<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.edamame.tech/</loc></url>
<url><loc>https://www.edamame.tech/leaders</loc></url>
<url><loc>https://www.edamame.tech/zerotrust-github</loc></url>
<url><loc>https://www.edamame.tech/zerotrust-gitlab</loc></url>
<url><loc>https://www.edamame.tech/zerotrust-tailscale</loc></url>
<url><loc>https://www.edamame.tech/zerotrust-netbird</loc></url>
<url><loc>https://www.edamame.tech/zerotrust-github-wp</loc></url>
<url><loc>https://www.edamame.tech/agents-wp</loc></url>
<url><loc>https://www.edamame.tech/devs</loc></url>
<url><loc>https://www.edamame.tech/pricing</loc></url>
<url><loc>https://www.edamame.tech/faq</loc></url>
<url><loc>https://www.edamame.tech/blog</loc></url>
<url><loc>https://www.edamame.tech/about</loc></url>
<url><loc>https://www.edamame.tech/contact</loc></url>
<url><loc>https://www.edamame.tech/download</loc></url>
<url><loc>https://www.edamame.tech/404</loc></url>
<url><loc>https://www.edamame.tech/zerotrust</loc></url>
<url><loc>https://www.edamame.tech/compliance</loc></url>
<url><loc>https://www.edamame.tech/cicd</loc></url>
<url><loc>https://www.edamame.tech/agents</loc></url>
<url><loc>https://www.edamame.tech/oem</loc></url>
<url><loc>https://www.edamame.tech/customers</loc></url>
<url><loc>https://www.edamame.tech/blog-full/axios-npm-supply-chain-rat-edamame-runtime-detection</loc></url>
<url><loc>https://www.edamame.tech/blog-full/litellm-supply-chain-runtime-detection</loc></url>
<url><loc>https://www.edamame.tech/blog-full/github-audit-edamame-hub-zero-trust-onramp</loc></url>
<url><loc>https://www.edamame.tech/blog-full/2-real-attacks-personal-ciso-individual-developer</loc></url>
<url><loc>https://www.edamame.tech/blog-full/tokens-didn%E2%80%99t-become-more-dangerous-in-2026-%E2%80%94-we-just-finally-accepted-what-they-always-were</loc></url>
<url><loc>https://www.edamame.tech/blog-full/edamame-agents-1.0-user-up-security-finally-unlocked</loc></url>
<url><loc>https://www.edamame.tech/blog-full/dear-security-posture-we-need-to-talk</loc></url>
<url><loc>https://www.edamame.tech/blog-full/building-real-security-for-github-enterprise-lessons-from-air-gapped-systems-and-zero-trust</loc></url>
<url><loc>https://www.edamame.tech/blog-full/announcing-edamame-security-final-beta-the-all-in-one-multiplatform-rust-powered-endpoint-security-tool-for-devs</loc></url>
<url><loc>https://www.edamame.tech/blog-full/your-gitlab-runner-is-a-crown-jewel-here-s-how-to-guard-it-with-device-aware-networking</loc></url>
<url><loc>https://www.edamame.tech/blog-full/the-token-loophole-why-even-the-newest-device-trust-solutions-still-miss-a-critical-sdlc-gap</loc></url>
<url><loc>https://www.edamame.tech/blog-full/case-study-ppe-analytics-secures-its-sdlc-with-developer-first-zero-trust</loc></url>
<url><loc>https://www.edamame.tech/blog-full/edamame-vanta-endpoint-compliance-no-mdm-required</loc></url>
<url><loc>https://www.edamame.tech/blog-full/analyzing-the-supply-chain-attack-on-tj-actions-changed-files-github-action</loc></url>
<url><loc>https://www.edamame.tech/blog-full/tales-from-the-front-lines-how-i-bypassed-the-company-endpoint-security</loc></url>
<url><loc>https://www.edamame.tech/blog-full/edamame-security-manifesto-empowering-the-future-of-sdlc-security</loc></url>
<url><loc>https://www.edamame.tech/blog-full/achieving-soc2-compliance-across-the-software-development-life-cycle-without-mdm-uem</loc></url>
<url><loc>https://www.edamame.tech/blog-full/achieving-iso-iec-27001-compliance-across-the-software-development-life-cycle-with-edamame</loc></url>
<url><loc>https://www.edamame.tech/blog-full/securing-developer-machines-without-compromising-productivity</loc></url>
<url><loc>https://www.edamame.tech/blog-full/enhancing-ci-cd-pipeline-security-with-hardening-network-audit-trails-and-zero-trust</loc></url>
<url><loc>https://www.edamame.tech/blog-full/journalists-are-like-developers-guardians-of-confidential-data-and-critical-publications</loc></url>
<url><loc>https://www.edamame.tech/blog-full/why-the-sdlc-is-a-critical-component-of-fintech-ict-under-dora</loc></url>
<url><loc>https://www.edamame.tech/blog-full/how-we-secured-our-github-enterprise-and-forgot-it-was-there-eating-our-own-dog-food-for-one-month</loc></url>
<url><loc>https://www.edamame.tech/blog-full/how-edamame-revolutionizes-network-access-for-guest-lan-wifi-users</loc></url>
<url><loc>https://www.edamame.tech/blog-full/tightening-defenses-against-supply-chain-attacks-with-edamame-security</loc></url>
<url><loc>https://www.edamame.tech/blog-full/building-edamame-security-our-journey-with-flutter-and-rust</loc></url>
<url><loc>https://www.edamame.tech/blog-full/endpoint-security-the-power-of-a-user-centric-approach</loc></url>
<url><loc>https://www.edamame.tech/blog-full/personal-macs-can-be-safer-than-corporate-pcs</loc></url>
<url><loc>https://www.edamame.tech/blog-full/navigating-the-complexities-of-contractors-using-their-own-devices</loc></url>
<url><loc>https://www.edamame.tech/terms-of-service/politique-de-confidentialit%C3%A9-pour-edamame-security</loc></url>
<url><loc>https://www.edamame.tech/terms-of-service/privacy-policy-for-edamame-security</loc></url>
<url><loc>https://www.edamame.tech/terms-of-service/terms-of-service</loc></url>
<url><loc>https://www.edamame.tech/terms-of-service/privacy-policy</loc></url>
<url><loc>https://www.edamame.tech/customers-full/northbridge-enterprise-trust-developer-first-endpoint-security</loc></url>
<url><loc>https://www.edamame.tech/customers-full/ppe-analytics-secures-its-sdlc-with-developer-first-zero-trust</loc></url>
<url><loc>https://www.edamame.tech/customers-full/robotics-company-closes-sdlc-token-loophole-with-developer-first-zero-trust</loc></url>
<url><loc>https://www.edamame.tech/customers-full/telecom-company-secures-self-hosted-vpn-sdlc-device-aware-zero-trust</loc></url>
</urlset>