<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://boostsecurity.io</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/platform</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/about</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/solution/application-security-posture-management</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/solution/supply-chain</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/solution/developer-endpoint</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/terms-of-service</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/privacy-policy-fr</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/contact</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/request-a-demo</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/case-studies</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/mythos</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/one-pager-solution-briefs</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-emerges-from-stealth-at-12m-cad-to-automate-cybersecurity-for-devops</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-emerges-from-stealth-with-12-million-cad-to-automate-cybersecurity-for-devops</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-emerges-from-stealth-with-saas-devsecops-platform</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-exits-stealth-with-12m-in-seed-funding</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-exits-stealth-with-devsecops-automation-platform-12m-in-seed-funding</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-raises-12m-in-seed-funding</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecurity-to-debut-at-owasp-2022-global-appsec</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/boostsecuritys-ceo-zaid-al-hamami-on-the-evolving-field-of-developing-software-securely-to-stop-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/building-a-do-it-yourself-defect-discovery-practice</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/defensive-research-weaponized-the-2025-state-of-pipeline-security</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/developing-software-securely</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/devsecops-automation-platform-boostsecurity-emerges-from-stealth</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/devsecops-automation-platform-startup-boostsecurity-launches-with-12m-in-new-funding</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/do-we-need-new-antidotes-to-protect-against-the-poisoning-the-supply-chain-of-generative-ai</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/dont-go-with-the-flaw</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/erosion-of-trust-unmasking-supply-chain-vulnerabilities-in-the-terraform-registry</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/exploiting-cicd-with-style-lotp-guide</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/malware-in-oss-is-the-new-black</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/managed-security-services-provider-mssp-market-news-16-november-2022</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/opening-pandora-box-supply-chain-insider-threats-in-oss-projects</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/openssl-critical-security-issue</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/pandoras-box-to-nuclear-fishing-escalating-threats-in-build-pipeline-security</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/sarif-cant-save-you-now</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/slsa-dip-at-the-source-of-the-problem</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/slsa-dip-its-build-time</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/software-supply-chain-security-1st-party-code-risks</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/software-supply-chain-security-understanding-developer-risks</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/split-second-side-doors-how-bot-delegated-toctou-breaks-the-cicd-threat-model</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/stop-letting-ai-ship-time-bombs-poutine-mcp-for-cicd</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/the-death-of-appsec-is-greatly-exaggerated</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/the-tale-of-a-supply-chain-near-miss-incident</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/under-the-radar-zero-days-in-open-source-build-pipelines</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/unveiling-bagel-why-your-developers-laptop-is-the-softest-target-in-your-supply-chain</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/unveiling-poutine-an-open-source-build-pipelines-security-scanner</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/vibe-coding-meet-safe-packages</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/blog/weaponizing-dependabot-pwn-request-at-its-finest</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/case-studies/demandbase</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/case-studies/mattel</loc>
    </url>
    <url>
        <loc>https://boostsecurity.io/case-studies/travelport</loc>
    </url>
</urlset>