<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://native.security/</loc></url>
<url><loc>https://native.security/contact-us</loc></url>
<url><loc>https://native.security/404</loc></url>
<url><loc>https://native.security/get-a-demo</loc></url>
<url><loc>https://native.security/events</loc></url>
<url><loc>https://native.security/videos</loc></url>
<url><loc>https://native.security/partners</loc></url>
<url><loc>https://native.security/privacy-policy</loc></url>
<url><loc>https://native.security/terms-of-service</loc></url>
<url><loc>https://native.security/about</loc></url>
<url><loc>https://native.security/careers</loc></url>
<url><loc>https://native.security/platform</loc></url>
<url><loc>https://native.security/blog</loc></url>
<url><loc>https://native.security/events/meet-us-at-google-next-2026</loc></url>
<url><loc>https://native.security/events/meet-us-at-rsac-2026-conference</loc></url>
<url><loc>https://native.security/events/meet-us-at-aws-re-invent-2025</loc></url>
<url><loc>https://native.security/events/microsoft-ignite-2025</loc></url>
<url><loc>https://native.security/events/oracle-ai-world-2025</loc></url>
<url><loc>https://native.security/videos/why-cloud-security-must-move-beyond-visibility-mark-crane</loc></url>
<url><loc>https://native.security/videos/secure-by-design-enforcement-renaissance-learning-and-native</loc></url>
<url><loc>https://native.security/videos/secure-by-design-secure-by-default-why-it-unlocks-agility-phil-venables</loc></url>
<url><loc>https://native.security/videos/multi-cloud-security-without-specialist-architects-huy-li-(monolithic-power-systems)</loc></url>
<url><loc>https://native.security/videos/from-detection-to-prevention-justin-somaini</loc></url>
<url><loc>https://native.security/videos/aws-re-invent-2025</loc></url>
<url><loc>https://native.security/videos/security-by-design-lessons-oci</loc></url>
<url><loc>https://native.security/videos/secure-by-design-with-azure</loc></url>
<url><loc>https://native.security/blog/category/security-architecture-strategy</loc></url>
<url><loc>https://native.security/blog/category/secure-by-design-perspectives</loc></url>
<url><loc>https://native.security/blog/category/other-category</loc></url>
<url><loc>https://native.security/blog/every-engineering-team-is-now-an-ai-team.-the-security-architecture-for-that-has-to-follow</loc></url>
<url><loc>https://native.security/blog/ai-security-invariants</loc></url>
<url><loc>https://native.security/blog/the-evolution-of-cloud-security-toward-the-daily-work-of-security-teams</loc></url>
<url><loc>https://native.security/blog/security-is-only-truly-security-when-it-is-native</loc></url>
<url><loc>https://native.security/blog/a-control-plane-for-living-infrastructure</loc></url>
<url><loc>https://native.security/blog/why-multi-cloud-is-the-new-standard</loc></url>
<url><loc>https://native.security/blog/aws-guardrails-in-the-real-world-keeping-intent-intact-at-scale</loc></url>
</urlset>