<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.boringappsec.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://www.boringappsec.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://www.boringappsec.com/podcast</loc><changefreq>weekly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-33-the-role-of-appsec-engineers</loc><lastmod>2026-03-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/vulnvibes-building-an-ai-agent-that</loc><lastmod>2026-03-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-37-the-future-of-security-testing</loc><lastmod>2026-03-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-36-discussing-ais-current-state</loc><lastmod>2026-03-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-35-exploring-security-after-determinism</loc><lastmod>2026-03-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/day-in-the-life-building-a-prototype</loc><lastmod>2026-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-34-security-at-scale-in-a-probabilistic</loc><lastmod>2026-02-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-33-the-future-of-identity-in-ai</loc><lastmod>2026-02-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-32-bigco-is-building-in-appsec</loc><lastmod>2026-01-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/browser-relay-when-your-ai-assistant</loc><lastmod>2026-01-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/skills-the-missing-piece-in-ai-security</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-32-rethinking-enterprise-security</loc><lastmod>2026-01-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/welcome-to-the-boring-appsec-community</loc><lastmod>2026-01-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-2-agent-security-standards</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-future-of-developer-security</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-30-scaling-product-security-in</loc><lastmod>2026-02-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-29-architecting-ai-security-standards</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-1-ai-for-offense-is-here</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/running-securevibes-on-securevibes</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/building-securevibes-a-multi-agent</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-vibecoding-security-crisis-why</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/introducing-securevibes-a-multi-agent</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-31-the-role-of-diagramming</loc><lastmod>2025-12-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-28-the-attackers-perspective-on</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-27-from-toil-to-intelligence-brad</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-26-the-future-of-autonomous-red</loc><lastmod>2026-02-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-25-navigating-ais-new-security</loc><lastmod>2026-02-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-24-agentic-ai-transforming-vulnerability</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-23-with-surag-patel-and-arshan</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-sdlc-is-changing-and-so-will</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-22-with</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-21-with</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-29-security-slows-down-change</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e10-vivek</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-19-the-evolution-of-security-tools</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e8-ankita</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep17-the-importance-of-context-in</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/ep-16-the-evolving-landscape-of-ai</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e5-drew</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-28-adr-vs-shift-left-should</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e4-varun</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e3-robert</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-times-they-are-a-changin</loc><lastmod>2025-01-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e2-dustin</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e1-jimmy</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/how-to-build-a-defensive-ai-security</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/how-to-build-an-offensive-ai-security</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-27-secure-by-design-is-important</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-future-of-application-security</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-26-scaling-security-design</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e10-future</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e09-incidents</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e08-bug</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e07-hiring</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e06-vulnerability</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e05-threat</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e04-running</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e03-bug</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e02-first</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/the-boring-appsec-podcast-s1e01-asset</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/s1e01-asset-inventory-c65</loc><lastmod>2024-03-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-25-gen-ai-can-supercharge</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/guest-post-edition-24-pentesting</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-23-a-framework-to-securely</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-22-a-framework-to-securely</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-21-a-framework-to-securely</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-20-degrading-ux-to-improve</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-19-securitys-eternal-prioritisation</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-18-the-diminishing-returns</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/is-cloudsec-the-new-appsec</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-16-using-security-teams-as</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-15-is-your-champions-program</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-14-to-waf-or-not-to-waf</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-13-sast-primer-goals-of-a</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-11-appsec-primer-how-sast</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-11-appsec-primer-sast-part</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-10-selling-appsec</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-9-a-build-vs-buy-framework</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-8-to-train-or-not-to-train</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-7-using-force-multipliers</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-6-top-4-appsec-metrics-and</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-5-how-to-consume-appsec-advice</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-4-the-mad-maze-of-supply</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-3-what-appsec-assessment</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-2-questions-a-good-inventory</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.boringappsec.com/p/edition-1-welcome-note-and-getting</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq></url></urlset>