<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://prompt.security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog</loc>
    </url>
    <url>
        <loc>https://prompt.security/about-us</loc>
    </url>
    <url>
        <loc>https://prompt.security/contact</loc>
    </url>
    <url>
        <loc>https://prompt.security/partner</loc>
    </url>
    <url>
        <loc>https://prompt.security/sign-in</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://prompt.security/newsroom</loc>
    </url>
    <url>
        <loc>https://prompt.security/fuzzer</loc>
    </url>
    <url>
        <loc>https://prompt.security/resources/genai-risks-and-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/homegrown-genai-apps</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/ai-code-assistants-developers</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/employees</loc>
    </url>
    <url>
        <loc>https://prompt.security/glossary</loc>
    </url>
    <url>
        <loc>https://prompt.security/promptcast</loc>
    </url>
    <url>
        <loc>https://prompt.security/schedule-a-demo</loc>
    </url>
    <url>
        <loc>https://prompt.security/eu-ai-act</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/agentic-ai-security-and-governance</loc>
    </url>
    <url>
        <loc>https://prompt.security/scavenger-hunt/one</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://prompt.security/solutions/finance</loc>
    </url>
    <url>
        <loc>https://prompt.security/ai-risk-assessment-tool</loc>
    </url>
    <url>
        <loc>https://prompt.security/ai-acceptable-use-policy</loc>
    </url>
    <url>
        <loc>https://prompt.security/customer-love</loc>
    </url>
    <url>
        <loc>https://prompt.security/ai-security-advent-calendar-2025</loc>
    </url>
    <url>
        <loc>https://prompt.security/ai-security-workshop</loc>
    </url>
    <url>
        <loc>https://prompt.security/clawsec</loc>
    </url>
    <url>
        <loc>https://prompt.security/prompt-security-regex</loc>
    </url>
    <url>
        <loc>https://prompt.security/ai-agent-foundry</loc>
    </url>
    <url>
        <loc>https://prompt.security/schedule-a-demo---marketo-v2</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/5-predictions-on-ai-security-for-2024</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/8-real-world-incidents-related-to-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/a-customer-flagged-us-an-alleged-false-positive-turns-out-it-was-an-ai-component-in-google-workspace</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/addressing-the-whale-in-the-room-what-you-need-to-know-about-deepseek-cheat-sheet-included</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/agentic-ai-expectations-key-use-cases-and-risk-mitigation-steps</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/ai-acceptable-use-policy-what-it-is-why-it-matters-and-how-to-create-one</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/ai-coding-assistants-make-a-cli-comeback</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/ai-in-the-enterprise-2024-industry-leaders-reflect-on-progress-and-preview-2025</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/ai-risk-appetite-a-tale-of-two-cisos</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/announcing-prompt-securitys-automated-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/apple-vs-anthropic-the-ai-reasoning-showdown</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/building-your-corporate-chatgpt-a-secure-enterprise-approach</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/case-study-10x-banking-achieves-safe-ai-enablement-while-maintaining-data-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/case-study-hibob-strengthens-ai-adoption-with-secure-employee-centric-monitoring</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/case-study-securing-ai-for-cymulate-ensuring-safe-ai-adoption-across-teams</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/case-study-securing-genai-for-long-term-patient-care-at-elder-outreach</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/case-study-securing-genai-for-riskified-fraud-and-risk-intelligence</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/claude-code-on-the-web-power-productivity-and-a-whole-lot-of-new-risk</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/claude-computer-use-a-ticking-time-bomb</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/context-aware-protections-for-homegrown-ai-apps-security-beyond-a-single-prompt</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/denial-of-wallet-on-genai-apps-ddow</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/detecting-and-managing-ai-when-ai-is-virtually-everywhere</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/ebpf-at-prompt-security-the-first-no-code-security-offering-for-llm-based-applications</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/everyones-freaking-out-about-google-indexing-chatgpt-chats-should-you-be</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/extracting-gbs-of-training-data-from-chatgpt</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/from-trivy-to-litellm-expanding-the-llm-supply-chain-threat-model</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/gartner-names-prompt-security-a-representative-vendor-in-its-market-guide-for-ai-trust-risk-and-security-management-ai-trism</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/genai-is-the-new-mainstream-key-insights-on-its-unprecedented-adoption</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/github-copilot-free-expands-shadow-ai-risk-protecting-your-organizations-secrets</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/how-prompt-security-helps-enterprises-comply-with-the-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/how-to-manage-security-risks-as-gemini-goes-free-in-your-google-workspace</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/introducing-prompt-securitys-ai-risk-assessment-tool</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/keeping-security-up-with-the-pace-of-innovation-in-ai-gpt-4o-chatgpt-for-desktop</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/many-shot-jailbreaking-a-new-llm-vulnerability</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/now-available-a-new-version-of-prompt-fuzzer-the-first-interactive-open-source-tool-for-genai-apps-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/openais-chatgpt-agent-your-new-digital-helper-and-potential-security-nightmare</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prepare-your-organization-for-eu-ai-act-compliance-a-comprehensive-guide-by-prompt-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-injection-101</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-security-ai-security-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-security-extends-employee-protection-to-claudes-desktop-app</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-security-named-a-representative-vendor-in-the-gartner-r-innovation-guide-for-generative-ai-in-trust-risk-and-security-management-trism-report</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-security-named-as-a-2025-gartner-cool-vendor-in-ai-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-security-sentinelone-a-new-chapter-begins</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompt-securitys-ai-security-predictions-for-2026</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/prompts-firewall-for-ai-the-next-big-thing-in-appsec-with-f5</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/putting-ai-guardrails-where-they-matter-most-prompt-securitys-integration-with-portkey</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/quick-overview-of-the-eu-ai-act-the-first-regulation-on-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/secure-chatgpt-beyond-the-browser-prompt-security-for-chatgpt-on-desktop-and-whatsapp</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/securely-embracing-genai-strategies-to-minimize-risks</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/securing-enterprise-data-in-the-face-of-github-copilot-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/securing-the-future-of-genai-prompt-securitys-series-a-milestone</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/security-for-agentic-ai-unveiling-mcp-gateway-mcp-risk-assessment</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/setting-a-new-standard-for-enterprise-genai-security-with-a-complete-solution-for-microsoft-365-copilot</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/shadow-ai-at-scale-what-prompt-security-sees-in-real-environments</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/shadow-ai-visibility-how-to-detect-and-manage-hidden-ai-risks</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/shaping-the-conversation-our-top-4-linkedin-newsletter-picks-on-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/smarter-ai-security-true-risk-management-goes-beyond-blocking-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/the-embedded-threat-in-your-llm-poisoning-rag-pipelines-via-vector-embeddings</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/the-key-layer-in-ai-security-browser-and-endpoint-sensors</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/the-new-risk-in-town-shadow-mcp-servers</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/the-owasp-top-10-for-llm-apps-genai</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/top-10-mcp-security-risks</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/top-genai-insights-from-enterprise-security-leaders-in-highly-regulated-industries</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/understanding-iso-iec-42005</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/understanding-the-iso-iec-42001</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/unicode-exploits-are-compromising-application-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/were-prompt-security-the-singular-platform-for-genai-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/what-is-ai-red-teaming-the-ultimate-guide</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/what-is-ai-security-risks-challenges-and-how-to-stay-ahead</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/what-is-genai-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/what-moltbots-virality-reveals-about-the-risks-of-agentic-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/when-ai-trusts-the-wrong-data-new-research-from-prompt-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/when-your-plugin-starts-picking-your-dependencies-marketplace-skills-and-dependency-hijack-in-claude-code</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/when-your-repo-starts-talking-agents-md-and-agent-goal-hijack-in-vs-code-chat</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/why-browser-extensions-are-the-only-scalable-way-to-enable-safe-genai-adoption----and-why-network-inspection-isnt-enough</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/why-every-organization-should-prioritize-shadow-ai-assessments</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/why-im-joining-prompt-security-as-an-executive-advisor-dennis-dahl</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/why-organizations-are-choosing-chatgpt-as-their-core-genai-platform</loc>
    </url>
    <url>
        <loc>https://prompt.security/blog/zeta-global-genai-unleashed-and-security-challenges-in-the-era-of-user-empowerment</loc>
    </url>
    <url>
        <loc>https://prompt.security/policies/privacy-policy</loc>
    </url>
    <url>
        <loc>https://prompt.security/policies/terms-of-service</loc>
    </url>
    <url>
        <loc>https://prompt.security/policies/terms-of-use</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/data-privacy-risks</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/denial-of-wallet-service</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/indirect-prompt-injection</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/insecure-plugin-design</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/jailbreak</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/legal-challenges</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/privilege-escalation</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/prompt-injection</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/prompt-leak</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/shadow-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/vulnerabilities/toxicity-bias-harmful</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/enterprises-gain-control-over-llm-oversharing-with-prompt-securitys-new-genai-authorization-features</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/owasp-dramatically-expands-genai-security-guidance-with-guides-for-handling-deepfakes-building-an-ai-security-center-of-excellence-and-a-genai-security-solutions-landscape</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-announces-complete-security-and-governance-for-microsoft-365-copilot</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-crowned-winner-at-check-points-cpx-2024-innovation-sandbox</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-emerges-from-stealth-with-5m-seed-to-be-enterprises-one-stop-for-generative-ai-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-joins-nvidia-inception</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-launches-enhanced-security-solution-for-github-copilot-as-ai-code-assistants-usage-surges</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-launches-first-genai-security-solution-for-mssps-and-unveils-new-mssp-partnerships</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-launches-industrys-first-interactive-open-source-fuzzer-tool-for-genai-application-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-launches-static-analysis-security-testing-for-ai-generated-code</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-named-a-2025-sinet16-innovator-for-its-industry-leading-ai-security-platform</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-partners-with-f5-to-secure-genai-applications-with-a-firewall-for-ai</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-raises-18m-series-a-to-accelerate-its-mission-to-secure-genai-in-enterprises</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/prompt-security-recognized-as-a-crn-2025-stellar-startup-in-security</loc>
    </url>
    <url>
        <loc>https://prompt.security/press/sentinelone-to-acquire-prompt-security-to-advance-genai-security-and-agent-security-strategy</loc>
    </url>
</urlset>