><lastmod>2024-08-27T17:55:30.093Z</lastmod></url><url><loc>https://www.blackduck.com/blog/effective-software-security-initiatives.html</loc><lastmod>2024-07-16T21:14:52.643Z</lastmod></url><url><loc>https://www.blackduck.com/blog/effective-software-supply-chain-risk-management.html</loc><lastmod>2024-08-30T18:19:39.927Z</lastmod></url><url><loc>https://www.blackduck.com/blog/eliminate-malicious-code-from-software-supply-chain.html</loc><lastmod>2025-03-12T18:43:42.932Z</lastmod></url><url><loc>https://www.blackduck.com/blog/embedded-iot-security.html</loc><lastmod>2026-03-03T15:49:30.061Z</lastmod></url><url><loc>https://www.blackduck.com/blog/embedded-iot-security/sans-devsecops-survey.html</loc><lastmod>2025-07-10T16:52:33.109Z</lastmod></url><url><loc>https://www.blackduck.com/blog/embedding-security-sdlc.html</loc><lastmod>2024-08-16T20:18:08.18Z</lastmod></url><url><loc>https://www.blackduck.com/blog/encryption-technology-export-requirements.html</loc><lastmod>2025-07-10T17:37:00.339Z</lastmod></url><url><loc>https://www.blackduck.com/blog/equifax-apache-struts-vulnerability-cve-2017-5638.html</loc><lastmod>2025-10-14T20:44:48.267Z</lastmod></url><url><loc>https://www.blackduck.com/blog/esg-survey-findings-software-supply-chain.html</loc><lastmod>2024-09-16T18:50:41.428Z</lastmod></url><url><loc>https://www.blackduck.com/blog/establishing-trust-software-supply-chain-sbom.html</loc><lastmod>2025-03-12T18:46:19.883Z</lastmod></url><url><loc>https://www.blackduck.com/blog/evaluating-roi-software-security.html</loc><lastmod>2025-10-28T14:17:41.069Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fast-application-security-testing-with-the-polaris-platform.html</loc><lastmod>2026-03-02T21:58:54.974Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fda-cybersecurity-guidance.html</loc><lastmod>2024-07-16T21:17:26.198Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fda-ul-2900-2-1-medical-device-security.html</loc><lastmod>2024-09-16T18:57:01.417Z</lastmod></url><url><loc>https://www.blackduck.com/blog/financial-cybersecurity-infographic.html</loc><lastmod>2024-07-16T20:51:20.816Z</lastmod></url><url><loc>https://www.blackduck.com/blog/finding-hard-coded-secrets-before-you-suffer-a-breach.html</loc><lastmod>2025-08-13T20:48:37.911Z</lastmod></url><url><loc>https://www.blackduck.com/blog/forging-sha-1-mac-using-length-extension-attack-python.html</loc><lastmod>2024-07-16T21:17:26.194Z</lastmod></url><url><loc>https://www.blackduck.com/blog/forrester-wave-sca.html</loc><lastmod>2025-12-02T15:47:07.927Z</lastmod></url><url><loc>https://www.blackduck.com/blog/four-aspects-software-due-diligence-audits.html</loc><lastmod>2024-07-16T21:08:26.53Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fragattacks-vulnerabilities-wifi.html</loc><lastmod>2024-07-16T21:17:26.196Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fragment-injection.html</loc><lastmod>2024-07-16T21:14:52.644Z</lastmod></url><url><loc>https://www.blackduck.com/blog/free-and-open-source-software-vulnerability-management.html</loc><lastmod>2024-08-26T13:27:52.129Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fundamentals-of-an-application-security-program.html</loc><lastmod>2024-09-11T20:05:35.938Z</lastmod></url><url><loc>https://www.blackduck.com/blog/future-of-open-source-predictions.html</loc><lastmod>2024-07-16T21:17:26.187Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzz-testing-for-connected-and-autonomous-vehicles.html</loc><lastmod>2024-08-29T18:18:32.122Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzz-testing-questions-answers-recommendations.html</loc><lastmod>2025-03-12T17:05:45.529Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzzing-agent-instrumentation-framework.html</loc><lastmod>2024-10-14T20:07:53.435Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzzing-bitcoin-protocol-defensics-sdk.html</loc><lastmod>2024-07-16T21:04:10.334Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzzing-test-cases-not-all-random.html</loc><lastmod>2024-07-16T21:04:10.335Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gao-cybersecurity-report.html</loc><lastmod>2026-03-03T15:47:43.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gartner-critical-capabilities-appsec-cloud-native-apps.html</loc><lastmod>2026-02-13T22:17:16.61Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gartner-critical-capabilities-appsec-continuous-testing.html</loc><lastmod>2024-09-12T15:06:34.367Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gartner-critical-capabilities-appsec-enterprise-apps.html</loc><lastmod>2026-02-13T22:18:10.102Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gartner-critical-capabilities-appsec-testing-report.html</loc><lastmod>2026-03-02T22:01:00.499Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gartner-mq-ast.html</loc><lastmod>2024-09-03T18:34:51.614Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gdpr-best-practices-application-security.html</loc><lastmod>2024-07-16T21:17:26.177Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gdpr-data-breaches.html</loc><lastmod>2024-09-16T18:58:46.747Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gdpr-enforcement.html</loc><lastmod>2025-08-13T20:39:30.561Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ghostcat-vulnerability-cve-2020-1938.html</loc><lastmod>2025-08-13T20:38:19.663Z</lastmod></url><url><loc>https://www.blackduck.com/blog/github-memcached-ddos.html</loc><lastmod>2024-09-25T15:21:07.999Z</lastmod></url><url><loc>https://www.blackduck.com/blog/github-open-source-projects-copilot.html</loc><lastmod>2024-07-16T21:17:26.197Z</lastmod></url><url><loc>https://www.blackduck.com/blog/government-cybersecurity.html</loc><lastmod>2026-03-03T15:46:51.25Z</lastmod></url><url><loc>https://www.blackduck.com/blog/gplv2-right-to-cure.html</loc><lastmod>2024-09-12T15:03:58.915Z</lastmod></url><url><loc>https://www.blackduck.com/blog/greatest-security-vulnerability.html</loc><lastmod>2024-07-16T21:17:26.166Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hack-apache-struts-cve-2017-9805.html</loc><lastmod>2024-07-16T21:17:26.197Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hacks-leaky-apis.html</loc><lastmod>2024-07-16T21:17:26.194Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hapi-security-plugins.html</loc><lastmod>2024-09-12T15:01:51.369Z</lastmod></url><url><loc>https://www.blackduck.com/blog/heartbleed-bug.html</loc><lastmod>2024-08-28T16:55:39.4Z</lastmod></url><url><loc>https://www.blackduck.com/blog/heartbleed-bug-openssl-vulnerability-lives-on.html</loc><lastmod>2024-07-16T21:17:26.179Z</lastmod></url><url><loc>https://www.blackduck.com/blog/heartbleed-vulnerability.html</loc><lastmod>2024-10-01T16:38:01.95Z</lastmod></url><url><loc>https://www.blackduck.com/blog/heartbleed-vulnerability-appsec-deep-dive.html</loc><lastmod>2024-08-26T13:26:45.811Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hide-and-seek-botnet-iot.html</loc><lastmod>2026-03-03T15:39:30.809Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-open-source-software-audit-works.html</loc><lastmod>2024-09-12T15:24:20.963Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-build-a-red-team.html</loc><lastmod>2025-07-10T18:16:10.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-cybersecurity-software-supply-chain-components.html</loc><lastmod>2025-04-28T17:53:21.765Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-deal-with-legacy-vulnerabilities.html</loc><lastmod>2025-10-09T18:47:49.839Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-fix-poodle-and-why-youre-vulnerable.html</loc><lastmod>2024-07-16T20:51:20.796Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-prevent-ransomware-attacks-2019.html</loc><lastmod>2024-09-16T20:57:45.981Z</lastmod></url><url><loc>https://www.blackduck.com/blog/howard-schmidt-the-united-states-first-cybersecurity-czar-has-died.html</loc><lastmod>2024-09-16T20:56:21.672Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hub-detect-comprehensive-open-source-scanning.html</loc><lastmod>2024-07-16T21:17:26.189Z</lastmod></url><url><loc>https://www.blackduck.com/blog/hub-detect-native-build-ci-tools.html</loc><lastmod>2024-07-16T21:17:26.194Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iast-devsecops-appsec-program.html</loc><lastmod>2024-08-23T20:23:31.441Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iast-questions-answers-recommendations.html</loc><lastmod>2025-01-24T18:29:02.892Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iast-sca-software-security-program.html</loc><lastmod>2025-10-14T20:58:11.442Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ide-based-appsec-code-sight-intellij.html</loc><lastmod>2025-08-13T20:44:17.583Z</lastmod></url><url><loc>https://www.blackduck.com/blog/identify-when-your-web-application-has-been-hacked.html</loc><lastmod>2024-07-16T21:14:52.638Z</lastmod></url><url><loc>https://www.blackduck.com/blog/identifying-resolving-software-vulnerabilities.html</loc><lastmod>2025-10-14T20:56:27.017Z</lastmod></url><url><loc>https://www.blackduck.com/blog/imf-wants-to-pierce-the-blockchain-anonymity-veil.html</loc><lastmod>2024-09-16T20:58:57.857Z</lastmod></url><url><loc>https://www.blackduck.com/blog/improve-devsecops-with-asoc.html</loc><lastmod>2026-02-13T22:20:08.458Z</lastmod></url><url><loc>https://www.blackduck.com/blog/improving-cloud-security-posture-with-infrastructure-as-code.html</loc><lastmod>2024-09-12T15:21:26.953Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ineffective-certificate-pinning-implementations.html</loc><lastmod>2024-08-16T18:46:45.23Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ineffective-security-controls.html</loc><lastmod>2025-07-10T17:19:59.597Z</lastmod></url><url><loc>https://www.blackduck.com/blog/information-technology-software-critical-infrastructure.html</loc><lastmod>2024-09-12T15:20:22.282Z</lastmod></url><url><loc>https://www.blackduck.com/blog/infrastructure-as-code-scanning-capabilities.html</loc><lastmod>2024-09-30T16:54:51.64Z</lastmod></url><url><loc>https://www.blackduck.com/blog/infuse-security-into-your-software-development-life-cycle.html</loc><lastmod>2025-10-09T19:17:29.095Z</lastmod></url><url><loc>https://www.blackduck.com/blog/insecure-sample-code-examples.html</loc><lastmod>2025-08-28T19:51:08.961Z</lastmod></url><url><loc>https://www.blackduck.com/blog/insider-threats-cloud.html</loc><lastmod>2024-10-23T16:45:13.638Z</lastmod></url><url><loc>https://www.blackduck.com/blog/installing-black-duck-hub.html</loc><lastmod>2025-01-30T16:16:34.591Z</lastmod></url><url><loc>https://www.blackduck.com/blog/integrating-automated-ast-tools.html</loc><lastmod>2024-08-26T13:23:47.824Z</lastmod></url><url><loc>https://www.blackduck.com/blog/integrating-coverity-scan-with-gitlab-ci.html</loc><lastmod>2024-08-27T23:44:21.48Z</lastmod></url><url><loc>https://www.blackduck.com/blog/integrating-fuzzing-into-devsecops.html</loc><lastmod>2024-08-23T20:32:52.999Z</lastmod></url><url><loc>https://www.blackduck.com/blog/integrating-touch-id-into-ios-applications.html</loc><lastmod>2024-07-16T21:14:52.641Z</lastmod></url><url><loc>https://www.blackduck.com/blog/internal-network-security.html</loc><lastmod>2024-09-11T19:52:44.289Z</lastmod></url><url><loc>https://www.blackduck.com/blog/international-womens-day-2022-break-the-bias.html</loc><lastmod>2023-09-13T20:36:04.868Z</lastmod></url><url><loc>https://www.blackduck.com/blog/interview-based-due-diligence-vs-software-audits.html</loc><lastmod>2024-09-10T14:00:28.023Z</lastmod></url><url><loc>https://www.blackduck.com/blog/introducing-black-duck-copilot.html</loc><lastmod>2024-09-11T17:44:34.354Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iot-communication-protocols.html</loc><lastmod>2024-07-16T21:17:26.187Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iot-security-challenges.html</loc><lastmod>2026-03-03T15:38:43.553Z</lastmod></url><url><loc>https://www.blackduck.com/blog/iso-sae-21434-automotive.html</loc><lastmod>2024-08-16T20:33:34.722Z</lastmod></url><url><loc>https://www.blackduck.com/blog/issues-when-using-java-securerandom.html</loc><lastmod>2025-01-24T18:58:16.753Z</lastmod></url><url><loc>https://www.blackduck.com/blog/javascript-security-best-practices.html</loc><lastmod>2025-08-28T19:51:08.964Z</lastmod></url><url><loc>https://www.blackduck.com/blog/jda-software-case-study.html</loc><lastmod>2024-07-16T22:12:52.14Z</lastmod></url><url><loc>https://www.blackduck.com/blog/json-license-limitations.html</loc><lastmod>2024-08-26T14:58:50.744Z</lastmod></url><url><loc>https://www.blackduck.com/blog/key-considerations-ma-due-diligence.html</loc><lastmod>2025-11-10T18:12:18.853Z</lastmod></url><url><loc>https://www.blackduck.com/blog/key-differences-java-net-core.html</loc><lastmod>2024-07-16T21:17:26.18Z</lastmod></url><url><loc>https://www.blackduck.com/blog/key-fob-hack-analysis.html</loc><lastmod>2024-08-26T13:33:42.799Z</lastmod></url><url><loc>https://www.blackduck.com/blog/krack-wpa2-protocol-flaw.html</loc><lastmod>2024-07-16T20:51:20.802Z</lastmod></url><url><loc>https://www.blackduck.com/blog/lance-spitzner-secure-human-operating-system-ncsam.html</loc><lastmod>2024-09-17T19:49:31.782Z</lastmod></url><url><loc>https://www.blackduck.com/blog/lifelock-lesson-3rd-party-security.html</loc><lastmod>2024-07-16T21:17:26.19Z</lastmod></url><url><loc>https://www.blackduck.com/blog/linux-kernel-vulnerabilities.html</loc><lastmod>2024-09-12T15:18:54.798Z</lastmod></url><url><loc>https://www.blackduck.com/blog/logging-and-monitoring-best-practices.html</loc><lastmod>2026-02-13T22:20:49.375Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mackey-iot-security.html</loc><lastmod>2026-03-03T15:37:55.23Z</lastmod></url><url><loc>https://www.blackduck.com/blog/malicious-dependency-supply-chain.html</loc><lastmod>2024-08-30T17:54:27.867Z</lastmod></url><url><loc>https://www.blackduck.com/blog/man-in-the-middle-mitm-attack.html</loc><lastmod>2025-10-14T21:02:16.348Z</lastmod></url><url><loc>https://www.blackduck.com/blog/manage-license-compliance-with-black-duck.html</loc><lastmod>2024-08-27T18:58:14.357Z</lastmod></url><url><loc>https://www.blackduck.com/blog/manage-open-source-black-duck.html</loc><lastmod>2024-08-30T18:03:27.976Z</lastmod></url><url><loc>https://www.blackduck.com/blog/manage-open-source-risk.html</loc><lastmod>2025-10-09T18:55:37.515Z</lastmod></url><url><loc>https://www.blackduck.com/blog/manage-risks-with-software-due-diligence.html</loc><lastmod>2025-10-14T21:22:52.106Z</lastmod></url><url><loc>https://www.blackduck.com/blog/manage-vulnerabilities-with-proactive-security-process.html</loc><lastmod>2025-10-14T20:54:42.878Z</lastmod></url><url><loc>https://www.blackduck.com/blog/managed-services-partner-application-security.html</loc><lastmod>2024-07-16T21:14:52.649Z</lastmod></url><url><loc>https://www.blackduck.com/blog/managing-defect-overload-devsecops.html</loc><lastmod>2024-08-23T15:24:35.593Z</lastmod></url><url><loc>https://www.blackduck.com/blog/managing-open-source-software-supply-chain.html</loc><lastmod>2026-03-02T21:48:42.051Z</lastmod></url><url><loc>https://www.blackduck.com/blog/medical-device-security.html</loc><lastmod>2025-08-14T13:54:05.288Z</lastmod></url><url><loc>https://www.blackduck.com/blog/medical-device-security-best-practices.html</loc><lastmod>2024-07-16T21:17:26.166Z</lastmod></url><url><loc>https://www.blackduck.com/blog/medical-devices-ul-fda-standard.html</loc><lastmod>2024-09-17T19:57:38.358Z</lastmod></url><url><loc>https://www.blackduck.com/blog/misra-autosar-compliance-steps.html</loc><lastmod>2024-09-13T17:38:27.601Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigate-java-deserialization-vulnerability-jboss.html</loc><lastmod>2024-08-30T18:22:15.858Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigate-third-party-mobile-keyboard-risk.html</loc><lastmod>2024-07-16T21:17:26.195Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigate-third-party-security-risks.html</loc><lastmod>2024-07-16T21:17:26.179Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-devsecops-challenges.html</loc><lastmod>2025-07-10T16:48:08.963Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-impact-of-log4j-log4shell.html</loc><lastmod>2026-02-13T22:21:53.152Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-xss-why-input-validation-is-bogus.html</loc><lastmod>2023-09-28T18:49:12.552Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitre-2020-cwe-top-25-most-dangerous-software-weaknesses.html</loc><lastmod>2024-09-17T20:00:17.629Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mobile-security-best-practices.html</loc><lastmod>2026-02-13T22:22:44.612Z</lastmod></url><url><loc>https://www.blackduck.com/blog/multi-stack-integration-tests-with-circleci.html</loc><lastmod>2023-10-03T17:08:30.775Z</lastmod></url><url><loc>https://www.blackduck.com/blog/myth-3-penetration-testing-solves-everything.html</loc><lastmod>2025-10-14T21:27:26.067Z</lastmod></url><url><loc>https://www.blackduck.com/blog/navigating-automotive-cybersecurity-with-bsimm12.html</loc><lastmod>2026-02-13T22:23:52.841Z</lastmod></url><url><loc>https://www.blackduck.com/blog/navigating-software-due-diligence-black-duck-audits.html</loc><lastmod>2025-10-14T21:04:52.019Z</lastmod></url><url><loc>https://www.blackduck.com/blog/net-component-vulnerability-analysis.html</loc><lastmod>2024-08-26T14:09:58.833Z</lastmod></url><url><loc>https://www.blackduck.com/blog/network-connected-medical-devices.html</loc><lastmod>2026-03-03T15:36:47.186Z</lastmod></url><url><loc>https://www.blackduck.com/blog/new-government-directives-and-threats-reinforce-urgency-secure-software.html</loc><lastmod>2024-09-11T18:20:15.145Z</lastmod></url><url><loc>https://www.blackduck.com/blog/next-generation-appsec.html</loc><lastmod>2026-02-13T22:24:43.94Z</lastmod></url><url><loc>https://www.blackduck.com/blog/next-steps-black-duck-audit-report.html</loc><lastmod>2024-08-26T14:56:14.031Z</lastmod></url><url><loc>https://www.blackduck.com/blog/nist-cybersecurity-labeling-for-consumer-iot-devices.html</loc><lastmod>2024-09-17T20:02:34.386Z</lastmod></url><url><loc>https://www.blackduck.com/blog/nist-ssdf-secure-software-development-framework.html</loc><lastmod>2025-03-13T14:01:14.51Z</lastmod></url><url><loc>https://www.blackduck.com/blog/no-compromise-saas-ast-solution.html</loc><lastmod>2024-11-05T18:11:31.078Z</lastmod></url><url><loc>https://www.blackduck.com/blog/node-js-license-security-risks.html</loc><lastmod>2024-07-16T21:17:26.182Z</lastmod></url><url><loc>https://www.blackduck.com/blog/node-js-socket-io.html</loc><lastmod>2023-09-11T18:40:48.979Z</lastmod></url><url><loc>https://www.blackduck.com/blog/nodejs-mean-stack-vulnerabilities.html</loc><lastmod>2024-09-12T15:15:27.981Z</lastmod></url><url><loc>https://www.blackduck.com/blog/oauth-2-0-vs-oauth-1-0.html</loc><lastmod>2024-08-21T23:39:29.209Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-dependency-best-practices.html</loc><lastmod>2024-07-16T21:17:26.2Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-license-compliance-dependencies.html</loc><lastmod>2024-09-10T14:06:31.262Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-licenses.html</loc><lastmod>2024-09-10T13:49:46.495Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-ma.html</loc><lastmod>2024-08-28T18:57:22.708Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-management-policy.html</loc><lastmod>2024-09-10T14:02:09.644Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-risks-mergers-acquisitions.html</loc><lastmod>2024-08-28T17:31:11.021Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-security-management.html</loc><lastmod>2025-07-10T16:40:13.581Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-software-supply-chain.html</loc><lastmod>2025-03-12T18:47:12.618Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-trends-ossra-report.html</loc><lastmod>2026-02-25T11:20:31.577Z</lastmod></url><url><loc>https://www.blackduck.com/blog/open-source-vulnerability-management.html</loc><lastmod>2025-09-19T17:02:45.476Z</lastmod></url><url><loc>https://www.blackduck.com/blog/opentsdb.html</loc><lastmod>2024-08-28T15:56:18.779Z</lastmod></url><url><loc>https://www.blackduck.com/blog/oss-warranties-indemnities-tech-transactions.html</loc><lastmod>2024-07-16T21:08:26.537Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-api-security-top-10.html</loc><lastmod>2026-03-03T15:35:44.262Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-broken-access-control.html</loc><lastmod>2024-12-03T16:10:04.1Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-cryptographic-failures.html</loc><lastmod>2025-07-10T17:41:49.257Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-developer-series.html</loc><lastmod>2024-12-03T16:11:24.046Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-injection.html</loc><lastmod>2025-07-10T18:13:54.263Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-insecure-design.html</loc><lastmod>2024-12-03T16:14:11.907Z</lastmod></url><url><loc>https://www.blackduck.com/blog/owasp-top-10-security-misconfiguration.html</loc><lastmod>2024-12-03T16:15:30.058Z</lastmod></url><url><loc>https://www.blackduck.com/blog/password-alternatives.html</loc><lastmod>2024-09-17T20:04:22.687Z</lastmod></url><url><loc>https://www.blackduck.com/blog/path-traversal-defects-oracles-jsf2-implementation.html</loc><lastmod>2025-01-16T14:40:30.099Z</lastmod></url><url><loc>https://www.blackduck.com/blog/paypal-uncovers-tio-networks-data-breach.html</loc><lastmod>2024-08-23T20:38:00.485Z</lastmod></url><url><loc>https://www.blackduck.com/blog/penetration-testing-iot-security.html</loc><lastmod>2024-09-12T17:19:21.673Z</lastmod></url><url><loc>https://www.blackduck.com/blog/permissive-licenses-deserve-respect.html</loc><lastmod>2024-07-16T21:17:26.194Z</lastmod></url><url><loc>https://www.blackduck.com/blog/pluck-cms-vulnerability.html</loc><lastmod>2024-09-12T17:18:18.289Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-fast-static-sca.html</loc><lastmod>2024-09-25T15:12:21.397Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-integrations-secure-development-at-the-speed-of-business.html</loc><lastmod>2024-07-16T22:03:28.161Z</lastmod></url><url><loc>https://www.blackduck.com/blog/poodle.html</loc><lastmod>2024-09-11T18:12:03.15Z</lastmod></url><url><loc>https://www.blackduck.com/blog/poor-software-quality-costs-us.html</loc><lastmod>2024-09-11T22:55:29.706Z</lastmod></url><url><loc>https://www.blackduck.com/blog/preparing-for-openssl-critical-security-vulnerability.html</loc><lastmod>2024-07-16T21:17:26.197Z</lastmod></url><url><loc>https://www.blackduck.com/blog/prevent-cross-site-scripting-java.html</loc><lastmod>2025-07-10T18:12:26.984Z</lastmod></url><url><loc>https://www.blackduck.com/blog/prevent-data-breaches.html</loc><lastmod>2024-08-26T14:45:50.163Z</lastmod></url><url><loc>https://www.blackduck.com/blog/prevent-sql-injection-attacks-cheat-sheet.html</loc><lastmod>2024-07-16T21:14:53.153Z</lastmod></url><url><loc>https://www.blackduck.com/blog/preventing-common-angularjs-vulnerabilities.html</loc><lastmod>2024-07-16T21:17:26.199Z</lastmod></url><url><loc>https://www.blackduck.com/blog/preventing-common-expressjs-mean-stack-vulnerabilities.html</loc><lastmod>2024-07-16T21:17:26.196Z</lastmod></url><url><loc>https://www.blackduck.com/blog/preventing-common-mean-stack-vulnerabilities.html</loc><lastmod>2024-08-30T18:20:52.487Z</lastmod></url><url><loc>https://www.blackduck.com/blog/principles-secure-software-design.html</loc><lastmod>2024-07-16T21:14:53.147Z</lastmod></url><url><loc>https://www.blackduck.com/blog/prioritize-open-source-vulnerabilities.html</loc><lastmod>2024-07-16T22:14:06.922Z</lastmod></url><url><loc>https://www.blackduck.com/blog/prioritizing-open-source-vulnerabilities-in-software-due-diligence.html</loc><lastmod>2026-02-13T22:27:06.534Z</lastmod></url><url><loc>https://www.blackduck.com/blog/proactive-devsecops.html</loc><lastmod>2024-08-26T14:05:15.05Z</lastmod></url><url><loc>https://www.blackduck.com/blog/production-safe-dast.html</loc><lastmod>2024-08-30T17:49:53.107Z</lastmod></url><url><loc>https://www.blackduck.com/blog/proper-use-of-javas-securerandom.html</loc><lastmod>2024-09-17T20:05:12.245Z</lastmod></url><url><loc>https://www.blackduck.com/blog/pros-cons-open-sourcing-election-software.html</loc><lastmod>2024-09-10T16:55:42.464Z</lastmod></url><url><loc>https://www.blackduck.com/blog/protect-iot-devices-from-ddos-attacks.html</loc><lastmod>2025-07-10T18:23:07.038Z</lastmod></url><url><loc>https://www.blackduck.com/blog/protect-web-apps-from-hackers.html</loc><lastmod>2025-10-15T14:12:19.516Z</lastmod></url><url><loc>https://www.blackduck.com/blog/protect-your-website-with-iframes.html</loc><lastmod>2024-09-20T21:32:10.931Z</lastmod></url><url><loc>https://www.blackduck.com/blog/protecting-keys-and-secrets-in-microsoft-azure.html</loc><lastmod>2024-07-16T21:10:03.116Z</lastmod></url><url><loc>https://www.blackduck.com/blog/pseudorandom-number-generation.html</loc><lastmod>2023-10-02T16:04:21.12Z</lastmod></url><url><loc>https://www.blackduck.com/blog/python-pickling.html</loc><lastmod>2025-11-03T18:03:27.633Z</lastmod></url><url><loc>https://www.blackduck.com/blog/python-security-best-practices.html</loc><lastmod>2025-08-28T19:51:08.962Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rapid-scan-appsec-testing-for-developers.html</loc><lastmod>2024-09-10T05:25:19.872Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rapid-scan-sast.html</loc><lastmod>2024-08-26T15:30:02.112Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rapid-scan-static-anniversary-highlights.html</loc><lastmod>2024-07-16T21:17:26.661Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rasp-application-security-testing.html</loc><lastmod>2025-10-14T20:49:04.963Z</lastmod></url><url><loc>https://www.blackduck.com/blog/react-native-libraries-secure-mobile-app-development.html</loc><lastmod>2025-08-13T20:53:24.3Z</lastmod></url><url><loc>https://www.blackduck.com/blog/real-time-owasp-vulnerabilities-code-sight-rapid-scan-static.html</loc><lastmod>2025-08-14T13:35:39.353Z</lastmod></url><url><loc>https://www.blackduck.com/blog/recommendations-not-regulation-for-iot-security.html</loc><lastmod>2026-03-03T15:33:56.103Z</lastmod></url><url><loc>https://www.blackduck.com/blog/red-teaming-playbook.html</loc><lastmod>2025-10-14T20:49:43.874Z</lastmod></url><url><loc>https://www.blackduck.com/blog/regulatory-compliance-challenges.html</loc><lastmod>2024-09-17T20:06:08.723Z</lastmod></url><url><loc>https://www.blackduck.com/blog/remediating-xss-single-fix.html</loc><lastmod>2024-07-16T21:17:26.658Z</lastmod></url><url><loc>https://www.blackduck.com/blog/remote-code-execution-apache-roller-via-ognl-injection.html</loc><lastmod>2023-10-11T20:12:27.549Z</lastmod></url><url><loc>https://www.blackduck.com/blog/responsible-disclosure-on-a-timetable.html</loc><lastmod>2023-09-28T19:38:58.936Z</lastmod></url><url><loc>https://www.blackduck.com/blog/responsible-vulnerability-disclosure-best-practices.html</loc><lastmod>2024-07-16T22:14:06.92Z</lastmod></url><url><loc>https://www.blackduck.com/blog/risk-ranking-applications-2.html</loc><lastmod>2024-07-16T21:17:26.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/robots-txt.html</loc><lastmod>2024-07-16T21:17:26.659Z</lastmod></url><url><loc>https://www.blackduck.com/blog/roca-cryptographic-flaws.html</loc><lastmod>2024-09-17T20:46:47.214Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rocket-chat-privately-hosted-chat-services.html</loc><lastmod>2023-09-09T03:13:34.272Z</lastmod></url><url><loc>https://www.blackduck.com/blog/role-based-security-compliance-training.html</loc><lastmod>2024-07-16T21:14:53.15Z</lastmod></url><url><loc>https://www.blackduck.com/blog/role-randomness-online-gambling.html</loc><lastmod>2024-09-17T20:48:12.07Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ruby-demystified-and-vs.html</loc><lastmod>2023-10-02T18:17:23.377Z</lastmod></url><url><loc>https://www.blackduck.com/blog/running-codexm-checker-with-coverity.html</loc><lastmod>2024-07-16T21:17:26.652Z</lastmod></url><url><loc>https://www.blackduck.com/blog/runtime-application-self-protection-rasp.html</loc><lastmod>2024-08-26T16:00:06.896Z</lastmod></url><url><loc>https://www.blackduck.com/blog/saas-companies-open-source-risk.html</loc><lastmod>2024-07-16T21:17:26.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/safety-detectives-interview-with-tim-mackey.html</loc><lastmod>2024-09-17T20:49:10.829Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sales-engineer-job.html</loc><lastmod>2024-09-17T20:50:16.931Z</lastmod></url><url><loc>https://www.blackduck.com/blog/samsung-galaxy-phone-hack.html</loc><lastmod>2024-09-17T20:51:31.515Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sast-iast-dast-rasp-differences.html</loc><lastmod>2024-08-23T20:41:56.563Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sast-sca-difference.html</loc><lastmod>2025-07-10T16:38:35.78Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sast-vs-dast-difference.html</loc><lastmod>2024-08-22T14:50:07.33Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sbom-your-software-ingredients-list.html</loc><lastmod>2024-08-26T18:50:59.578Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sca-ast-strategy.html</loc><lastmod>2024-09-13T19:54:33.608Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-application-development-best-practices.html</loc><lastmod>2025-03-13T13:58:44.328Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-applications-ransomware-prevention.html</loc><lastmod>2024-08-23T20:43:17.122Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-autonomous-vehicles.html</loc><lastmod>2024-07-16T21:14:53.146Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-e-commerce-applications.html</loc><lastmod>2025-10-14T20:59:39.443Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-enterprise-blockchain.html</loc><lastmod>2025-08-14T13:40:18.678Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-sdlc.html</loc><lastmod>2025-10-14T21:10:39.046Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-software-development-life-cycle-journey.html</loc><lastmod>2026-03-03T15:32:29.883Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-software-development-modern-vehicles.html</loc><lastmod>2024-08-16T20:30:15.161Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-url-redirection-remediation.html</loc><lastmod>2023-09-28T19:48:19.553Z</lastmod></url><url><loc>https://www.blackduck.com/blog/securerandom-implementation.html</loc><lastmod>2024-07-16T21:17:26.659Z</lastmod></url><url><loc>https://www.blackduck.com/blog/securing-password-digests.html</loc><lastmod>2024-08-29T15:49:17.418Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-basics-for-developers.html</loc><lastmod>2026-02-13T22:27:38.286Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-breach-prevention-tips.html</loc><lastmod>2025-08-28T19:51:08.965Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-challenges-cicd-workflows.html</loc><lastmod>2024-08-26T15:12:57.337Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-champions-secure-agile-development.html</loc><lastmod>2024-10-11T13:41:10.737Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-debt.html</loc><lastmod>2024-07-16T21:17:26.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-flaws-vs-bugs.html</loc><lastmod>2025-10-08T12:41:39.072Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-risks-in-mergers-and-acquisitions.html</loc><lastmod>2025-10-14T21:11:29.354Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-risks-that-architecture-analysis-can-resolve.html</loc><lastmod>2024-07-16T21:17:26.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-topics-for-software-developers.html</loc><lastmod>2024-07-16T21:17:26.647Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-training-developers.html</loc><lastmod>2024-07-16T21:17:26.654Z</lastmod></url><url><loc>https://www.blackduck.com/blog/security-vulnerability-assessment-checklist.html</loc><lastmod>2025-12-22T18:09:32.147Z</lastmod></url><url><loc>https://www.blackduck.com/blog/seeker-faq-iast-cicd.html</loc><lastmod>2025-01-24T18:31:14.432Z</lastmod></url><url><loc>https://www.blackduck.com/blog/serial-port-fuzzer-defensics-sdk.html</loc><lastmod>2024-07-16T21:17:26.661Z</lastmod></url><url><loc>https://www.blackduck.com/blog/server-side-graphql-querying-with-elixir-absinthe.html</loc><lastmod>2023-10-02T18:20:42.822Z</lastmod></url><url><loc>https://www.blackduck.com/blog/service-oriented-architecture.html</loc><lastmod>2024-07-16T21:14:53.167Z</lastmod></url><url><loc>https://www.blackduck.com/blog/serving-resources-over-ssl-with-csp-upgrade-insecure-requests.html</loc><lastmod>2025-10-14T21:12:03.226Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sha2-vs-sha1.html</loc><lastmod>2024-07-16T21:14:53.151Z</lastmod></url><url><loc>https://www.blackduck.com/blog/shadow-engineering-applications.html</loc><lastmod>2024-07-16T21:17:26.652Z</lastmod></url><url><loc>https://www.blackduck.com/blog/shared-responsibility-model-cloud-security.html</loc><lastmod>2024-09-12T17:16:46.058Z</lastmod></url><url><loc>https://www.blackduck.com/blog/shift-left-application-security-tools.html</loc><lastmod>2024-07-16T21:14:53.164Z</lastmod></url><url><loc>https://www.blackduck.com/blog/signature-based-detection-examples.html</loc><lastmod>2025-10-14T20:45:39.952Z</lastmod></url><url><loc>https://www.blackduck.com/blog/singhealth-cyber-attack.html</loc><lastmod>2025-08-14T13:47:45.195Z</lastmod></url><url><loc>https://www.blackduck.com/blog/skills-every-application-security-expert-ought-to-have.html</loc><lastmod>2024-07-16T21:17:26.651Z</lastmod></url><url><loc>https://www.blackduck.com/blog/slim-docker-images-for-rails.html</loc><lastmod>2023-10-02T18:23:17.638Z</lastmod></url><url><loc>https://www.blackduck.com/blog/smart-home-fuzzing-defensics.html</loc><lastmod>2024-07-16T21:17:26.644Z</lastmod></url><url><loc>https://www.blackduck.com/blog/smart-shipping-ics-air-gap.html</loc><lastmod>2024-07-16T21:17:26.65Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-bill-of-materials-bom.html</loc><lastmod>2025-10-28T14:20:03.466Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-composition-analysis-tools.html</loc><lastmod>2025-10-15T14:20:23.796Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-due-diligence.html</loc><lastmod>2024-07-16T21:17:26.655Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-due-diligence-benefits.html</loc><lastmod>2024-09-12T17:16:23.751Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-licensing-decisions-consider-dual-licensing.html</loc><lastmod>2024-07-16T21:17:26.661Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-risk-analysis.html</loc><lastmod>2025-10-14T21:10:02.808Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-risks-technical-debt.html</loc><lastmod>2025-03-12T18:34:06.304Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security.html</loc><lastmod>2025-08-28T19:51:08.965Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-activities-for-managing-supply-chain-risks.html</loc><lastmod>2024-08-30T17:59:46.056Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-governance.html</loc><lastmod>2025-10-09T18:53:09.922Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-group-ssg.html</loc><lastmod>2025-10-14T21:12:55.171Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-initiative-fundamentals.html</loc><lastmod>2025-10-09T18:51:13.846Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-program.html</loc><lastmod>2024-07-16T21:17:26.655Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-requirements.html</loc><lastmod>2025-10-15T14:20:47.524Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-sdlc-phases.html</loc><lastmod>2024-07-16T21:17:26.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-shared-responsibility.html</loc><lastmod>2025-10-14T20:55:26.181Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-security-testing.html</loc><lastmod>2024-09-17T21:00:08.16Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-standards-compliance.html</loc><lastmod>2024-07-16T21:17:26.651Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-supply-chain-risk-management.html</loc><lastmod>2025-10-28T14:20:29.303Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-tech-due-diligence.html</loc><lastmod>2024-07-16T20:51:22.113Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-testing-included-in-final-isa-iec-62443-4-1.html</loc><lastmod>2024-07-16T20:51:22.134Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-vulnerability-snapshot-report-findings.html</loc><lastmod>2024-11-12T05:37:26.117Z</lastmod></url><url><loc>https://www.blackduck.com/blog/spring-security-best-practices.html</loc><lastmod>2025-03-10T15:06:13.731Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ssdf-eo-14028.html</loc><lastmod>2024-09-13T20:07:48.232Z</lastmod></url><url><loc>https://www.blackduck.com/blog/stack-overflow-open-source-compliance.html</loc><lastmod>2024-07-16T21:17:26.659Z</lastmod></url><url><loc>https://www.blackduck.com/blog/standard-versus-proprietary-security-protocols.html</loc><lastmod>2026-03-03T15:30:00.907Z</lastmod></url><url><loc>https://www.blackduck.com/blog/static-analysis-for-security.html</loc><lastmod>2024-07-16T20:51:22.133Z</lastmod></url><url><loc>https://www.blackduck.com/blog/static-analysis-testing-6-easy-steps.html</loc><lastmod>2025-10-14T20:54:07.634Z</lastmod></url><url><loc>https://www.blackduck.com/blog/static-analysis-tools-finding-bugs.html</loc><lastmod>2025-10-14T21:31:12.702Z</lastmod></url><url><loc>https://www.blackduck.com/blog/steps-to-integrate-sast-into-devsecops-pipeline.html</loc><lastmod>2025-07-10T17:18:53.783Z</lastmod></url><url><loc>https://www.blackduck.com/blog/stop-paying-for-ssl-certificates.html</loc><lastmod>2023-10-02T18:26:03.976Z</lastmod></url><url><loc>https://www.blackduck.com/blog/subscribe.html</loc><lastmod>2024-07-16T21:17:26.649Z</lastmod></url><url><loc>https://www.blackduck.com/blog/supply-chain-risk-management-federal-government.html</loc><lastmod>2024-07-16T21:17:26.656Z</lastmod></url><url><loc>https://www.blackduck.com/blog/supply-chain-security-best-practices.html</loc><lastmod>2024-11-05T18:45:44.125Z</lastmod></url><url><loc>https://www.blackduck.com/blog/supply-chain-security-risks.html</loc><lastmod>2024-11-05T18:57:21.561Z</lastmod></url><url><loc>https://www.blackduck.com/blog/support-static-analysis-tools-with-manual-code-review.html</loc><lastmod>2025-10-15T13:50:09.142Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sweet32-retire-3des.html</loc><lastmod>2024-07-16T20:51:22.129Z</lastmod></url><url><loc>https://www.blackduck.com/blog/swift-defect-patterns-unreachable-code.html</loc><lastmod>2024-07-16T21:17:26.65Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-acquires-cigital-codiscope.html</loc><lastmod>2024-08-23T20:48:35.211Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-acquires-code-dx-asoc.html</loc><lastmod>2024-08-23T20:55:51.751Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-acquires-tinfoil-security.html</loc><lastmod>2024-07-16T22:03:28.165Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-acquires-whitehat-security.html</loc><lastmod>2024-08-30T18:07:22.126Z</lastmod></url><url><loc>https://www.blackduck.com/blog/action-github.html</loc><lastmod>2024-09-12T14:12:25.739Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-numbering-authority.html</loc><lastmod>2024-07-29T20:00:24.192Z</lastmod></url><url><loc>https://www.blackduck.com/blog/detect-github-action-sast-sca.html</loc><lastmod>2024-08-27T17:55:30.094Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cve-2015-5370-in-sambas-dcerpc-protocol-implementation.html</loc><lastmod>2024-09-12T14:47:35.573Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-global-partner-program-receives-crn-5-star-rating-for-second-consecutive-year.html</loc><lastmod>2024-07-16T20:51:22.138Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-named-leader-forrester-wave-sast.html</loc><lastmod>2025-01-08T19:39:14.469Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-operator-for-red-hat-openshift.html</loc><lastmod>2025-01-30T16:13:18.897Z</lastmod></url><url><loc>https://www.blackduck.com/blog/whitehat.html</loc><lastmod>2024-08-23T20:58:40.171Z</lastmod></url><url><loc>https://www.blackduck.com/blog/take-pressure-off-coding-code-sight.html</loc><lastmod>2024-09-13T20:17:33.669Z</lastmod></url><url><loc>https://www.blackduck.com/blog/take-pressure-off-sans.html</loc><lastmod>2024-09-13T20:13:04.589Z</lastmod></url><url><loc>https://www.blackduck.com/blog/take-the-pain-out-of-pen-testing.html</loc><lastmod>2024-07-16T21:17:26.657Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tanstaafl-the-tragedy-of-the-commons-meets-open-source-software.html</loc><lastmod>2024-07-16T20:51:22.109Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tech-tales-pci-compliance-appsec-testing.html</loc><lastmod>2024-08-16T18:58:13.125Z</lastmod></url><url><loc>https://www.blackduck.com/blog/technology-due-diligence.html</loc><lastmod>2025-03-12T18:50:20.544Z</lastmod></url><url><loc>https://www.blackduck.com/blog/teensafe-data-leak.html</loc><lastmod>2024-07-16T21:02:47.148Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threat-modeling-5g.html</loc><lastmod>2025-10-09T19:23:21.318Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threat-modeling-agile-devsecops.html</loc><lastmod>2024-07-16T21:17:26.649Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threat-modeling-guide.html</loc><lastmod>2025-10-14T20:48:17.92Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threat-modeling-questions.html</loc><lastmod>2024-07-16T21:17:26.659Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threat-modeling-sdlc.html</loc><lastmod>2025-07-10T17:55:39.514Z</lastmod></url><url><loc>https://www.blackduck.com/blog/threats-electronic-voting-systems-insecure.html</loc><lastmod>2024-09-18T14:39:04.495Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tineola-enterprise-blockchain.html</loc><lastmod>2024-05-06T16:47:06.839Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tips-working-remotely-open-source-community.html</loc><lastmod>2024-09-18T14:39:42.358Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tls-1-3.html</loc><lastmod>2024-07-16T21:17:26.654Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-10-free-hacking-tools-for-penetration-testers.html</loc><lastmod>2025-10-23T17:59:20.993Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-10-open-source-legal-issues-2019.html</loc><lastmod>2024-11-05T19:14:44.583Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-10-software-security-best-practices.html</loc><lastmod>2024-08-27T23:22:43.687Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-10-software-vulnerability-list-2019.html</loc><lastmod>2025-07-10T18:15:08.874Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-3-operational-open-source-risk-factors.html</loc><lastmod>2025-01-27T16:29:32.551Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-4-software-development-methodologies.html</loc><lastmod>2025-10-28T14:16:03.029Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-6-application-security-challenges.html</loc><lastmod>2025-10-14T20:51:45.912Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-cloud-security-trends.html</loc><lastmod>2025-10-09T18:42:31.992Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-cyber-security-stories-of-2022.html</loc><lastmod>2024-08-16T20:36:12.101Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-hacking-techniques-of-2015.html</loc><lastmod>2024-07-16T21:14:53.155Z</lastmod></url><url><loc>https://www.blackduck.com/blog/top-open-source-licenses.html</loc><lastmod>2026-03-02T21:44:57.148Z</lastmod></url><url><loc>https://www.blackduck.com/blog/tower-defense-security-strategy.html</loc><lastmod>2024-07-16T21:14:53.16Z</lastmod></url><url><loc>https://www.blackduck.com/blog/track-open-source.html</loc><lastmod>2024-08-27T14:17:11.171Z</lastmod></url><url><loc>https://www.blackduck.com/blog/trojan-source-vulnerability.html</loc><lastmod>2026-03-02T22:01:39.937Z</lastmod></url><url><loc>https://www.blackduck.com/blog/turn-off-tracking-shield-home-spies.html</loc><lastmod>2024-09-18T14:41:00.121Z</lastmod></url><url><loc>https://www.blackduck.com/blog/two-factor-authentication-misconfiguration-bypass.html</loc><lastmod>2024-07-16T21:14:53.161Z</lastmod></url><url><loc>https://www.blackduck.com/blog/types-of-security-vulnerabilities.html</loc><lastmod>2024-08-26T12:53:12.292Z</lastmod></url><url><loc>https://www.blackduck.com/blog/types-penetration-testing.html</loc><lastmod>2024-08-26T13:42:42.009Z</lastmod></url><url><loc>https://www.blackduck.com/blog/understanding-apple-goto-fail-vulnerability-2.html</loc><lastmod>2024-09-20T21:33:06.762Z</lastmod></url><url><loc>https://www.blackduck.com/blog/understanding-how-why-open-source-audits.html</loc><lastmod>2024-07-16T21:17:26.657Z</lastmod></url><url><loc>https://www.blackduck.com/blog/understanding-python-bytecode.html</loc><lastmod>2025-10-15T13:42:16.407Z</lastmod></url><url><loc>https://www.blackduck.com/blog/unlicensed-open-source-scenarios.html</loc><lastmod>2024-08-30T18:05:20.936Z</lastmod></url><url><loc>https://www.blackduck.com/blog/us-data-privacy-law-gdpr.html</loc><lastmod>2025-10-14T20:24:28.558Z</lastmod></url><url><loc>https://www.blackduck.com/blog/use-sast-sca-together.html</loc><lastmod>2024-08-27T14:13:26.995Z</lastmod></url><url><loc>https://www.blackduck.com/blog/using-agpl-adoption.html</loc><lastmod>2025-02-26T18:20:00.927Z</lastmod></url><url><loc>https://www.blackduck.com/blog/using-safetynet-api.html</loc><lastmod>2023-09-29T15:48:45.478Z</lastmod></url><url><loc>https://www.blackduck.com/blog/using-scss-in-your-vue-components.html</loc><lastmod>2023-10-02T18:39:11.059Z</lastmod></url><url><loc>https://www.blackduck.com/blog/value-of-sast-plus-penetration-testing.html</loc><lastmod>2024-07-16T21:07:33.981Z</lastmod></url><url><loc>https://www.blackduck.com/blog/voting-system-vulnerabilities.html</loc><lastmod>2024-07-16T21:14:53.867Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerabilities-core-linux-foundation-report.html</loc><lastmod>2024-09-18T14:43:51.383Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerability-criticality-risk-ranking-vulnerabilities.html</loc><lastmod>2024-07-16T21:17:26.661Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerability-management-triage-3-steps.html</loc><lastmod>2024-07-16T21:17:26.662Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerability-remediation-4-options.html</loc><lastmod>2024-09-11T22:57:14.63Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerable-routers-hackers.html</loc><lastmod>2024-09-18T14:44:35.835Z</lastmod></url><url><loc>https://www.blackduck.com/blog/web-application-security-basics.html</loc><lastmod>2024-08-23T21:04:45.299Z</lastmod></url><url><loc>https://www.blackduck.com/blog/web-application-security-testing-coverity.html</loc><lastmod>2026-02-13T22:30:55.032Z</lastmod></url><url><loc>https://www.blackduck.com/blog/web-application-security-threats-countermeasures.html</loc><lastmod>2025-10-15T13:45:14.967Z</lastmod></url><url><loc>https://www.blackduck.com/blog/web-appsec-interview-questions.html</loc><lastmod>2024-09-04T14:57:25.847Z</lastmod></url><url><loc>https://www.blackduck.com/blog/what-are-ethical-hackers.html</loc><lastmod>2024-09-18T14:45:26.621Z</lastmod></url><url><loc>https://www.blackduck.com/blog/what-caused-equifax-breach.html</loc><lastmod>2024-08-27T16:59:30.29Z</lastmod></url><url><loc>https://www.blackduck.com/blog/what-cybersecurity-executive-order-means-for-private-sector.html</loc><lastmod>2024-07-16T21:17:26.653Z</lastmod></url><url><loc>https://www.blackduck.com/blog/what-is-cloud-native-container-security.html</loc><lastmod>2024-07-16T21:17:26.65Z</lastmod></url><url><loc>https://www.blackduck.com/blog/what-pen-testing-can-tell-you-about-the-health-of-your-sdlc.html</loc><lastmod>2025-07-10T17:51:18.245Z</lastmod></url><url><loc>https://www.blackduck.com/blog/whatever-happened-to-stuxnet.html</loc><lastmod>2025-10-14T21:32:01.222Z</lastmod></url><url><loc>https://www.blackduck.com/blog/whats-hidden-in-container-images.html</loc><lastmod>2025-10-15T13:44:17.858Z</lastmod></url><url><loc>https://www.blackduck.com/blog/whos-afraid-gpl3.html</loc><lastmod>2024-07-16T21:17:27.237Z</lastmod></url><url><loc>https://www.blackduck.com/blog/why-cross-site-scripting-still-matters.html</loc><lastmod>2024-09-10T19:19:05.2Z</lastmod></url><url><loc>https://www.blackduck.com/blog/why-devops-choose-iast.html</loc><lastmod>2024-07-16T21:14:53.848Z</lastmod></url><url><loc>https://www.blackduck.com/blog/why-open-source-due-diligence-ma.html</loc><lastmod>2024-07-16T21:17:27.226Z</lastmod></url><url><loc>https://www.blackduck.com/blog/wlan-fuzzing-defensics.html</loc><lastmod>2024-07-16T21:17:27.237Z</lastmod></url><url><loc>https://www.blackduck.com/blog/working-through-licensing-issues-in-open-source-audits.html</loc><lastmod>2024-07-16T21:17:27.233Z</lastmod></url><url><loc>https://www.blackduck.com/blog/wormwood-graphql-testing.html</loc><lastmod>2023-10-03T18:13:50.178Z</lastmod></url><url><loc>https://www.blackduck.com/blog/wpa-authentication-fuzz-testing.html</loc><lastmod>2024-09-13T19:49:24.962Z</lastmod></url><url><loc>https://www.blackduck.com/blog/wpa2-encryption-bypass-defensics-fuzzing.html</loc><lastmod>2024-07-16T21:17:27.225Z</lastmod></url><url><loc>https://www.blackduck.com/blog/write-checkers-codexm.html</loc><lastmod>2024-09-12T17:28:51.268Z</lastmod></url><url><loc>https://www.blackduck.com/blog/write-coverity-checker-codexm.html</loc><lastmod>2024-07-16T21:17:27.231Z</lastmod></url><url><loc>https://www.blackduck.com/blog/wyden-cdpa-draft-consumer-privacy.html</loc><lastmod>2024-09-18T18:50:44.823Z</lastmod></url><url><loc>https://www.blackduck.com/blog/xml-external-entity-injection.html</loc><lastmod>2024-07-16T21:14:53.868Z</lastmod></url><url><loc>https://www.blackduck.com/blog/zero-day-exploit-log4j-analysis.html</loc><lastmod>2024-09-16T20:41:42.496Z</lastmod></url><url><loc>https://www.blackduck.com/blog/zero-day-vulnerability-whats-special.html</loc><lastmod>2024-09-18T18:51:26.164Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded--easy-to-scale-with-polaris.html</loc><lastmod>2024-11-05T18:16:04.925Z</lastmod></url><url><loc>https://www.blackduck.com/blog/connecting-the-dots-due-diligence.html</loc><lastmod>2025-03-12T17:14:08.457Z</lastmod></url><url><loc>https://www.blackduck.com/blog/periodic-cloud-security-risk-assessments.html</loc><lastmod>2024-08-30T18:29:18.977Z</lastmod></url><url><loc>https://www.blackduck.com/blog/2023-fortress-cyber-security-award.html</loc><lastmod>2023-10-02T21:15:41.304Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-advisory-cve-2023-32353.html</loc><lastmod>2024-09-13T20:03:39.318Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fuzz-testing-and-medical-devices.html</loc><lastmod>2025-07-10T18:22:01.385Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-governance-framework.html</loc><lastmod>2024-08-28T18:54:52.157Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-ease-of-use-with-polaris.html</loc><lastmod>2024-07-16T22:03:28.166Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-quality-gauging-strengths-and-weaknesses.html</loc><lastmod>2024-09-04T19:11:18.144Z</lastmod></url><url><loc>https://www.blackduck.com/blog/continuous-scanning-in-your-production-environment.html</loc><lastmod>2024-08-30T18:24:37.021Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sboms-for-connected-medical-devices.html</loc><lastmod>2025-10-14T20:46:24.223Z</lastmod></url><url><loc>https://www.blackduck.com/blog/2023-ossra-deep-dive-high-risk-vulnerabilities.html</loc><lastmod>2025-10-09T19:19:40.746Z</lastmod></url><url><loc>https://www.blackduck.com/blog/podcast-ep1-current-state-of-devops.html</loc><lastmod>2024-09-13T20:01:55.342Z</lastmod></url><url><loc>https://www.blackduck.com/blog/creating-a-well-rounded-microsoft-365-security-program.html</loc><lastmod>2024-07-16T20:51:20.196Z</lastmod></url><url><loc>https://www.blackduck.com/blog/malicious-packages-npm.html</loc><lastmod>2025-10-14T20:42:33.973Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-integrations.html</loc><lastmod>2024-09-11T20:38:52.005Z</lastmod></url><url><loc>https://www.blackduck.com/blog/why-nontechnical-organizations-need-due-diligence.html</loc><lastmod>2025-10-15T14:13:09.741Z</lastmod></url><url><loc>https://www.blackduck.com/blog/challenges-of-interoperability-in-fuzz-testing.html</loc><lastmod>2024-08-30T19:39:15.44Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-consolidation.html</loc><lastmod>2024-09-11T14:24:29.16Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-platform-secure-development.html</loc><lastmod>2024-09-11T15:29:35.88Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-security-in-podcast-machine-learning-ai.html</loc><lastmod>2024-09-12T14:54:19.475Z</lastmod></url><url><loc>https://www.blackduck.com/blog/avoiding-integration-pitfalls.html</loc><lastmod>2024-09-12T13:24:52.072Z</lastmod></url><url><loc>https://www.blackduck.com/blog/compliance-continuous-dynamic.html</loc><lastmod>2024-08-30T17:32:58.251Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-due-diligence-for-pe-vc.html</loc><lastmod>2024-07-16T21:17:26.66Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-risk-manager.html</loc><lastmod>2025-01-24T15:33:56.681Z</lastmod></url><url><loc>https://www.blackduck.com/blog/nowsecure.html</loc><lastmod>2024-09-04T19:08:16.562Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-code-warrior-partnership.html</loc><lastmod>2025-08-28T19:51:08.96Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-ai-code-analysis-service.html</loc><lastmod>2025-03-12T17:16:32.291Z</lastmod></url><url><loc>https://www.blackduck.com/blog/the-rise-of-ai-in-software-development.html</loc><lastmod>2025-10-14T21:07:45.112Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-security-into-existing-scm-workflows-code-dx.html</loc><lastmod>2024-09-10T22:28:55.616Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-cve-2023-0871-opennms.html</loc><lastmod>2025-08-21T18:06:48.831Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cross-platform-devsecops.html</loc><lastmod>2025-01-09T20:25:11.037Z</lastmod></url><url><loc>https://www.blackduck.com/blog/eliminate-false-positives-with-continuous-dynamic.html</loc><lastmod>2025-10-14T20:43:50.794Z</lastmod></url><url><loc>https://www.blackduck.com/blog/build-security-in-podcast-new-risk-strategies.html</loc><lastmod>2024-08-26T15:49:15.865Z</lastmod></url><url><loc>https://www.blackduck.com/blog/the-parallels-of-ai-and-open-source-in-software-development.html</loc><lastmod>2025-10-14T21:05:39.272Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-advisory-cve-2023-2453.html</loc><lastmod>2025-03-11T17:14:59.691Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-safeguard-your-ai-ecosystem.html</loc><lastmod>2025-01-21T22:49:26.747Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-engagement-summary-report.html</loc><lastmod>2024-09-12T14:32:35.413Z</lastmod></url><url><loc>https://www.blackduck.com/blog/national-coding-week-secure-code-training.html</loc><lastmod>2025-08-28T19:51:08.963Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sans-devsecops-survey.html</loc><lastmod>2024-10-17T04:38:18.353Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devops-integrations-risk-detection-remediation.html</loc><lastmod>2025-08-28T19:51:08.963Z</lastmod></url><url><loc>https://www.blackduck.com/blog/keysight-partnership.html</loc><lastmod>2024-09-10T22:48:35.918Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-audits-inform-post-close-ma-strategies.html</loc><lastmod>2025-11-10T18:12:18.852Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devops-integrations-to-elevate-devsecops.html</loc><lastmod>2025-08-28T19:51:08.964Z</lastmod></url><url><loc>https://www.blackduck.com/blog/xml-external-entity-injection-opennms.html</loc><lastmod>2025-10-14T20:41:36.249Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-devsecops-report.html</loc><lastmod>2025-10-14T20:33:34.698Z</lastmod></url><url><loc>https://www.blackduck.com/blog/critical-libcurl-curl-vulnerabilities.html</loc><lastmod>2025-10-14T21:06:34.09Z</lastmod></url><url><loc>https://www.blackduck.com/blog/curl-libcurl-vulnerabilities-response.html</loc><lastmod>2024-08-23T14:14:32.464Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-security-in-podcast-future-state-challenges.html</loc><lastmod>2024-04-18T22:30:20.776Z</lastmod></url><url><loc>https://www.blackduck.com/blog/business-risk-of-technical-debt.html</loc><lastmod>2024-09-11T19:36:03.119Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-report-impact-of-aspm.html</loc><lastmod>2024-09-11T15:10:01.539Z</lastmod></url><url><loc>https://www.blackduck.com/blog/benefits-of-business-logic-assessments.html</loc><lastmod>2025-10-14T20:34:55.908Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sboms-and-spdx.html</loc><lastmod>2025-03-12T18:39:52.632Z</lastmod></url><url><loc>https://www.blackduck.com/blog/critical-capabilities-software-supply-chain.html</loc><lastmod>2024-09-12T14:50:32.679Z</lastmod></url><url><loc>https://www.blackduck.com/blog/automated-scans-versus-audits-for-sca.html</loc><lastmod>2025-03-12T18:51:42.711Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-security-in-podcast-ai-cloud-quantam-computing.html</loc><lastmod>2024-08-16T19:56:23.336Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-consolidation-to-enhance-risk-management.html</loc><lastmod>2024-09-10T20:44:36.948Z</lastmod></url><url><loc>https://www.blackduck.com/blog/importance-of-continuous-testing-in-software-development.html</loc><lastmod>2025-09-30T19:15:28.931Z</lastmod></url><url><loc>https://www.blackduck.com/blog/consolidate-insight-to-enhance-risk-management.html</loc><lastmod>2024-08-28T20:03:03.172Z</lastmod></url><url><loc>https://www.blackduck.com/blog/customers-choice-award-gartner-peer-insights.html</loc><lastmod>2024-09-11T22:51:12.931Z</lastmod></url><url><loc>https://www.blackduck.com/blog/making-intelligent-tradeoffs-software-due-diligence.html</loc><lastmod>2025-10-14T21:02:58.18Z</lastmod></url><url><loc>https://www.blackduck.com/blog/consolidate-effort-for-enhanced-appsec.html</loc><lastmod>2025-10-14T20:40:02.773Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-for-developer-velocity.html</loc><lastmod>2025-09-30T19:15:28.935Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-advisory-cve-2023-51448.html</loc><lastmod>2024-08-26T06:20:37.806Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mergers-and-acquisitions-insurance.html</loc><lastmod>2024-09-12T15:16:27.05Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mobile-app-security-testing-flutter-dart.html</loc><lastmod>2024-09-10T20:51:10.741Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-implementing-devsecops.html</loc><lastmod>2025-09-30T19:15:28.938Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-generate-an-sbom.html</loc><lastmod>2026-03-16T17:50:20.804Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-decoded-how-to-implement-devsecops.html</loc><lastmod>2025-09-30T19:15:28.936Z</lastmod></url><url><loc>https://www.blackduck.com/blog/test-mode-enhancements-defensics-fuzz-testing.html</loc><lastmod>2025-10-14T21:33:15.323Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-best-practices0.html</loc><lastmod>2024-09-12T15:08:37.345Z</lastmod></url><url><loc>https://www.blackduck.com/blog/integrating-ai-in-sdlc.html</loc><lastmod>2025-03-12T17:18:11.429Z</lastmod></url><url><loc>https://www.blackduck.com/blog/building-security-in-podcast-cybersecurity-and-ai.html</loc><lastmod>2024-09-12T14:55:01.033Z</lastmod></url><url><loc>https://www.blackduck.com/blog/navigating-complexity-in-appsec.html</loc><lastmod>2026-03-02T22:03:20.058Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-playbook-tips-for-successful-devsecops.html</loc><lastmod>2025-07-10T18:06:44.611Z</lastmod></url><url><loc>https://www.blackduck.com/blog/appsec-for-ai-generated-code.html</loc><lastmod>2024-09-10T19:59:41.418Z</lastmod></url><url><loc>https://www.blackduck.com/blog/zombie-dead-code.html</loc><lastmod>2026-03-03T15:59:12.837Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-software-development-attestation-form.html</loc><lastmod>2025-10-14T20:28:35.435Z</lastmod></url><url><loc>https://www.blackduck.com/blog/fast-dynamic-dast.html</loc><lastmod>2025-01-24T15:16:38.592Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ossra-license-compliance-risks.html</loc><lastmod>2025-05-16T17:09:20.672Z</lastmod></url><url><loc>https://www.blackduck.com/blog/moving-away-from-native-apps.html</loc><lastmod>2024-08-29T15:55:07.23Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-vulnerability-advisory-cve-2023-7060-missing-security-control-zephyr.html</loc><lastmod>2024-08-30T19:36:45.966Z</lastmod></url><url><loc>https://www.blackduck.com/blog/update-NIST-to-improve-cybersecurity-posture.html</loc><lastmod>2024-08-27T23:52:14.312Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-the-supply-chain-black-duck-supply-chain-edition.html</loc><lastmod>2025-02-05T17:55:14.752Z</lastmod></url><url><loc>https://www.blackduck.com/blog/sans-report-expanding-appsec-attack-surface.html</loc><lastmod>2024-08-22T14:48:40.168Z</lastmod></url><url><loc>https://www.blackduck.com/blog/how-to-manage-risk-at-scale.html</loc><lastmod>2025-07-21T15:48:51.11Z</lastmod></url><url><loc>https://www.blackduck.com/blog/xz-utils-backdoor-supply-chain-attack.html</loc><lastmod>2024-08-22T17:54:29.791Z</lastmod></url><url><loc>https://www.blackduck.com/blog/solving-telecom-network-security-challenges-with-defensics.html</loc><lastmod>2025-10-14T21:28:34.906Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-assist-ai-powered-appsec-assistant.html</loc><lastmod>2025-09-24T20:09:55.124Z</lastmod></url><url><loc>https://www.blackduck.com/blog/synopsys-reaches-agreement-to-sell-software-integrity-group.html</loc><lastmod>2024-07-16T21:17:26.645Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-supply-chain-security-report.html</loc><lastmod>2024-08-23T14:43:52.607Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-prompt-injection-emailgpt.html</loc><lastmod>2024-09-03T17:20:15.912Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-data-poisoning-embedai.html</loc><lastmod>2024-09-12T22:56:55.939Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-generated-code-security.html</loc><lastmod>2024-10-25T18:48:25.589Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ssdf-bsimm14-mapping-update.html</loc><lastmod>2025-10-14T21:30:06.498Z</lastmod></url><url><loc>https://www.blackduck.com/blog/a-new-chapter-for-the-synopsys-software-integrity-group.html</loc><lastmod>2024-09-27T14:15:28.779Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-risk-business-risk.html</loc><lastmod>2024-08-28T14:53:00.633Z</lastmod></url><url><loc>https://www.blackduck.com/blog/our-new-beginning-as-black-duck.html</loc><lastmod>2026-02-13T22:26:17.705Z</lastmod></url><url><loc>https://www.blackduck.com/blog/generative-ai-tools-appsec-risk.html</loc><lastmod>2025-03-12T17:08:16.672Z</lastmod></url><url><loc>https://www.blackduck.com/blog/stronger-appsec-for-developers-in-ide.html</loc><lastmod>2026-02-13T22:29:23.024Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cloud-native-app-development-challenges-and-solutions.html</loc><lastmod>2024-10-22T12:58:22.063Z</lastmod></url><url><loc>https://www.blackduck.com/blog/generative-ai-risks-in-software.html</loc><lastmod>2025-05-07T17:50:49.178Z</lastmod></url><url><loc>https://www.blackduck.com/blog/changes-challenges-pci-dss.html</loc><lastmod>2024-11-04T19:43:06.241Z</lastmod></url><url><loc>https://www.blackduck.com/blog/artificial-intelligence-widens-gap-between-security-development.html</loc><lastmod>2026-03-02T21:49:45.186Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-LightFTP.html</loc><lastmod>2025-08-13T20:36:25.305Z</lastmod></url><url><loc>https://www.blackduck.com/blog/overcome-ast-noise-find-fix-software-vulnerabilities.html</loc><lastmod>2025-09-30T19:15:28.933Z</lastmod></url><url><loc>https://www.blackduck.com/blog/reduce-appsec-friction-with-security-automation-integration.html</loc><lastmod>2025-09-30T19:15:28.938Z</lastmod></url><url><loc>https://www.blackduck.com/blog/analyze-ai-generated-code-black-duck-snippet-api.html</loc><lastmod>2025-02-03T19:47:05.478Z</lastmod></url><url><loc>https://www.blackduck.com/blog/deepseek-license.html</loc><lastmod>2025-02-04T15:27:45.292Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html</loc><lastmod>2025-02-05T16:56:01.63Z</lastmod></url><url><loc>https://www.blackduck.com/blog/AI-driven-security.html</loc><lastmod>2025-10-09T19:42:17.933Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ossra-addresses-common-open-source-questions.html</loc><lastmod>2025-03-12T15:30:31.265Z</lastmod></url><url><loc>https://www.blackduck.com/blog/true-scale-application-security.html</loc><lastmod>2025-04-28T13:05:19.873Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-ai-generated-code-with-devsecops.html</loc><lastmod>2025-08-28T19:51:08.964Z</lastmod></url><url><loc>https://www.blackduck.com/blog/10-years-of-ossra-report-insights.html</loc><lastmod>2026-03-03T18:31:28.53Z</lastmod></url><url><loc>https://www.blackduck.com/blog/build-reliability-into-developer-workflow.html</loc><lastmod>2025-06-17T21:57:09.727Z</lastmod></url><url><loc>https://www.blackduck.com/blog/qa-open-source-software-risk-2025.html</loc><lastmod>2025-11-03T19:12:25.781Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-cpp-software-reliability.html</loc><lastmod>2025-06-11T19:28:19.333Z</lastmod></url><url><loc>https://www.blackduck.com/blog/managing-transitive-dependencies-open-source-software.html</loc><lastmod>2025-06-11T19:28:41.886Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-named-2025-intellyx-digital-innovator-award-winner.html</loc><lastmod>2025-06-11T19:29:43.953Z</lastmod></url><url><loc>https://www.blackduck.com/blog/rapid-scan-static-malicious-urls-detect-compromised-code.html</loc><lastmod>2025-06-16T22:55:38.193Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-powered-code-compliance-strategies.html</loc><lastmod>2025-06-23T20:12:25.328Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vulnerability-reachability-in-sca.html</loc><lastmod>2025-06-30T14:49:14.688Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-polaris-application-security-saudi-arabia-gulf-cooperation-council-gcc.html</loc><lastmod>2025-07-07T16:32:06.373Z</lastmod></url><url><loc>https://www.blackduck.com/blog/understanding-fda-section-524b-medical-device-cybersecurity.html</loc><lastmod>2025-07-08T23:26:40.337Z</lastmod></url><url><loc>https://www.blackduck.com/blog/the-black-duck-way--strong-culture-drives-leadership.html</loc><lastmod>2025-07-15T15:55:45.159Z</lastmod></url><url><loc>https://www.blackduck.com/blog/eu-cyber-resilience-act-compliance.html</loc><lastmod>2026-03-02T21:57:52.961Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-vulnerability-snapshot-2024.html</loc><lastmod>2025-10-08T12:37:35.29Z</lastmod></url><url><loc>https://www.blackduck.com/blog/userevidence-appsec-study-findings.html</loc><lastmod>2025-10-31T18:59:08.221Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bdsa-ai-vulnerability-research.html</loc><lastmod>2025-10-08T10:17:32.885Z</lastmod></url><url><loc>https://www.blackduck.com/blog/third-party-due-diligence-code-risk-assessment.html</loc><lastmod>2025-08-05T00:33:18.251Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-assist-ai-code-security.html</loc><lastmod>2025-09-11T17:15:17.201Z</lastmod></url><url><loc>https://www.blackduck.com/blog/nist-ssdf-secure-software-development.html</loc><lastmod>2025-10-15T13:47:23.756Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-ai-coding-risks.html</loc><lastmod>2025-10-08T09:42:26.879Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-security-github-app.html</loc><lastmod>2025-09-16T13:45:21.249Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-ai-risks-in-software-development.html</loc><lastmod>2025-11-03T18:21:35.015Z</lastmod></url><url><loc>https://www.blackduck.com/blog/embedded-software-quality-safety-challenges.html</loc><lastmod>2025-11-03T20:00:57.608Z</lastmod></url><url><loc>https://www.blackduck.com/blog/recent-npm-software-supply-chain-attack-security-lessons.html</loc><lastmod>2025-10-15T19:47:11.624Z</lastmod></url><url><loc>https://www.blackduck.com/blog/npm-malware-attack-shai-hulud-threat.html</loc><lastmod>2025-10-28T20:30:26.753Z</lastmod></url><url><loc>https://www.blackduck.com/blog/application-security-risk-scoring-ai-age.html</loc><lastmod>2025-09-30T20:38:33.47Z</lastmod></url><url><loc>https://www.blackduck.com/blog/mitigating-ai-risks-in-software-development0.html</loc><lastmod>2025-11-19T00:05:20.398Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-fast-dynamic-ai-assisted-authentication.html</loc><lastmod>2025-10-02T21:49:00.117Z</lastmod></url><url><loc>https://www.blackduck.com/blog/polaris-september-2025-release-enhancements.html</loc><lastmod>2025-10-03T14:49:28.237Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-in-devsecops-balancing-innovation-and-security.html</loc><lastmod>2025-10-15T22:45:32.98Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-leader-2025-gartner-magic-quadrant-application-security-testing.html</loc><lastmod>2025-10-14T15:07:19.799Z</lastmod></url><url><loc>https://www.blackduck.com/blog/scaling-authenticated-dast-generative-llms-vault-backed-credentials.html</loc><lastmod>2025-10-20T13:02:51.934Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-product-updates-faster-fixes-smarter-security.html</loc><lastmod>2025-11-14T19:43:30.443Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-ai-model-scanning.html</loc><lastmod>2025-11-11T22:23:56.199Z</lastmod></url><url><loc>https://www.blackduck.com/blog/secure-vibe-coding-ai-development-cybersecurity.html</loc><lastmod>2025-11-24T16:52:34.745Z</lastmod></url><url><loc>https://www.blackduck.com/blog/embedded-software-survey-ai-adoption-code-quality.html</loc><lastmod>2025-12-02T03:07:57.563Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-signal-ai-application-security.html</loc><lastmod>2025-12-09T22:05:02.463Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-coding-security-gap-software-supply-chain-risk.html</loc><lastmod>2025-12-17T12:17:16.681Z</lastmod></url><url><loc>https://www.blackduck.com/blog/devsecops-automation-reduces-appsec-friction-2025.html</loc><lastmod>2025-12-16T21:01:11.105Z</lastmod></url><url><loc>https://www.blackduck.com/blog/vibe-coding-and-its-implications.html</loc><lastmod>2026-01-06T23:15:03.052Z</lastmod></url><url><loc>https://www.blackduck.com/blog/broadcom-wifi-chipset-vulnerability-router-security.html</loc><lastmod>2026-01-14T16:06:22.339Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-cyrc-tp-link-be400-cve-2025-14631.html</loc><lastmod>2026-01-13T17:59:26.482Z</lastmod></url><url><loc>https://www.blackduck.com/blog/cyrc-discovers-asus-tplink-wlan-vulnerabilities.html</loc><lastmod>2026-01-13T18:19:51.135Z</lastmod></url><url><loc>https://www.blackduck.com/blog/2026-ai-security-appsec-predictions.html</loc><lastmod>2026-01-21T20:22:11.554Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-coding-assistant-security-risks-benefits-devsecops-2025.html</loc><lastmod>2026-01-26T21:22:04.166Z</lastmod></url><url><loc>https://www.blackduck.com/blog/bsimm16-benchmark-enterprise-programs.html</loc><lastmod>2026-02-04T12:19:33.925Z</lastmod></url><url><loc>https://www.blackduck.com/blog/event-driven-application-security-automation.html</loc><lastmod>2026-02-05T21:54:30.537Z</lastmod></url><url><loc>https://www.blackduck.com/blog/winter-olympics-cybersecurity-threats-prevention-2026.html</loc><lastmod>2026-02-17T18:35:21.487Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-due-diligence-framework-software-investment.html</loc><lastmod>2026-04-01T18:14:48.754Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-security-confidence-vs-reality-devsecops.html</loc><lastmod>2026-03-04T01:46:02.639Z</lastmod></url><url><loc>https://www.blackduck.com/blog/guided-by-feedback--smarter-fuzzing-with-defensics.html</loc><lastmod>2026-03-09T21:55:21.64Z</lastmod></url><url><loc>https://www.blackduck.com/blog/unlimited-test-cases--the-power-of-generative-fuzzing.html</loc><lastmod>2026-03-09T21:56:09.058Z</lastmod></url><url><loc>https://www.blackduck.com/blog/feedback-through-agents--moving-beyond-verdictonly-instrumentati.html</loc><lastmod>2026-03-09T19:54:50.445Z</lastmod></url><url><loc>https://www.blackduck.com/blog/software-quality-audits-ma-due-diligence.html</loc><lastmod>2026-03-17T00:10:18.796Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-application-security-bsimm16-insights.html</loc><lastmod>2026-03-17T23:28:07.648Z</lastmod></url><url><loc>https://www.blackduck.com/blog/black-duck-signal-security-that-moves-at-the-speed-of-ai.html</loc><lastmod>2026-03-20T20:32:10.753Z</lastmod></url><url><loc>https://www.blackduck.com/blog/coverity-connect-cve-2026-1496-security-advisory.html</loc><lastmod>2026-03-27T14:21:52.762Z</lastmod></url><url><loc>https://www.blackduck.com/blog/ai-devsecops-investment-strategies.html</loc><lastmod>2026-04-01T00:53:08.546Z</lastmod></url><url><loc>https://www.blackduck.com/blog/quirky-open-source-licenses-guide.html</loc><lastmod>2026-04-01T00:51:00.534Z</lastmod></url></urlset>