<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.synapseware.io/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.synapseware.io/</loc><lastmod>2025-07-22T11:22:48+00:00</lastmod></url><url><loc>https://www.synapseware.io/about-us/</loc><lastmod>2025-07-17T09:35:42+00:00</lastmod></url><url><loc>https://www.synapseware.io/attack-surface-management/</loc><lastmod>2025-07-17T09:36:38+00:00</lastmod></url><url><loc>https://www.synapseware.io/software-composition-analysis/</loc><lastmod>2025-07-17T09:37:30+00:00</lastmod></url><url><loc>https://www.synapseware.io/cloud-security-posture-management/</loc><lastmod>2025-07-17T09:38:25+00:00</lastmod></url><url><loc>https://www.synapseware.io/third-party-risk-management/</loc><lastmod>2025-07-17T09:39:29+00:00</lastmod></url><url><loc>https://www.synapseware.io/vulnerability-management/</loc><lastmod>2025-07-17T09:40:48+00:00</lastmod></url><url><loc>https://www.synapseware.io/continuous-security/</loc><lastmod>2025-07-17T09:41:36+00:00</lastmod></url><url><loc>https://www.synapseware.io/application-security/</loc><lastmod>2025-07-17T09:42:20+00:00</lastmod></url><url><loc>https://www.synapseware.io/infrastructure-security/</loc><lastmod>2025-07-17T09:43:11+00:00</lastmod></url><url><loc>https://www.synapseware.io/cloud-security/</loc><lastmod>2025-07-17T09:44:32+00:00</lastmod></url><url><loc>https://www.synapseware.io/threat-modeling/</loc><lastmod>2025-07-17T09:45:25+00:00</lastmod></url><url><loc>https://www.synapseware.io/source-code-review/</loc><lastmod>2025-07-17T09:46:07+00:00</lastmod></url><url><loc>https://www.synapseware.io/contact-us/</loc><lastmod>2025-07-17T06:57:28+00:00</lastmod></url><url><loc>https://www.synapseware.io/service/</loc><lastmod>2025-07-17T09:31:41+00:00</lastmod></url></urlset>
