<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.opsinsecurity.com</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/about</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/contact</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/platform</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/careers</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/demo</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/assessment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/schedule-meeting</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/raffle</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/demo-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/3-strategies-for-a-successful-microsoft-copilot-rollout</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/accelerating-genai-projects-a-security-first-approach</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/agentic-ai-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/agentic-ai-for-enterprise</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/ai-agents-have-access-you-just-dont-know-where</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/ai-agents-without-guardians-security-risks</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/ai-security-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/align-ciso-genai-security-enablement</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/bill-com-cio-genai-rollout-lessons-copilot-gemini-glean</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/build-guardian-agent-strategy-with-opsin</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/chatgpt-security-issues</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/culligan-ciso-enterprise-ai-security-global-deployment-lessons</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/culligan-ciso-genai-security-enterprise-copilot</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/executive-guide-securing-microsoft-copilot-deployments</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/fear-not-a-security-model-for-genai-insights-from-oz-wasserman-on-dm-radio</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/founder-spotlight-with-james-pham-opsin-co-founder</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/gartner-emerging-tech-report-ai-trism</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/gartner-market-guide-guardian-agents</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/genai-copilot-rollout-cascade-environmental</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/genai-data-governance</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/genai-oversharing-healthcare-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/generative-ai-and-zero-trust-navigating-the-future-of-genai-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/generative-ai-security-google-gemini</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/how-has-generative-ai-affected-security-a-deep-analysis-for-enterprise-search-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/how-to-secure-microsoft-copilot-without-blocking-productivity</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/in-the-suite-spot-with-opsin-jonathan-chan</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/intern-problem-enterprises-fear-unauthorized-ai-data-access</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/introducing-opsin-ai-context-graph</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/is-copilot-safe</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/is-google-gemini-secure-for-enterprise</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/microsoft-copilot-security-hidden-threat-model-data-poisoning</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/microsoft-copilot-security-rag-poisoning-risk</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/microsoft-copilot-security-risks</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/microsoft-copilot-security-the-magic-trick-of-prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/microsoft-teams-data-oversharing-risk</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-agent-defense-enterprise-ai-agents-visibility</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-joins-csa-startup-showcase</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-on-microsoft-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-raises-7m-to-stop-genai-oversharing</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-secures-strategic-investment-lead-cig-genai-data-protection</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-soc-2-type-2-certification</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-supports-chatgpt-enterprise-expands-ai-misuse-detection</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/opsin-wins-best-cybersecurity-industry-solution-2026</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/overcoming-the-chicken-and-egg-problem-in-genai</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/owasp-genai-data-security-risks-what-enterprises-must-know</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/owasp-genai-security-landscape-q2-2026</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/pnp-enterprise-and-ai</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/secure-govern-agentic-ai-culligan</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/securing-generative-ai-enterprise-expert-insights-30-year-it-veteran</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/support-for-claude-enterprise</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/test-prompts-assessing-copilot-oversharing-risk</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/test-prompts-assessing-gemini-oversharing-risk</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/the-value-of-vetoing-sb-1047-a-step-towards-responsible-ai-development</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/unlocking-the-future-securing-generative-ai-with-opsin-and-lockstep</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/blog/wta-genai-security-strategy-enterprise-copilot</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/barry-wehmiller-expands-copilot-reduces-oversharing-risk-legacy-data</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/cascade-secures-cmmc-data-copilot-deployment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/culligan-secures-copilot-rollout-reduces-ai-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/encore-technologies-secures-microsoft-copilot-deployment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/uipath-secures-chatgpt-enterprise-proactive-ai-agent-governance</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/customer-stories/wellstar-health-secures-copilot-deployment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/jobs/cybersecurity-senior-account-executive</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/jobs/senior-engineer-ai-engineer</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/jobs/senior-engineer-full-stack</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/jobs/software-engineer</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/jobs/staff-engineer-backend</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/retire-use-cases/chatgpt-enterprise</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/retire-use-cases/copilot</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/retire-use-cases/gemini</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/industry-solutions/energy</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/industry-solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/industry-solutions/healthcare-life-sciences</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/industry-solutions/it-services</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/industry-solutions/manufacturing-industrial</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/ai-governance</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/ai-oversharing</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/chatgpt-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/copilot-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/genai-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/google-gemini-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/how-to-secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/top-guardian-agents-enterprise-ai-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/learn/what-are-guardian-agents</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare/agentic-ai-vs-generative-ai</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare/knostic-vs-purview</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare/knostic-vs-varonis</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare/microsoft-purview-alternatives</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/compare/varonis-vs-avepoint</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/solutions/ai-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/solutions/ai-readiness-assessment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/solutions/ai-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/solutions/ongoing-oversharing-protection</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/chatgpt-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/claude-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/copilot-studio-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/gemini-security</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/guardian-agent-platform</loc>
    </url>
    <url>
        <loc>https://www.opsinsecurity.com/use-cases/microsoft-copilot-security</loc>
    </url>
</urlset>