<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//kanopysecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://kanopysecurity.com/blog/</loc>
		<lastmod>2026-03-31T17:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/the-uncomfortable-truth-about-application-security-in-the-age-of-no-coders-lessons-from-cve-2026-20960/</loc>
		<lastmod>2026-03-03T12:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/The-Power-Apps-Blind-Spot-Security-CVE-2026-20960Teams-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/visual-selection-e1770974231354.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/visual-selection-1-e1770974331443.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/visual-selection-2-e1770974423166.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/visual-selection-3-e1770974453330.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/shadow-engineering-lcnc-appsec/</loc>
		<lastmod>2026-03-28T19:31:35+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Shadow-Engineering-Casting-a-Giant-Shadow-on-AppSec-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/unlocking-the-power-of-citizen-developers-without-letting-your-data-get-hijacked/</loc>
		<lastmod>2026-03-29T07:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Unlocking-the-Power-of-Citizen-Developers-Without-Letting-Your-Data-Get-Hijacked-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/nokod-discovers-microsoft-power-bi-data-leakage-vulnerability/</loc>
		<lastmod>2026-03-29T08:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/CVE-2023-36019-%E2%80%93-Critical-Christmas-Gift-from-Microsoft-Power-Platform-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/01/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/from-power-platform-to-power-problems-the-hidden-risk-behind-business-built-apps/</loc>
		<lastmod>2026-03-29T08:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/From-Power-Platform-to-Power-Problems-The-Hidden-Risk-Behind-Business-Built-Apps-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/integrating-lcnc-apps-into-the-ctem/</loc>
		<lastmod>2026-03-29T08:06:39+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Bridging-the-Gap-Integrating-LCNC-Apps-into-the-CTEM-Framework-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/01/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/power-platform-low-code-security-risks/</loc>
		<lastmod>2026-03-29T08:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Power-Platform-Security-Risks-and-Best-Practices-What-Every-Enterprise-Should-Know-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/runtime-risk-ai-agents-shadow-ai/</loc>
		<lastmod>2026-03-29T08:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Cyber-security-strategy-SDVs-raise-the-stakes-600-x-200-%D7%A4%D7%99%D7%A7%D7%A1%D7%9C-600-x-300-%D7%A4%D7%99%D7%A7%D7%A1%D7%9C.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/image-30-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/sql-injection-vulnerabilities-in-low-code-no-code-app-development/</loc>
		<lastmod>2026-03-29T08:13:07+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/The-Unbearable-Stubbornness-of-SQL-Injection-Vulnerabilities-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/what-happens-when-everyone-becomes-a-developer-the-hidden-security-challenge/</loc>
		<lastmod>2026-03-29T08:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/What-Happens-When-Everyone-Becomes-a-Developer-The-Hidden-Security-Challenge-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/why-awareness-fails-citizen-developer-security/</loc>
		<lastmod>2026-03-29T08:16:10+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Stop-Trying-to-Educate-the-Risk-Away-Why-Awareness-Wont-Secure-Your-Citizen-Developers-3-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/blog/in-plain-sight-how-microsoft-power-bi-reports-expose-sensitive-data-on-the-web/</loc>
		<lastmod>2026-03-31T17:42:49+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/In-Plain-Sight-How-Microsoft-Power-BI-Reports-Expose-Sensitive-Data-on-the-Web-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/01/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/01/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/01/image-2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->