<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://blog.adobe.com/security/</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-bogdan-cloud-security-architect</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/improving-edr-management-for-large-complex-networks</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-cristina-manager-information-security</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-serena-security-program-manager</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/scaling-your-threat-modeling-program-using-genai</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-ammar-devsecops-leader</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/building-agile-security-risk-management-program</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/learnings-project-caspian-purpose-built-security-data-platform</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/ai-powered-red-teaming-keeping-pace-with-adversaries</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-bridget-from-bowie-state-intern-to-technology-compliance-product-owner</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/now-available-adobe-ccfv5</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-justin-director-offensive-security</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/red-teaming-when-assumptions-arent-enough</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/researcher-qa-friends-who-work-together-hack-better-together</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/adobe-transforms-public-vulnerability-disclosure-program-into-paid-bug-bounty-program</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/researcher-aem-solution-architect-by-day-adobe-bug-bounty-hunter-by-night</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/driving-long-term-security-with-strategic-remediation</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/leveraging-anomaly-detection-secure-secrets-management</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/outsourced-penetration-testing-improving-product-security-from-outside-in</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/implementing-effective-cybersecurity-metrics-program</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/building-resilience-against-ever-evolving-phishing-attacks</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-with-tim-csirt-responder</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/adobe-recap-2024-ambassador-world-cup-final-four</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/uncovering-the-hidden-identities-within-aws-access-keys</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/embracing-portfolio-based-program-management-for-cybersecurity</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/adobes-memory-safety-roadmap-securing-creativity-by-design</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/adobe-achieves-cybersecurity-maturity-model-certification</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/celebrating-adobes-top-security-researchers-of-2025</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/behind-the-scenes-with-jericho-senior-staff-security-data-scientist</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/a-smarter-way-to-measure-red-team-impact</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/building-consumer-trust-by-joining-the-industry-accord-against-online-scams-frauds</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/building-an-agentic-ai-powered-threat-intelligence-platform</loc>
    <lastmod>2026-04-12</lastmod>
  </url>
  <url>
    <loc>https://blog.adobe.com/security/building-a-security-workbench-for-unified-visibility-and-prioritization</loc>
    <lastmod>2026-04-27</lastmod>
  </url>
</urlset>
