<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.appsentinels.ai/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/</loc>
		<lastmod>2026-04-30T05:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/api-security-buyers-guide/</loc>
		<lastmod>2026-04-30T04:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523623/API-Buyers-guide/API-Buyers-guide.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/application-security/</loc>
		<lastmod>2026-04-30T04:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523657/Application-Security/Application-Security.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/appsentinels-complements-data-security-products/</loc>
		<lastmod>2026-04-30T04:34:56+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523688/Appsentinels-comitment-to-data-secutity/Appsentinels-comitment-to-data-secutity.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/exploiting-data-scraping/</loc>
		<lastmod>2026-04-30T04:35:38+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523728/Exploiting-data-scraping/Exploiting-data-scraping.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/its-all-about-business-logic-security/</loc>
		<lastmod>2026-04-30T04:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523757/Its-all-about-business-logic/Its-all-about-business-logic.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/owaspwebtop10-vs-owaspapitop/</loc>
		<lastmod>2026-04-30T04:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523777/OWASP-Web-vs-API/OWASP-Web-vs-API.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/why-dast-iast-products-are-inadequate-against-finding-api-vulnerabilities/</loc>
		<lastmod>2026-04-30T04:37:08+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523815/DAST-IAST-Products/DAST-IAST-Products.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/why-payload-encryption-cannot-be-your-only-line-of-defense/</loc>
		<lastmod>2026-04-30T04:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777523825/Payload-Encryption/Payload-Encryption.png?_i=AA</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.appsentinels.ai/resources/whitepapers/why-wafs-are-inadequate/</loc>
		<lastmod>2026-04-30T05:22:29+00:00</lastmod>
		<image:image>
			<image:loc>https://res.cloudinary.com/dufh810os/images/f_auto,q_auto/v1777526531/Why-WFAs-are-inadequate/Why-WFAs-are-inadequate.png?_i=AA</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->