<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.spiritsec.com/como-escolher-uma-empresa-de-pentest</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://blog.spiritsec.com/como-o-pentest-pode-ajudar-na-auditoria-de-seguran%C3%A7a</loc><lastmod>2024-09-06</lastmod></url><url><loc>https://blog.spiritsec.com/2021/03/15/engenharia-social-ataques-contra-o-elemento-humano</loc><lastmod>2022-10-11</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-%C3%A9-seguran%C3%A7a-de-aplica%C3%A7%C3%B5es</loc><lastmod>2023-07-03</lastmod></url><url><loc>https://blog.spiritsec.com/2021/02/18/o-que-e-pentest</loc><lastmod>2022-10-11</lastmod></url><url><loc>https://blog.spiritsec.com/2018/11/06/tutorial-primeiros-passos-com-o-ansible</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-e-uma-pipeline-cicd</loc><lastmod>2023-06-01</lastmod></url><url><loc>https://blog.spiritsec.com/2021/01/21/direto-de-oxford-para-seu-time-inteligencia-britanica-cria-ia-especializada-seguranca</loc><lastmod>2022-10-21</lastmod></url><url><loc>https://blog.spiritsec.com/2020/10/08/08-etapas-de-um-projeto-de-adequacao-a-lgpd</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://blog.spiritsec.com/entenda-a-import%C3%A2ncia-e-como-implementar-o-sast</loc><lastmod>2023-07-05</lastmod></url><url><loc>https://blog.spiritsec.com/o-papel-do-pentest-na-conformidade-com-normas-de-seguran%C3%A7a</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://blog.spiritsec.com/2019/06/04/como-gerar-e-usar-chaves-ssh-no-linux</loc><lastmod>2023-01-24</lastmod></url><url><loc>https://blog.spiritsec.com/as-10-principais-ferramentas-devops</loc><lastmod>2023-05-23</lastmod></url><url><loc>https://blog.spiritsec.com/qual-%C3%A9-a-diferen%C3%A7a-entre-devops-e-devsecops</loc><lastmod>2023-06-19</lastmod></url><url><loc>https://blog.spiritsec.com/pentest-vs.-vulnerability-assessment-qual-a-diferen%C3%A7a</loc><lastmod>2024-09-11</lastmod></url><url><loc>https://blog.spiritsec.com/case-de-sucesso-transforma%C3%A7%C3%A3o-digital-com-o-simonetos</loc><lastmod>2024-06-13</lastmod></url><url><loc>https://blog.spiritsec.com/principais-vulnerabilidades-que-o-pentest-pode-detectar</loc><lastmod>2024-07-17</lastmod></url><url><loc>https://blog.spiritsec.com/2019/06/06/como-gerar-e-usar-chaves-ssh-no-putty</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://blog.spiritsec.com</loc><lastmod>2022-10-10</lastmod></url><url><loc>https://blog.spiritsec.com/como-o-pentest-pode-ajudar-na-auditoria-de-seguran%C3%A7a-2</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://blog.spiritsec.com/5-benef%C3%ADcios-da-infraestrutura-como-c%C3%B3digo-iac</loc><lastmod>2023-05-26</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-s%C3%A3o-os-4cs-seguran%C3%A7a-em-camadas</loc><lastmod>2023-06-21</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-%C3%A9-dast</loc><lastmod>2023-07-06</lastmod></url><url><loc>https://blog.spiritsec.com/diferentes-tipos-de-pentest-e-suas-aplica%C3%A7%C3%B5es</loc><lastmod>2024-08-07</lastmod></url><url><loc>https://blog.spiritsec.com/a-import%C3%A2ncia-do-pentest-para-a-seguran%C3%A7a-cibern%C3%A9tica</loc><lastmod>2024-07-16</lastmod></url><url><loc>https://blog.spiritsec.com/benef%C3%ADcios-do-pentest-para-pequenas-empresas</loc><lastmod>2024-08-30</lastmod></url><url><loc>https://blog.spiritsec.com/como-implementar-seguran%C3%A7a-cont%C3%ADnua-usando-a-sua-pipeline-ci/cd</loc><lastmod>2023-06-28</lastmod></url><url><loc>https://blog.spiritsec.com/10-boas-praticas-para-um-desenvolvimento-seguro</loc><lastmod>2023-07-12</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-%C3%A9-devsecops</loc><lastmod>2023-06-14</lastmod></url><url><loc>https://blog.spiritsec.com/ferramentas-devsecops</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://blog.spiritsec.com/o-que-%C3%A9-shift-left</loc><lastmod>2023-06-26</lastmod></url><url><loc>https://blog.spiritsec.com/estudos-de-caso-li%C3%A7%C3%B5es-aprendidas-com-pentests</loc><lastmod>2024-08-22</lastmod></url><url><loc>https://blog.spiritsec.com/diferen%C3%A7a-entre-sast-e-dast</loc><lastmod>2023-07-10</lastmod></url><url><loc>https://blog.spiritsec.com/arquitetura-de-microservi%C3%A7os-o-que-%C3%A9</loc><lastmod>2023-07-13</lastmod></url><url><loc>https://blog.spiritsec.com/2021/03/02/pentest-quais-os-tipos-de-ataque</loc><lastmod>2023-03-31</lastmod></url><url><loc>https://blog.spiritsec.com/diferen%C3%A7a-entre-pentest-e-assessment-de-vulnerabilidades</loc><lastmod>2024-10-18</lastmod></url><url><loc>https://blog.spiritsec.com/web-summit-rio-2023</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://blog.spiritsec.com/2019/06/13/como-gerar-e-usar-chaves-ssh-no-mobaxterm</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://blog.spiritsec.com/2021/03/10/pentest-quais-sao-os-alvos</loc><lastmod>2022-10-11</lastmod></url><url><loc>https://blog.spiritsec.com/2019/06/11/o-que-e-docker</loc><lastmod>2023-03-31</lastmod></url><url><loc>https://blog.spiritsec.com/curso-devops</loc><lastmod>2023-06-05</lastmod></url><url><loc>https://blog.spiritsec.com/2020/10/01/seguranca-em-profundidade</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://blog.spiritsec.com/pentest-e-an%C3%A1lise-de-vulnerabilidades-qual-%C3%A9-a-diferen%C3%A7a</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://blog.spiritsec.com/2018/05/28/o-que-e-devops</loc><lastmod>2023-03-31</lastmod></url><url><loc>https://blog.spiritsec.com/como-o-pentest-pode-ajudar-na-auditoria-de-seguran%C3%A7a-1</loc><lastmod>2024-09-20</lastmod></url></urlset>