<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//kanopysecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/</loc>
		<lastmod>2026-04-30T10:38:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/html-injections-in-power-apps/</loc>
		<lastmod>2026-04-30T08:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Webinar1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/sql-injection-in-power-apps/</loc>
		<lastmod>2026-04-30T08:06:43+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Webinar2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/microsoft-power-bi-reports-exposing-sensitive-data-on-the-web/</loc>
		<lastmod>2026-04-30T08:07:48+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Webinar3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/power-hacking-with-the-microsoft-power-platform/</loc>
		<lastmod>2026-04-30T08:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2024/06/Webinar6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/the-attackers-path-to-hacking-uipath-rpas/</loc>
		<lastmod>2026-04-30T08:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2024/11/Webinar5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/security-risks-in-low-code-no-code-development-supply-chain-attacks/</loc>
		<lastmod>2026-04-30T08:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2024/03/Webinar7.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/webinar/empowering-without-exposing-a-roadmap-for-security-teams-in-a-citizen-developers-world/</loc>
		<lastmod>2026-04-30T08:18:46+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Webinar4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/reports/ai-agents-business-apps-security-report-2026/</loc>
		<lastmod>2026-04-30T08:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/04/Report3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/reports/on-the-radar-nokod-offers-security-for-low-code-no-code-apps/</loc>
		<lastmod>2026-04-30T08:21:47+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/03/Report2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/videos/amichai-black-hat-usa-2025/</loc>
		<lastmod>2026-04-30T08:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Video1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/whitepapers/the-new-age-of-developers-securing-the-rise-of-no-coders-and-ai-agents/</loc>
		<lastmod>2026-04-30T08:26:45+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/03/Whitepaper1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/whitepapers/securing-the-adaptive-future-runtime-protection-for-ai-agents/</loc>
		<lastmod>2026-04-30T08:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/02/Whitepaper2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://kanopysecurity.com/knowledge-center/whitepapers/how-microsoft-power-bi-reports-expose-sensitive-data-on-the-web/</loc>
		<lastmod>2026-04-30T10:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://kanopysecurity.com/wp-content/uploads/2026/03/Whitepaper3.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->