<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.straiker.ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/about</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/products</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/contact</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/free-ai-assessment</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/events</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/demo-request</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/newsroom</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/events/blackhat-ai4</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/products/ascend-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/products/defend-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/resource-materials</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/research</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/red-teaming</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/guardrails</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/new-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/runtime-guardrails-for-agentic-web-browsers</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/mcp-security</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/careers</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/ai-compliance-governance</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/genai-and-agentic-ai-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/industries/hospitals-and-healthcare</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/industries/banks-and-financial-services</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/industries/high-tech</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/events/rsac</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/ebook/agentsecops-guide-ebook</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/whitepaper/securing-agentic-al-in-banking-and-financial-services</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/whitepaper/no-hard-boundaries-the-case-for-semantic-detection-in-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/coding-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/custom-built-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/products/discover-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/solution/productivity-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/claude-code</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/industries/media-entertainment</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/industries/retail-ecommerce</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/10-hard-won-lessons-from-building-an-ai-security-company-in-2025</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/5-principles-for-securing-ai-agents-based-on-frontier-lab-consensus</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/agent-hijacking-how-prompt-injection-leads-to-full-ai-system-compromise</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/agent-spm-ai-spm-ai-usage-controls-what-do-they-actually-secure</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/agentic-ai-security-for-developers-embedding-autonomous-attack-simulation-into-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/agentic-danger-dns-rebinding-exposing-your-internal-mcp-servers</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/agentic-rule-breakers-why-ai-systems-need-real-time-referees</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/ai-agents-and-vibe-coding-changed-the-speed-of-building-now-security-has-to-catch-up</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/ai-red-teaming-vs-traditional-red-teaming-what-security-teams-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/ascend-ai-goes-24-7-defend-ai-gets-precision-control-june-2025</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/assessing-agentic-ai-risks-sdlc-integration-and-more-april-2025</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/autonomy-is-a-battlefield-why-were-bringing-a-battlefield-to-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/built-on-clawhub-spread-on-moltbook-the-new-agent-to-agent-attack-chain</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/claude-code-source-leak-with-great-agency-comes-great-responsibility</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/claude-mythos-proves-the-ai-persistent-threat-era-has-arrived</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/comparing-ai-security-frameworks-owasp-csa-nist-and-mitre</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/cyberspike-villager-cobalt-strike-ai-native-successor</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/detecting-autonomous-chaos-github-mcp-exploit</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/from-inbox-to-wipeout-perplexity-comets-ai-browser-quietly-erasing-google-drive</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/from-smart-to-secure-why-ai-applications-need-to-be-continuously-tested</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/gartner-just-published-the-hype-cycle-for-agentic-ai-security-heres-what-it-means-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/how-ai-integration-models-shape-security-for-agentic-applications</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/how-dtc-companies-are-securing-ai-agents---3-stories-from-the-front-lines</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/how-the-clawdbot-moltbot-ai-assistant-becomes-a-backdoor-for-system-takeover</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/how-your-ai-chatbot-is-your-new-supply-chain-weak-link</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/inside-the-ai-supply-chain-securing-models-prompts-and-plugin-ecosystems</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/investor-thesis-bain-captial-ventures</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/investor-thesis-lightspeed</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/lessons-from-the-mchire-security-incident</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/nomshub-cursor-remote-tunneling-sandbox-breakout</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/owasp-just-released-its-first-top-10-for-agentic-ai-and-heres-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/product-release-attack-and-defend-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/rethinking-security-in-the-ai-age</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/secure-ai-agents-with-straiker-mcp-server</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/securing-agentic-ai-in-a-multi-agent-world</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/securing-agentic-ai-in-banking-financial-services</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/shift-ai-risk-assessments-further-left-and-multi-modal-runtime-protection-may-2025</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-announces-availability-of-ascend-ai-and-defend-ai-in-the-new-aws-marketplace-ai-agents-and-tools-category</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-becomes-fastest-growing-agentic-first-ai-security-company-securing-global-enterprises-and-frontier-labs-in-under-12-months</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-introduces-industrys-first-attack-and-defense-agents-to-secure-enterprise-agentic-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-launches-with-21-million-to-safeguard-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-named-a-representative-vendor-in-the-gartner-r-market-guide-for-guardian-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-named-an-ema-vendor-vision-2026-visionary-at-rsac</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-named-to-the-2026-cb-insights-list-of-the-100-most-innovative-artificial-intelligence-startups</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-recognized-as-a-fortune-cyber-60-company-for-second-consecutive-year</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-secures-agents-building-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/straiker-x-owasp-ai-exchange-rethinking-security-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/the-abcs-of-securing-agentic-ai-protecting-agents-browsers-and-co-pilots</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/the-agent-security-gap-why-75-of-leaders-wont-let-security-concerns-slow-their-ai-deployment</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/the-rise-of-straiker</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/the-silent-exfiltration-zero-click-agentic-ai-hack-that-can-leak-your-google-drive-with-one-email</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/three-landscapes-one-security-shift-what-owasps-q2-2026-update-is-really-saying</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/top-6-ai-red-teaming-and-adversarial-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/weaponizing-wholesome-yearbook-quotes-to-break-ai-chatbot-filters</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/what-im-paying-attention-to-at-rsac-2026-if-you-care-about-ai-security</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/what-is-memory-in-llms-and-why-it-matters-for-securing-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/whats-the-difference-between-generative-ai-and-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/when-ai-agents-ship-by-default-security-has-to-run-in-production----whats-new-in-defend-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/why-94-of-ai-agents-are-vulnerable-to-prompt-injection----and-what-to-do-about-it</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/why-i-joined-straiker</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/why-microsofts-agentic-ai-expansion-proves-runtime-guardrails-are-now-mission-critical</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/why-pattern-based-ai-security-fails-against-agentic-attacks</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/why-straiker-why-now</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/blog/your-guide-to-must-attend-ai-and-cybersecurity-conferences-in-2025-2026</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/agents-on-the-rocks-build-secure-ai-agents-workshop</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/ai-security-roundtable-straiker-in-phoenix</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/ai-thought-leadership-summit-silicon-valley-2025</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/aws-community-day</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/benchmarking-the-offensive-security-capability-of-foundation-models</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/cyberspike-villager-webinar</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/defending-the-ai-stack-strategy-and-sushi</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/five-predictions-defining-the-future-of-ai-risk-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/is-application-security-dead-in-the-ai-age-rethinking-security-for-agentic-applications</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/nebula-fog</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/nomshub</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/nullcon-goa-2026</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/preventing-autonomous-chaos-in-ai-agents-via-systematic-evaluation</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/rsac-tm-innovation-showcase-agentic-security-for-the-enterprise</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/securing-agentic-ai-at-full-swing</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/straiker-presents-agents-after-dark-black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/talk-ai-over-ai-authentic-indian</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/the-ai-summit-nyc</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/the-crossroad-of-agentic-ai-and-security-chicago-edition</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/the-montgomery-summit</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/event/weaponized-intelligence-using-ai-to-fight-ai-in-the-cybersecurity-arms-race</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/advanced-persistent-threats-apt</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agent-framework</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agent-hijacking</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agent2agent-a2a</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agentic-browsers</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agentic-misalignment</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/agentsecops</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/ai-agent</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/ai-agent-memory</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/ai-chatbots</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/ai-jailbreaking</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/ai-powered-persistent-threat-aipt</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/autonomous-attack-simulation-aas</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/autonomous-chaos</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/context-window</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/conversation-history</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/data-poisoning</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/in-context-learning-icl</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/indirect-prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/language-augmented-vulnerability-in-applications-lava</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/llm-evasion</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/model-context-protocol-mcp</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/model-hijacking</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/rag-retrieval-augmented-generation</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/token</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/tool-manipulation</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/universal-ai-jailbreaks</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/vector-database</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/vector-embedding</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/glossary/vector-search</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/ai-agents-gone-rogue-how-straiker-plans-to-defend-the-future-of-ai</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/ais-next-wave-intelligent-agents-the-skills-to-secure-them</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/analyst-briefing-with-anton-chuvakin</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/cyberman-podcast</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/cybersecurity-for-ai-the-new-threat-landscape-how-do-we-secure-it</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/data-leak-without-a-click</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/how-agents-exfiltrate-data-how-to-defend-them</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/how-polite-prompts-trick-ai-into-deleting-your-files</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/lack-hat-fireside-chat-straiker-extends-red-teaming-to-the-ai-layer-as-ai-attacks-surge</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/roundtable-edition-ai-regulation-the-future-can-we-govern-what-we-dont-fully-understand</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/the-de-fud-me-podcast-fight-against-bad-agents-with-good-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/the-rise-of-straiker-founders-story</loc>
    </url>
    <url>
        <loc>https://www.straiker.ai/podcasts-and-videos/weaponized-intelligence-using-ai-to-fight-ai-in-the-cybersecurity-arms-race-the-super-sessions</loc>
    </url>
</urlset>