<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.blackduck.com/ja-jp.html</loc><lastmod>2026-01-30T15:04:01.231Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-risk-manager.html</loc><lastmod>2026-01-14T20:19:28.33Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-risk-manager/demo.html</loc><lastmod>2025-09-19T20:50:32.148Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-risk-manager/demo/thankyou.html</loc><lastmod>2025-10-10T20:10:55.262Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/platform.html</loc><lastmod>2026-03-02T17:38:53.247Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/platform/demo.html</loc><lastmod>2025-10-10T18:19:58.99Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/platform/demo/thankyou.html</loc><lastmod>2025-10-10T18:25:16.171Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/platform/get-pricing.html</loc><lastmod>2025-10-10T18:23:31.285Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/platform/get-pricing/thankyou.html</loc><lastmod>2025-10-10T18:24:47.986Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast.html</loc><lastmod>2026-01-13T00:54:44.137Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/coverity.html</loc><lastmod>2025-12-04T22:52:13.652Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/coverity/get-pricing.html</loc><lastmod>2025-09-19T20:51:35.243Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/coverity/get-pricing/thankyou.html</loc><lastmod>2025-09-08T15:28:39.881Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/coverity/demo.html</loc><lastmod>2025-12-04T22:54:42.775Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/coverity/demo/thankyou.html</loc><lastmod>2025-09-25T16:24:38.371Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/static-analysis-tools-sast/demo.html</loc><lastmod>2025-12-04T22:56:07.821Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools.html</loc><lastmod>2026-03-02T17:25:53.067Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/vulnerability-reporting.html</loc><lastmod>2026-01-14T19:39:18.417Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/demo.html</loc><lastmod>2025-10-10T20:41:40.248Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/knowledgebase.html</loc><lastmod>2025-12-04T23:35:53.044Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/open-source-scanning.html</loc><lastmod>2025-12-04T23:37:02.101Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/binary-analysis.html</loc><lastmod>2025-12-04T23:41:20.599Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/black-duck-sca.html</loc><lastmod>2025-12-04T23:46:33.648Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/black-duck-sca/get-pricing.html</loc><lastmod>2025-12-04T23:55:08.498Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/black-duck-sca/get-pricing/thankyou.html</loc><lastmod>2025-09-08T15:42:55.573Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/black-duck-sca/demo.html</loc><lastmod>2025-09-19T20:49:23.624Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/software-composition-analysis-tools/black-duck-sca/demo/thankyou.html</loc><lastmod>2025-09-08T15:47:06.098Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/code-sight.html</loc><lastmod>2026-01-21T16:01:44.356Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/fuzz-testing.html</loc><lastmod>2026-03-30T02:17:29.684Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/fuzz-testing/get-pricing.html</loc><lastmod>2025-12-05T01:27:11.069Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/fuzz-testing/get-pricing/thankyou.html</loc><lastmod>2025-10-10T21:27:51.649Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/interactive-application-security-testing.html</loc><lastmod>2025-12-05T01:29:14.499Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/interactive-application-security-testing/demo.html</loc><lastmod>2025-12-05T01:30:26.537Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/interactive-application-security-testing/demo/thankyou.html</loc><lastmod>2025-10-10T21:36:09.437Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/interactive-application-security-testing/get-pricing.html</loc><lastmod>2025-10-10T21:44:21.487Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/interactive-application-security-testing/get-pricing/thankyou.html</loc><lastmod>2025-09-08T18:46:30.577Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast.html</loc><lastmod>2026-03-02T17:43:53.368Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast/demo.html</loc><lastmod>2025-12-05T16:15:47.98Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast/demo/thankyou.html</loc><lastmod>2025-10-10T22:31:03.382Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast/get-pricing.html</loc><lastmod>2025-12-05T16:16:21.759Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast/get-pricing/thankyou.html</loc><lastmod>2025-10-10T22:53:44.372Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/dast/continuous-dynamic.html</loc><lastmod>2026-03-02T17:48:15.446Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services.html</loc><lastmod>2025-12-05T16:23:12.201Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services/open-source-software-audit.html</loc><lastmod>2025-10-10T23:12:28.82Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services/open-source-software-audit/thankyou.html</loc><lastmod>2025-10-10T23:23:01.824Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services/security-program.html</loc><lastmod>2025-12-05T16:26:02.481Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services/security-program/bsimm-maturity-model.html</loc><lastmod>2026-03-10T02:03:36.192Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/services/security-program/maturity-action-plan.html</loc><lastmod>2025-12-05T16:52:25.325Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions.html</loc><lastmod>2026-02-13T20:06:16.383Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/application-security-testing.html</loc><lastmod>2026-02-05T23:10:11.926Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/devsecops.html</loc><lastmod>2025-12-05T17:02:52.894Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/cloud-security.html</loc><lastmod>2025-12-05T17:40:15.221Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/open-source-security.html</loc><lastmod>2025-12-05T17:48:19.801Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/mergers-and-acquisitions.html</loc><lastmod>2025-12-05T20:28:39.234Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/compliance.html</loc><lastmod>2026-03-25T14:35:03.689Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/financial-services.html</loc><lastmod>2025-12-06T00:35:53.755Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/iot-embedded.html</loc><lastmod>2026-03-09T14:19:48.374Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/automotive.html</loc><lastmod>2026-02-05T23:10:40.774Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/government.html</loc><lastmod>2025-12-08T17:46:55.662Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/healthcare.html</loc><lastmod>2026-02-05T23:11:15.323Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/dev-devops.html</loc><lastmod>2025-12-08T18:12:23.329Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/software-supply-chain-security.html</loc><lastmod>2026-03-10T02:12:19.836Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/api-security-testing.html</loc><lastmod>2025-12-08T19:47:13.507Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/enterprise-application-security-risk-management.html</loc><lastmod>2026-03-13T15:45:19.432Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/artificial-intelligence-software-development.html</loc><lastmod>2025-12-08T21:31:19.004Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/container-security.html</loc><lastmod>2025-12-08T21:58:09.505Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/eu-cyber-resilience-act-compliance.html</loc><lastmod>2026-01-23T23:09:57.533Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/solutions/embedded-software-security.html</loc><lastmod>2026-03-09T15:45:14.704Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources.html</loc><lastmod>2025-10-09T23:39:00.273Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets.html</loc><lastmod>2025-12-09T00:28:50.032Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/coverity-static-analysis.html</loc><lastmod>2025-11-04T08:04:09.943Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/developer-security-training.html</loc><lastmod>2025-09-30T16:30:53.991Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/bsimm.html</loc><lastmod>2025-11-10T03:03:43.496Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/code-sight.html</loc><lastmod>2025-11-04T08:07:59.919Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/black-duck-binary-analysis.html</loc><lastmod>2025-11-07T03:07:53.583Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/automotive-system-security.html</loc><lastmod>2025-09-30T16:34:34.143Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/polaris.html</loc><lastmod>2025-11-04T08:08:59.964Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/black-duck-product-services-portfolio.html</loc><lastmod>2025-11-12T01:23:07.029Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/ssdf-readiness-assessment.html</loc><lastmod>2025-09-30T16:37:07.096Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/secrets-detection.html</loc><lastmod>2025-11-12T01:29:09.244Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/continuous-dynamic.html</loc><lastmod>2025-09-30T16:38:52.136Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/black-duck-sca.html</loc><lastmod>2025-09-30T16:29:31.999Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/software-risk-manager.html</loc><lastmod>2025-11-10T03:13:40.051Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/coverity-pci-dss.html</loc><lastmod>2025-09-30T16:41:05.405Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/seeker-iast.html</loc><lastmod>2025-11-04T08:10:44.689Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/global-partner-program.html</loc><lastmod>2025-09-30T16:42:31.595Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/maturity-action-plan.html</loc><lastmod>2025-09-30T16:43:39.755Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/defensics-fuzz-testing.html</loc><lastmod>2025-09-30T16:44:29.915Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/supply-chain-services.html</loc><lastmod>2025-09-30T16:45:19.385Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/coverity-qualification-kit.html</loc><lastmod>2025-09-30T16:46:24.812Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/eu-cra-solution-brief.html</loc><lastmod>2025-09-30T16:47:39.2Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/datasheets/ai-powered-appsec-solutions.html</loc><lastmod>2026-01-29T07:59:12.854Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks.html</loc><lastmod>2025-12-09T00:32:42.524Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/the-state-of-api-security.html</loc><lastmod>2025-09-19T18:37:29.574Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/the-state-of-api-security/thankyou.html</loc><lastmod>2025-09-18T21:06:29.246Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/securing-software-supply-chain.html</loc><lastmod>2025-09-19T18:39:07.199Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/securing-software-supply-chain/thankyou.html</loc><lastmod>2025-09-19T16:02:15.709Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/actionable-software-bill-of-materials.html</loc><lastmod>2025-09-19T16:13:56.696Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/actionable-software-bill-of-materials/thankyou.html</loc><lastmod>2022-07-13T02:15:44.999Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/build-software-security-initiative.html</loc><lastmod>2025-09-19T18:41:07.598Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/build-software-security-initiative/thankyou.html</loc><lastmod>2024-03-06T23:11:14.12Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/navigate-devops-security.html</loc><lastmod>2025-10-27T16:57:28.573Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/navigate-devops-security/thankyou.html</loc><lastmod>2024-03-06T23:14:03.418Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/manage-appsec-risk-enterprise-scale.html</loc><lastmod>2025-09-19T18:44:10.517Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/manage-appsec-risk-enterprise-scale/thankyou.html</loc><lastmod>2025-09-19T14:55:22.149Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/application-security-consolidation.html</loc><lastmod>2025-09-19T18:44:38.408Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/cisa-sboms-guide.html</loc><lastmod>2025-10-27T14:51:38.334Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/cisa-sboms-guide/thankyou.html</loc><lastmod>2025-09-19T16:23:18.992Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/appsec-financial-services-myths-vs-reality.html</loc><lastmod>2025-09-19T16:38:42.253Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/appsec-financial-services-myths-vs-reality/thankyou.html</loc><lastmod>2025-09-19T16:39:39.91Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/pci-dss-compliance-guide.html</loc><lastmod>2025-09-19T16:33:24.648Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/pci-dss-compliance-guide/thankyou.html</loc><lastmod>2025-09-19T16:34:28.931Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/iast-101.html</loc><lastmod>2025-09-19T16:30:18.586Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/iast-101/thankyou.html</loc><lastmod>2025-09-19T16:31:21.185Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/ssdf-guide.html</loc><lastmod>2025-09-19T15:51:48.407Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/ssdf-guide/thankyou.html</loc><lastmod>2024-12-19T13:26:52.553Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/c-coding-security-best-practices.html</loc><lastmod>2025-09-19T15:57:23.402Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/c-coding-security-best-practices/thankyou.html</loc><lastmod>2025-05-07T09:00:25.707Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/software-supply-chain-regulations-and-sca.html</loc><lastmod>2025-10-27T18:42:44.127Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/software-supply-chain-regulations-and-sca/thankyou.html</loc><lastmod>2025-07-03T06:21:15.26Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/enhance-risk-visibility-in-ai-development.html</loc><lastmod>2025-09-19T18:49:09.521Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/ebooks/enhance-risk-visibility-in-ai-development/thankyou.html</loc><lastmod>2025-08-19T09:39:18.244Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports.html</loc><lastmod>2025-12-09T00:27:04.312Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/automotive-cyber-security.html</loc><lastmod>2025-09-19T18:50:38.166Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/automotive-cyber-security/thankyou.html</loc><lastmod>2025-09-18T15:09:16.042Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-security-financial-services.html</loc><lastmod>2025-09-18T19:21:17.156Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-security-financial-services/thankyou.html</loc><lastmod>2025-09-18T19:22:43.081Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/modern-application-development.html</loc><lastmod>2025-09-18T19:32:02.262Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/modern-application-development/thankyou.html</loc><lastmod>2025-09-18T19:37:03.411Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/forrester-wave-sast.html</loc><lastmod>2025-10-30T14:28:29.727Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/forrester-wave-sast/thankyou.html</loc><lastmod>2024-10-25T21:50:41.26Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/cost-poor-quality-software.html</loc><lastmod>2025-09-19T18:53:17.275Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/cost-poor-quality-software/thankyou.html</loc><lastmod>2025-09-18T19:16:54.744Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/open-source-security-risk-analysis.html</loc><lastmod>2026-03-26T00:41:38.77Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/open-source-security-risk-analysis/thankyou.html</loc><lastmod>2026-03-25T07:10:33.052Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/gartner-magic-quadrant-appsec.html</loc><lastmod>2026-01-26T15:38:28.316Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/gartner-magic-quadrant-appsec/thankyou.html</loc><lastmod>2025-10-14T15:02:33.673Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/forrester-wave-software-composition-analysis.html</loc><lastmod>2026-01-26T15:30:13.653Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/forrester-wave-software-composition-analysis/thankyou.html</loc><lastmod>2026-02-09T02:48:43.649Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-vulnerability-trends.html</loc><lastmod>2025-09-19T18:54:55.788Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-vulnerability-trends/thankyou.html</loc><lastmod>2025-09-18T20:00:00.22Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/gitops-and-shift-left-security.html</loc><lastmod>2025-09-18T20:42:56.283Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/gitops-and-shift-left-security/thankyou.html</loc><lastmod>2022-08-25T05:53:30.821Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/bsimm.html</loc><lastmod>2026-03-10T14:24:12.953Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/bsimm/thankyou.html</loc><lastmod>2025-09-18T15:14:35.119Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/state-of-devsecops.html</loc><lastmod>2026-02-04T16:58:38.173Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/state-of-devsecops/thankyou.html</loc><lastmod>2026-02-02T07:51:00.108Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-supply-chain-security.html</loc><lastmod>2025-09-19T18:56:33.517Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/software-supply-chain-security/thankyou.html</loc><lastmod>2025-09-18T19:55:52.334Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/pwc-supplychain.html</loc><lastmod>2025-09-18T19:50:08.689Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/pwc-supplychain/thankyou.html</loc><lastmod>2025-09-18T19:51:03.497Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/state-of-embedded-software-quality-and-safety.html</loc><lastmod>2025-12-02T04:12:06.417Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/analyst-reports/state-of-embedded-software-quality-and-safety/thankyou.html</loc><lastmod>2025-10-21T02:11:54.266Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/webinars.html</loc><lastmod>2025-12-09T00:23:49.081Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers.html</loc><lastmod>2025-12-09T00:36:38.147Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/ISO26262-guidelines.html</loc><lastmod>2025-09-19T17:24:05.775Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/ISO26262-guidelines/thankyou.html</loc><lastmod>2025-09-19T17:25:04.872Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/agile-software-development.html</loc><lastmod>2025-09-19T17:08:54.15Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/agile-software-development/thankyou.html</loc><lastmod>2025-09-19T17:11:21.116Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/BytheNumbers-MobileAppSecurityRisksinFSI.html</loc><lastmod>2025-10-09T17:50:58.041Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/BytheNumbers-MobileAppSecurityRisksinFSI/thankyou.html</loc><lastmod>2024-10-14T09:47:35.953Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/fda-security-controls.html</loc><lastmod>2025-09-19T17:20:27.536Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/fda-security-controls/thankyou.html</loc><lastmod>2022-03-09T16:15:39.199Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/ma-open-source-audits.html</loc><lastmod>2025-09-19T17:27:24.506Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/ma-open-source-audits/thankyou.html</loc><lastmod>2025-09-19T17:29:03.157Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/securing-5g-iot-with-fuzzing.html</loc><lastmod>2025-09-19T18:00:51.454Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/securing-5g-iot-with-fuzzing/thankyou.html</loc><lastmod>2022-03-09T16:15:38.263Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/State-of-OSS-in-FSI.html</loc><lastmod>2025-09-24T16:16:10.712Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/State-of-OSS-in-FSI/thankyou.html</loc><lastmod>2024-10-14T09:57:58.121Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/supply-chain-resiliency-white-paper.html</loc><lastmod>2025-09-24T16:13:39.301Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/supply-chain-resiliency-white-paper/thankyou.html</loc><lastmod>2022-03-09T16:15:38.703Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/fuzzing-agent-instrumentation-framework.html</loc><lastmod>2025-09-24T16:11:48.237Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/fuzzing-agent-instrumentation-framework/thankyou.html</loc><lastmod>2022-03-09T16:15:39.409Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/evolving-devsecops-at-speed-of-ai.html</loc><lastmod>2025-09-19T17:18:22.125Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/white-papers/evolving-devsecops-at-speed-of-ai/thankyou.html</loc><lastmod>2025-06-09T16:53:39.933Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/case-studies.html</loc><lastmod>2025-12-08T23:09:14.294Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/case-studies/jda.html</loc><lastmod>2025-12-08T23:13:05.234Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/case-studies/fpt-software.html</loc><lastmod>2025-12-08T23:47:18.754Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/case-studies/genetec.html</loc><lastmod>2025-12-09T00:16:00.82Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/resources/cybersecurity-research-center.html</loc><lastmod>2025-12-09T00:38:15.044Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success.html</loc><lastmod>2025-12-09T00:44:49.541Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/implementation.html</loc><lastmod>2025-12-12T00:48:45.846Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/implementation-deployment-info.html</loc><lastmod>2025-12-12T00:50:38.168Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/implementation-deployment-info/thankyou.html</loc><lastmod>2025-09-15T12:34:57.412Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/support-contact.html</loc><lastmod>2025-12-12T00:52:28.284Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/support-contact/thankyou.html</loc><lastmod>2025-09-12T13:13:11.581Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/customer-success/premium.html</loc><lastmod>2025-12-12T00:55:30.518Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/contact-sales.html</loc><lastmod>2025-12-12T00:56:28.366Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/contact-sales/thankyou.html</loc><lastmod>2025-09-15T12:33:48.204Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/all-products-services.html</loc><lastmod>2025-12-12T00:58:24.453Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/trial.html</loc><lastmod>2025-12-12T01:00:25.018Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/trial/thankyou.html</loc><lastmod>2025-09-11T19:16:53.025Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary.html</loc><lastmod>2026-01-13T15:28:23.758Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-application-security-posture-management.html</loc><lastmod>2026-02-13T20:15:17.883Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-application-security.html</loc><lastmod>2025-09-15T17:32:58.157Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-software-supply-chain-security.html</loc><lastmod>2025-09-16T21:03:55.209Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-web-application-penetration-testing.html</loc><lastmod>2025-09-16T21:10:12.633Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-security-risk-assessment.html</loc><lastmod>2025-09-16T15:58:41.006Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-iast.html</loc><lastmod>2026-03-30T06:12:44.606Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-owasp-top-10.html</loc><lastmod>2025-09-15T19:15:52.49Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-cicd.html</loc><lastmod>2025-09-30T19:15:28.933Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-sast.html</loc><lastmod>2026-03-30T06:08:37.299Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-cryptography.html</loc><lastmod>2025-09-15T18:25:25.575Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-red-teaming.html</loc><lastmod>2025-09-16T15:42:16.504Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-continuous-development.html</loc><lastmod>2025-09-15T18:23:47.035Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-bsimm.html</loc><lastmod>2025-09-15T17:47:07.814Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-application-security-testing-orchestration.html</loc><lastmod>2025-09-15T17:37:44.83Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-binary-code-binary-analysis.html</loc><lastmod>2025-09-15T17:45:21.839Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-code-review.html</loc><lastmod>2025-09-15T18:04:54.454Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-dast.html</loc><lastmod>2025-09-16T15:19:32.479Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-api-security-testing.html</loc><lastmod>2025-09-15T17:30:53.017Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-threat-modeling.html</loc><lastmod>2025-09-16T21:07:28.754Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-vulnerability-assessment.html</loc><lastmod>2025-09-16T21:09:18.95Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-devops.html</loc><lastmod>2025-09-15T18:32:01.283Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-software-architecture.html</loc><lastmod>2025-09-16T20:55:07.217Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-open-source-software.html</loc><lastmod>2025-09-15T19:08:23.704Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-agile-sdlc.html</loc><lastmod>2025-09-15T17:29:46.18Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-policy-as-code.html</loc><lastmod>2026-02-13T20:11:55.767Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-5g.html</loc><lastmod>2025-09-15T17:28:10.236Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-mobile-application-security.html</loc><lastmod>2025-09-15T19:06:55.557Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-application-security-orchestration-and-correlation.html</loc><lastmod>2026-02-13T20:14:30.329Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-sdlc.html</loc><lastmod>2026-02-25T22:02:26.574Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-devsecops.html</loc><lastmod>2025-09-15T18:43:20.812Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-penetration-testing.html</loc><lastmod>2025-09-16T15:23:55.482Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-application-vulnerability-correlation.html</loc><lastmod>2025-09-15T17:39:48.007Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-fuzz-testing.html</loc><lastmod>2025-09-15T18:56:31.351Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-cloud-penetration-testing.html</loc><lastmod>2026-02-13T20:10:03.086Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-web-application-security.html</loc><lastmod>2025-09-16T21:12:08.376Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/glossary/what-is-software-composition-analysis.html</loc><lastmod>2026-03-30T06:06:42.993Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog.html</loc><lastmod>2025-10-10T00:02:09.556Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors.html</loc><lastmod>2023-08-25T18:30:42.819Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/black-duck-editorial-team.html</loc><lastmod>2024-09-20T21:18:08.76Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/jacob-wilson.html</loc><lastmod>2025-02-05T17:56:14.573Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/masato-yoshii.html</loc><lastmod>2025-02-05T17:59:53.027Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/allon-mureinik.html</loc><lastmod>2024-09-13T17:13:24.961Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/boris-cipot.html</loc><lastmod>2024-09-13T17:18:25.252Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/christopher-cummings.html</loc><lastmod>2024-09-13T17:29:53.791Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/charlotte-freeman.html</loc><lastmod>2024-09-13T17:30:22.982Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/black-duck-cybersecurity-research-center.html</loc><lastmod>2025-02-05T17:57:38.807Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/mike-mcguire.html</loc><lastmod>2024-09-13T17:26:10.662Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/raj-kesarapalli.html</loc><lastmod>2024-09-13T17:23:33.462Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/taylor-armerding.html</loc><lastmod>2024-09-13T17:22:26.093Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/anna-chiang.html</loc><lastmod>2023-10-03T20:16:26.831Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/arvinder-saini.html</loc><lastmod>2024-09-13T17:17:23.757Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/chai-bhat.html</loc><lastmod>2023-10-16T18:43:10.223Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/christopher-fearon.html</loc><lastmod>2023-10-16T18:41:10.573Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/chandu-ketkar.html</loc><lastmod>2024-09-13T17:19:24.548Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/jamie-boote.html</loc><lastmod>2024-09-13T17:29:13.711Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/jonathan-knudsen.html</loc><lastmod>2023-10-16T18:38:30.592Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/john-steven.html</loc><lastmod>2023-10-16T18:38:56.053Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/kris-balarama.html</loc><lastmod>2024-09-13T17:26:49.724Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/kimm-yeo.html</loc><lastmod>2023-10-16T18:37:31.164Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/monika-chakraborty.html</loc><lastmod>2024-09-13T17:25:33.665Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/natasha-gupta.html</loc><lastmod>2024-09-13T17:25:01.956Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/phil-odence.html</loc><lastmod>2024-09-13T17:24:20.184Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/james-rabon.html</loc><lastmod>2023-10-16T18:29:05.794Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/tanay-sethi.html</loc><lastmod>2023-10-16T18:31:21.014Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/toyoki-fujimoto.html</loc><lastmod>2025-02-05T17:58:55.498Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/tuomo-untinen.html</loc><lastmod>2024-09-13T17:22:02.235Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/asma-zubair.html</loc><lastmod>2025-02-05T18:01:52.983Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/dr-dennis-kengo-oka.html</loc><lastmod>2023-10-16T18:40:37.249Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/jim-ivers.html</loc><lastmod>2024-09-13T17:28:43.297Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/kari-hulkko.html</loc><lastmod>2024-09-13T17:27:24.261Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/shandra-gemmiti.html</loc><lastmod>2023-10-16T18:32:14.784Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/steven-zimmerman.html</loc><lastmod>2024-09-13T17:22:57.628Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/testuya-nakano.html</loc><lastmod>2025-02-05T17:56:50.879Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/matthew-hogg.html</loc><lastmod>2025-02-05T17:55:33.864Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/authors/jamie-harris.html</loc><lastmod>2025-02-05T18:00:48.217Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/category.html</loc><lastmod>2023-10-16T18:46:14.53Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/3-ways-improve-software-development-skills.html</loc><lastmod>2024-08-21T20:52:33.485Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/5-types-of-software-licenses-you-need-to-understand.html</loc><lastmod>2024-09-11T17:57:13.39Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/5g-security-fuzzing.html</loc><lastmod>2023-10-12T05:45:39.129Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/a-deep-dive-on-pluck-cms-vulnerability-cve-2023-25828.html</loc><lastmod>2024-09-11T20:46:11.68Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/amca-breach.html</loc><lastmod>2025-02-13T15:07:38.477Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/apache-struts-research-environments.html</loc><lastmod>2025-08-14T13:44:07.121Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/apache-struts-research-exploitation.html</loc><lastmod>2024-09-23T19:41:22.012Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/api-security-testing.html</loc><lastmod>2024-07-16T21:46:37.041Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/application-security-vs-software-security.html</loc><lastmod>2024-09-10T15:36:15.253Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/applying-automotive-tara-method.html</loc><lastmod>2024-07-16T21:50:09.156Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/appsec-decoded-biden-cybersecurity-standards.html</loc><lastmod>2024-09-10T13:55:24.292Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/appsec-decoded-open-source-trends-ossra-report.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/appsec-scalability-with-asoc-tools.html</loc><lastmod>2024-08-27T19:31:10.539Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/assessing-maturity-level-of-your-appsec-program.html</loc><lastmod>2024-08-27T19:42:52.794Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/attributes-of-secure-web-application-architecture.html</loc><lastmod>2024-07-16T21:46:37.037Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/automotive-cyber-security-challenges.html</loc><lastmod>2024-07-16T21:29:55.161Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/backdooring-jenkins-builds-and-security-measures.html</loc><lastmod>2024-08-29T18:05:55.399Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/biden-cyber-security-strategy.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/biden-cybersecurity-executive-order.html</loc><lastmod>2024-09-11T14:12:21.005Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/binary-code-analysis-use-cases.html</loc><lastmod>2025-03-12T19:14:53.219Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/black-duck-iac.html</loc><lastmod>2024-08-27T19:44:17.398Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/black-duck-rapid-scan.html</loc><lastmod>2026-03-03T16:00:57.735Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/black-duck-security-advisories-benefits.html</loc><lastmod>2024-08-26T17:25:17.515Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/bob-saget-open-source-license-compliance.html</loc><lastmod>2024-09-11T19:44:00.629Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/bsimm-software-security-activities.html</loc><lastmod>2024-09-10T15:45:44.887Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/bsimm-trends-and-recommendations.html</loc><lastmod>2024-10-11T14:16:14.466Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/building-security-into-existing-scm-workflows-code-dx.html</loc><lastmod>2024-07-16T21:49:02.606Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/byod-workforce-mdm-mam-microsoft-intune.html</loc><lastmod>2024-07-19T21:41:28.149Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/ciso-guide-data-protection.html</loc><lastmod>2025-08-14T13:50:25.677Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cloud-application-security-testing-essentials.html</loc><lastmod>2024-09-10T15:47:10.184Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/code-sight-standard-edition-for-developers.html</loc><lastmod>2024-08-26T20:19:19.785Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/commercial-software-licenses-software-due-diligence.html</loc><lastmod>2024-08-26T21:32:28.54Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/complete-web-application-security-testing-checklist.html</loc><lastmod>2024-07-19T21:41:28.156Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/container-security-essentials.html</loc><lastmod>2025-03-12T18:38:12.248Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/containerizing-fuzzing-targets.html</loc><lastmod>2024-07-16T21:43:06.939Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cost-to-fix-bugs-during-each-sdlc-phase.html</loc><lastmod>2024-08-16T15:02:53.065Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cve-2020-27223-jetty.html</loc><lastmod>2024-07-16T22:14:06.925Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cve-2020-28052-bouncy-castle.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cve-2020-7958-trustlet-tee-attack.html</loc><lastmod>2024-08-22T21:29:22.322Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cve-2021-4034-polkit-vulnerability.html</loc><lastmod>2024-08-26T17:14:11.006Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyber-security-assurance-levels.html</loc><lastmod>2024-08-19T19:59:33.317Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cybersecurity-predictions.html</loc><lastmod>2024-07-16T21:50:09.142Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-cross-site-scripting-vulnerability-black-duck-hub.html</loc><lastmod>2024-09-13T17:53:03.486Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-directus-xss.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-goautodial-vulnerabilities.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-ikea-tradfri-smart-lighting.html</loc><lastmod>2024-07-16T21:50:09.153Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-ikea-tradfri-smart-lighting-gateway.html</loc><lastmod>2024-07-16T21:50:09.134Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-nagios-xi.html</loc><lastmod>2024-07-16T22:13:39.771Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-open5gs-gtp-library.html</loc><lastmod>2024-08-26T17:05:44.738Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-rabbitmq-emqx-vernemq.html</loc><lastmod>2024-07-16T22:13:39.773Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-sept2020.html</loc><lastmod>2024-07-16T22:13:39.773Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-spring-vulnerabilities-spring4shell-cve-2022-22963.html</loc><lastmod>2024-08-26T21:38:37.44Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-advisory-zephyr-vulnerability.html</loc><lastmod>2024-07-16T22:13:39.772Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-case-study-linux-kernel-vulnerability.html</loc><lastmod>2024-08-27T19:46:04.038Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/cyrc-vulnerability-analysis-repo-jacking.html</loc><lastmod>2024-09-11T20:12:15.791Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/defensics-sdk-fuzzing-bitcoin.html</loc><lastmod>2024-09-11T18:31:53.064Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/detect-prevent-and-mitigate-buffer-overflow-attacks.html</loc><lastmod>2024-09-10T15:48:29.726Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/detection-strategies-to-unmask-the-source-of-malicious-code.html</loc><lastmod>2024-09-11T14:20:33.419Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/devsecops-principles.html</loc><lastmod>2025-03-12T19:12:10.964Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/devsecops-velocity.html</loc><lastmod>2024-08-26T20:28:49.743Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/discovery-capabilities-black-duck-sca.html</loc><lastmod>2025-01-24T14:21:53.787Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/eliminate-malicious-code-from-software-supply-chain.html</loc><lastmod>2025-03-12T18:44:35.324Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/esg-survey-findings-software-supply-chain.html</loc><lastmod>2024-07-16T21:50:09.145Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/establishing-trust-software-supply-chain-sbom.html</loc><lastmod>2024-08-26T21:33:49.992Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/evaluating-roi-software-security.html</loc><lastmod>2024-08-27T16:21:42.508Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fda-cybersecurity-guidance.html</loc><lastmod>2024-07-16T21:50:09.147Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/forrester-wave-sca.html</loc><lastmod>2025-12-02T15:48:51.906Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fragattacks-vulnerabilities-wifi.html</loc><lastmod>2024-07-16T21:50:09.146Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fundamentals-of-an-application-security-program.html</loc><lastmod>2024-07-16T21:50:09.136Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fuzz-testing-questions-answers-recommendations.html</loc><lastmod>2025-06-04T01:17:19.092Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fuzzing-bitcoin-protocol-defensics-sdk.html</loc><lastmod>2024-07-16T21:43:06.939Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/gartner-critical-capabilities-appsec-continuous-testing.html</loc><lastmod>2024-08-30T19:00:54.471Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/gdpr-best-practices-application-security.html</loc><lastmod>2024-08-26T21:28:14.048Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/ghostcat-vulnerability-cve-2020-1938.html</loc><lastmod>2025-08-13T20:38:44.51Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/how-to-cybersecurity-software-supply-chain-components.html</loc><lastmod>2024-08-27T19:39:45.905Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/how-to-deal-with-legacy-vulnerabilities.html</loc><lastmod>2024-08-29T17:57:22.313Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/iast-questions-answers-recommendations.html</loc><lastmod>2025-02-13T14:47:10.906Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/ide-based-appsec-code-sight-intellij.html</loc><lastmod>2025-08-13T20:45:49.392Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/improve-devsecops-with-asoc.html</loc><lastmod>2024-09-10T15:41:51.619Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/infuse-security-into-your-software-development-life-cycle.html</loc><lastmod>2024-07-16T21:49:02.605Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/iso-sae-21434-automotive.html</loc><lastmod>2024-08-19T20:01:12.079Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/key-fob-hack-analysis.html</loc><lastmod>2024-08-27T19:24:16.296Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/logging-and-monitoring-best-practices.html</loc><lastmod>2024-07-16T21:29:55.161Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/manage-open-source-black-duck.html</loc><lastmod>2025-01-28T17:27:48.817Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/manage-vulnerabilities-with-proactive-security-process.html</loc><lastmod>2024-09-11T19:50:58.514Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/managed-services-partner-application-security.html</loc><lastmod>2024-08-29T20:41:13.517Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/managing-open-source-software-supply-chain.html</loc><lastmod>2024-08-29T14:39:21.611Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/medical-device-security.html</loc><lastmod>2025-08-14T13:52:53.362Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/medical-device-security-best-practices.html</loc><lastmod>2024-07-16T21:50:09.156Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/medical-devices-ul-fda-standard.html</loc><lastmod>2025-06-24T02:40:09.163Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/misra-autosar-compliance-steps.html</loc><lastmod>2024-09-13T17:40:11.484Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/mitigate-third-party-security-risks.html</loc><lastmod>2024-09-10T15:44:16.457Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/mitigating-impact-of-log4j-log4shell.html</loc><lastmod>2024-08-30T14:52:04.814Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/mitre-2020-cwe-top-25-most-dangerous-software-weaknesses.html</loc><lastmod>2024-08-27T16:46:39.608Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/navigating-automotive-cybersecurity-with-bsimm12.html</loc><lastmod>2024-07-16T21:50:09.155Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/new-government-directives-and-threats-reinforce-urgency-secure-software.html</loc><lastmod>2024-09-23T19:47:25.88Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/nist-cybersecurity-labeling-for-consumer-iot-devices.html</loc><lastmod>2024-09-13T21:05:27.617Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/no-compromise-saas-ast-solution.html</loc><lastmod>2024-11-05T18:13:04.844Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/open-source-trends-ossra-report.html</loc><lastmod>2024-08-23T14:31:33.026Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/opentsdb.html</loc><lastmod>2024-08-29T14:37:05.559Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/owasp-api-security-top-10.html</loc><lastmod>2024-03-21T05:55:42.071Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/poor-software-quality-costs-us.html</loc><lastmod>2024-08-27T19:28:06.397Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/preparing-for-openssl-critical-security-vulnerability.html</loc><lastmod>2024-08-26T21:36:11.763Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/prevent-data-breaches.html</loc><lastmod>2024-08-26T17:33:16.962Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/protect-web-apps-from-hackers.html</loc><lastmod>2024-07-16T21:49:02.61Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/python-security-best-practices.html</loc><lastmod>2024-08-26T21:23:50.353Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/rapid-scan-appsec-testing-for-developers.html</loc><lastmod>2024-08-26T20:26:38.29Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/react-native-libraries-secure-mobile-app-development.html</loc><lastmod>2024-07-16T21:17:27.224Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/sbom-your-software-ingredients-list.html</loc><lastmod>2024-08-26T21:40:59.886Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/secure-autonomous-vehicles.html</loc><lastmod>2025-01-28T17:30:37.983Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/secure-sdlc.html</loc><lastmod>2024-08-27T16:50:35.506Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/secure-software-development-life-cycle-journey.html</loc><lastmod>2025-01-24T18:40:57.193Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/security-basics-for-developers.html</loc><lastmod>2025-03-12T19:17:27.031Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/why-use-sast-and-sca.html</loc><lastmod>2025-01-24T14:28:23.895Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/security-flaws-vs-bugs.html</loc><lastmod>2024-08-26T20:17:09.96Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/security-vulnerability-assessment-checklist.html</loc><lastmod>2024-07-16T21:49:02.615Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/serial-port-fuzzer-defensics-sdk.html</loc><lastmod>2024-07-16T21:50:09.133Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/signature-based-detection-examples.html</loc><lastmod>2025-01-28T17:29:02.939Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/smart-home-fuzzing-defensics.html</loc><lastmod>2024-07-16T21:50:09.139Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-bill-of-materials-bom.html</loc><lastmod>2024-08-26T21:39:52.725Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-risks-technical-debt.html</loc><lastmod>2023-10-12T04:51:28.735Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-security-activities-for-managing-supply-chain-risks.html</loc><lastmod>2024-08-26T21:30:01.519Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-security-requirement.html</loc><lastmod>2024-07-16T21:49:02.608Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-security-requirements.html</loc><lastmod>2025-03-10T15:11:32.958Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-supply-chain-risk-management.html</loc><lastmod>2024-08-26T20:24:07.442Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-testing-included-in-final-isa-iec-62443-4-1.html</loc><lastmod>2023-10-12T02:34:07.639Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-vulnerability-snapshot-report-findings.html</loc><lastmod>2024-12-12T07:33:09.303Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/spring-security-best-practices.html</loc><lastmod>2025-03-10T15:09:37.046Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/supply-chain-security-best-practices.html</loc><lastmod>2024-10-01T16:39:19.247Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/supply-chain-security-risks.html</loc><lastmod>2024-11-05T18:48:55.621Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/synopsys-acquires-code-dx-asoc.html</loc><lastmod>2024-08-27T19:39:01.476Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/agile-cicd-devops-glossary.html</loc><lastmod>2024-07-16T21:29:55.118Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/ul-2900-2-1.html</loc><lastmod>2024-07-16T21:49:02.618Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/tech-tales-pci-compliance-appsec-testing.html</loc><lastmod>2025-10-14T21:32:42.208Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/threat-modeling-sdlc.html</loc><lastmod>2024-07-16T21:49:02.609Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/tips-working-remotely-open-source-community.html</loc><lastmod>2024-07-16T22:13:39.773Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/top-10-free-hacking-tools-for-penetration-testers.html</loc><lastmod>2024-07-16T21:49:02.61Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/top-10-software-vulnerability-list-2019.html</loc><lastmod>2024-08-27T16:26:29.987Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/top-4-software-development-methodologies.html</loc><lastmod>2025-01-28T17:17:44.028Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/top-open-source-licenses.html</loc><lastmod>2024-08-30T16:52:54.704Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/track-open-source.html</loc><lastmod>2024-07-16T21:49:02.614Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/trojan-source-vulnerability.html</loc><lastmod>2024-10-17T18:31:15.741Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/two-factor-authentication-misconfiguration-bypass.html</loc><lastmod>2024-07-16T21:46:37.039Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/understanding-how-why-open-source-audits.html</loc><lastmod>2024-07-16T21:50:09.156Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/understanding-python-bytecode.html</loc><lastmod>2025-10-15T13:42:56.607Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/what-cybersecurity-executive-order-means-for-private-sector.html</loc><lastmod>2024-07-16T21:50:09.133Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/why-cross-site-scripting-still-matters.html</loc><lastmod>2025-12-05T00:47:22.764Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/zero-day-exploit-log4j-analysis.html</loc><lastmod>2024-08-27T19:21:57.912Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/openchain-webnar-qa.html</loc><lastmod>2025-03-12T19:16:29.58Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/gartner-critical-capabilities-appsec-devsecops.html</loc><lastmod>2024-09-10T15:49:38.165Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/open-source-trends-ossra-report-2.html</loc><lastmod>2025-08-14T13:55:37.972Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-vulnerability-snapshot-report-findings2022.html</loc><lastmod>2024-08-27T19:48:03.219Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/code-dx-centralizes-appsec-management.html</loc><lastmod>2025-01-28T17:33:15.149Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/open-source-trends-ossra.html</loc><lastmod>2024-09-23T19:35:38.555Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/connecting-the-dots-due-diligence.html</loc><lastmod>2025-03-12T17:15:00.714Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/periodic-cloud-security-risk-assessments.html</loc><lastmod>2024-09-04T19:55:02.094Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-risk-manager.html</loc><lastmod>2024-09-11T20:33:52.73Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/keysight-partnership.html</loc><lastmod>2024-08-29T18:25:20.332Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/devsecops-research-2023-japan.html</loc><lastmod>2025-09-30T19:15:28.934Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fAST_Dynamic_Optimizing_DAST.html</loc><lastmod>2024-03-21T00:28:22.419Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/sboms-and-spdx.html</loc><lastmod>2025-03-12T19:11:00.079Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/zombie-dead-code.html</loc><lastmod>2024-09-13T20:59:47.425Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/fast-dynamic-dast.html</loc><lastmod>2025-02-13T13:34:27.039Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/secure-the-supply-chain-black-duck-supply-chain-edition.html</loc><lastmod>2025-02-05T18:02:56.21Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/polaris-assist-ai-powered-appsec-assistant.html</loc><lastmod>2024-10-22T19:45:36.524Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-supply-chain-security-report.html</loc><lastmod>2024-10-22T19:55:14.644Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/our-new-beginning-as-black-duck.html</loc><lastmod>2024-10-22T19:56:19.884Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/black-duck-devsecops-report.html</loc><lastmod>2025-09-30T19:15:28.934Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/software-vulnerability-snapshot-report-findings1.html</loc><lastmod>2025-07-21T16:31:15.506Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/navigating-complexity-in-appsec.html</loc><lastmod>2026-01-16T00:24:49.353Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/blog/xz-utils-backdoor-supply-chain-attack.html</loc><lastmod>2025-04-24T07:47:54.052Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company.html</loc><lastmod>2026-03-13T18:39:37.196Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom.html</loc><lastmod>2025-12-12T01:24:18.534Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-07-03.html</loc><lastmod>2025-03-12T19:09:48.642Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-05-08.html</loc><lastmod>2024-10-17T19:24:55.989Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-04-17-2.html</loc><lastmod>2025-03-12T19:06:20.634Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-04-17-1.html</loc><lastmod>2024-10-18T14:54:22.491Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-05-06.html</loc><lastmod>2024-10-18T14:52:06.696Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-03-21.html</loc><lastmod>2024-10-17T18:44:32.714Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-02-28.html</loc><lastmod>2025-09-18T20:55:55.716Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-01-30.html</loc><lastmod>2024-10-17T18:34:53.354Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-11-14.html</loc><lastmod>2024-10-18T15:11:52.232Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-09-22.html</loc><lastmod>2024-10-18T15:09:42.056Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-08-21.html</loc><lastmod>2024-10-17T17:36:38.588Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-06-14.html</loc><lastmod>2024-10-17T18:37:36.075Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-05-24.html</loc><lastmod>2024-10-22T15:51:37.068Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2023-04-06.html</loc><lastmod>2024-10-17T17:33:11.316Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2022-10-12.html</loc><lastmod>2025-08-13T20:25:12.273Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2022-08-30.html</loc><lastmod>2024-10-17T17:25:05.903Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2022-06-27.html</loc><lastmod>2024-10-18T15:07:52.652Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2022-06-22.html</loc><lastmod>2024-10-18T15:06:54.351Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2022-03-08.html</loc><lastmod>2025-08-13T20:23:29.252Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2021-12-15.html</loc><lastmod>2024-10-18T15:06:15.531Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2021-08-30.html</loc><lastmod>2024-10-18T15:04:58.849Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2021-07-27.html</loc><lastmod>2024-10-17T15:56:15.728Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2021-06-09.html</loc><lastmod>2024-10-17T16:00:58.648Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2021-06-08.html</loc><lastmod>2024-10-18T15:04:06.474Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/20160405.html</loc><lastmod>2024-11-05T14:49:23.535Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-10-01.html</loc><lastmod>2024-11-15T08:52:50.66Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-11-14.html</loc><lastmod>2025-02-11T14:38:59.275Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-11-18.html</loc><lastmod>2025-03-18T02:18:31.485Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-11-27.html</loc><lastmod>2025-03-12T19:07:38.373Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/company/newsroom/2024-12-18.html</loc><lastmod>2024-12-17T04:42:04.484Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/errors.html</loc><lastmod>2025-10-06T01:57:09.369Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/errors/404.html</loc><lastmod>2025-12-12T16:56:34.642Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/errors/500.html</loc><lastmod>2025-12-12T16:57:03.09Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/search.html</loc><lastmod>2025-10-06T01:28:08.22Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/ai-code-security-assistant.html</loc><lastmod>2025-12-12T17:12:36.494Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/developer-security-training.html</loc><lastmod>2026-01-15T18:07:08.462Z</lastmod></url><url><loc>https://www.blackduck.com/ja-jp/signal-ai-appsec.html</loc><lastmod>2026-01-12T21:59:30.961Z</lastmod></url></urlset>