<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.appsec-adventure.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://blog.appsec-adventure.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-catalyst</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-advocate</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-backbone</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-owner</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-gatekeeper</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/role-the-executor</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/background-why-secure-software-development</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/background-defining-the-appsec-scope</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.appsec-adventure.com/p/application-security-ownership-model</loc><lastmod>2026-02-04</lastmod><changefreq>monthly</changefreq></url></urlset>