<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://appsec360.com/blog/why-the-core-tenets-of-secure-sdlc-still-apply-to-ai-driven-software</loc><lastmod>2025-05-18T14:00:00Z</lastmod></url><url><loc>https://appsec360.com</loc><lastmod>2026-02-07T23:00:09Z</lastmod></url><url><loc>https://appsec360.com/blog/ai-llm-security-challenges-in-sdlc-pipelines</loc><lastmod>2025-10-27T13:00:00Z</lastmod></url><url><loc>https://appsec360.com/blog/drowning-in-alerts-why-open-source-sast-tools-can-become-a-trap</loc><lastmod>2025-10-21T03:53:27Z</lastmod></url><url><loc>https://appsec360.com/blog/lessons-from-npm-incidents-on-strengthening-supply-chain-security</loc><lastmod>2025-09-06T14:00:00Z</lastmod></url><url><loc>https://appsec360.com/blog</loc><lastmod>2026-02-07T23:00:09Z</lastmod></url><url><loc>https://appsec360.com/blog/the-nx-supply-chain-attack-when-developer-tools-become-attack-vectors</loc><lastmod>2025-08-26T14:00:00Z</lastmod></url><url><loc>https://appsec360.com/blog/threat-modeling-in-the-age-of-ai-what-developers-must-add-to-their-toolkit</loc><lastmod>2025-02-16T13:00:00Z</lastmod></url><url><loc>https://appsec360.com/blog/ramp-up-product-security-teams-for-an-ai-first-world</loc><lastmod>2024-01-07T13:00:00Z</lastmod></url><url><loc>https://appsec360.com/blog/owasp-top-10-vulnerabilities-stride</loc><lastmod>2023-02-09T13:00:00Z</lastmod></url></urlset>