<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.nudgesecurity.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/account-takeover-detection</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/castle-referral</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/cios-guide-to-reining-in-saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/cisos-guide-to-reducing-the-saas-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-spend-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/customer-referral</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/customer-referral-faq</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/customer-referral-thank-you</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/debunking-the-stupid-user-myth-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/it-offboarding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/faqs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/find-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/cloud-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/getting-started</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/ic</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/legal/master-subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-casb</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-smp</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-sspm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/omdia-on-the-radar-analysis</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/overshadowed</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/research-guides</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/rsa-meet-with-us</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/saas-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/saas-rationalization-toolkit</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/search</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/sitemap</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/sso-onboarding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/template/style</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/tag-cyber-ebook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/tag-cyber-saas-security-primer</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/template-employee-offboarding-checklist</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/legal/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/thank-you-gift</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/thanks-for-registering</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/legal/trial-services-agreement</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/trust-center</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/well-known-security-txt</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/return-on-investment</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/how-it-works</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/all</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-security-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/nudge-signup</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/love-for-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/security-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/identity-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/it-audit-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/become-a-partner</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/playbooks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/user-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/oauth-risk-investigation-checklist</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/github</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/slack</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/zoom</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/how-to-simplify-5-tedious-it-governance-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/black-hat-meet-with-us</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/microsoft-365-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/generative-ai-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/share-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/demo-center</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/product</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/contact-us</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/okta-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/event-demo</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/register-a-deal</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/salesforce-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/browser-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-browser-centric-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/snowflake-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/salesforce</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/practitioners-guide-to-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/github-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/zoom-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/atlassian-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/nudge-security-for-it-teams</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/nudge-security-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/servicenow-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/ai-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/servicenow</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes/slack-ai-settings</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/compliance-teams</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/the-practitioners-guide-to-microsoft-365-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-ai-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/slack-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/customer-training-videos</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/content/ai-discovery-methods-compared</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/comparison/nudge-security-vs-the-competition</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/oauth-scopes</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-shadow-saas-inventory-tool</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/ai-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-shadow-ai-inventory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/ai-security-compare</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/ai-security-solution</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/ai-discovery-solution</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/discover-and-secure-chatgpt-use</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/remove-ai-notetakers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-shadow-saas-inventory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/compare-zscaler-to-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/automate-user-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-saas-spend-inventory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-saas-subscription-inventory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/drift-supply-chain-breach-response</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/saas-supply-chain-breach-response</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-shadow-it-inventory-tool</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-shadow-ai-inventory-tool</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/free-saas-spend-inventory-tool</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/love-for-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcasts/webcast-thank-you-customers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/workday-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/netsuite-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/contact/event-demo-2</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/oauth-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/zendesk-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/integration/docusign-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/ai-conversation-monitoring</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/ai-agent-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/ai-agent-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/use-cases/saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/product-staging</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/workforce-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/partner-template</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/try-nudge/shadow-it</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/features/security-posture-findings</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/10-cloud-computing-startup-companies-to-watch-in-2026</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/2023-sc-awards-finalists-most-promising-early-stage-start-up</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/8-endpoint-security-and-network-monitoring-vendors-to-watch-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/ai-adoption-research-from-nudge-security-reveals-how-widespread-ai-use-is-transforming-security-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/ballistic-ventures-launches-300-million-cybersecurity-venture-fund</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/can-you-nudge-employees-towards-better-cybersecurity-new-research-says-yes</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/controlling-the-saas-attack-surface-russell-spitler-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/cybersecurity-startups-to-watch-for-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/employee-cellphone-attacks-pose-new-threat-to-companies</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/five-ways-security-teams-can-more-effectively-manage-identities-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/hackers-hijack-a-wide-range-of-companies-chrome-extensions-experts-say</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/how-can-cisos-improve-the-employee-experience</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/how-organizations-should-respond-to-the-circleci-security-incident</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/human-behavior-security-startup-nets-7m-in-seed</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/infosec-doesnt-know-what-ai-tools-orgs-are-using</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/insecurity-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/new-saas-attack-surface-management-capabilities-help-organizations-discover-and-manage-saas-supply-chain-risks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/notable-capital-unveils-rising-in-cyber-2025</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-appoints-cybersecurity-veteran-patrick-dillon-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-automates-employee-offboarding-eliminating-90-of-manual-it-effort</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-bags-7m-seed-round</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-delivers-4x-customer-growth-and-115-q-q-revenue-growth-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-emerges-from-stealth-to-address-securitys-hardest-problem-people</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-emerges-from-stealth-to-tackle-cybersecuritys-people-problem</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-extends-its-ai-security-leadership-with-ai-agent-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-extends-saas-and-generative-ai-security-governance-to-the-browser</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-extends-saas-security-and-governance-solution-with-new-sspm-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-granted-us-patent-for-saas-discovery-technology</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-helps-organizations-embrace-generative-ai-while-mitigating-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-launches-platform-with-humans-in-mind</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-launches-saas-attack-surface-management-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-raises-22-5-million-in-series-a-funding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-raises-22-5m-series-a-to-secure-workforce-ai-and-saas</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-raises-7-million-in-seed-funding-led-by-ballistic-ventures-to-secure-the-modern-workforce</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-recognized-as-a-2023-sc-media-awards-finalist-for-most-promising-early-stage-startup</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-transforms-saas-rationalization-with-industry-first-spend-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-triples-arr-and-doubles-customer-base-in-2024</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-unveils-industrys-most-comprehensive-ai-security-governance-platform</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/nudge-security-welcomes-forgepoint-capital-to-seed-round-syndicate-bringing-funding-to-16-5-million</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/salesforce-says-customer-data-possibly-exposed-following-incident</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/security-awareness-urged-to-grow-beyond-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/svb-collapses-mix-of-money-urgency-and-uncertainty-makes-it-irresistible-to-scammers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/the-19-most-promising-cybersecurity-startups-of-2023-according-to-vcs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/the-rush-to-ai-opens-doors-to-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/uber-lapsus-targeted-external-contractor-with-mfa-bombing-attack</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/what-vcs-see-happening-in-cybersecurity-in-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/when-blaming-the-user-for-a-security-breach-is-unfair-or-just-wrong</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press/why-cybersecurity-needs-a-big-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/company</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/guides</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/perspectives</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/product</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/research</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/category/security-alerts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/5-steps-to-full-saas-visibility</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/automate-tedious-it-offboarding-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/automating-saas-ai-governance-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/discover-and-secure-all-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/embrace-ai-securely-how-to-mitigate-ai-usage-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/fortifying-your-saas-supply-chain-lessons-from-the-salesloft-drift-breach</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/from-chaos-to-control-managing-saas-sprawl-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/from-chaos-to-control-scaling-identity-security-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/gain-control-of-saas-spend-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-decipher-oauth-and-app-to-app-integration-risks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-deliver-guardrails-to-your-workforce-via-the-browser</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-discover-and-govern-ai-usage-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-get-up-and-running-quickly-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-harden-your-identity-security-posture-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-scale-ai-governance-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/how-to-simplify-5-tedious-it-governance-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/newsday-tuesday</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/nudge-security-product-demo-pool-party-edition</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/nudge-security-product-demo-super-sspm-september</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/regain-control-of-saas-spend-and-sprawl-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/running-ai-governance-at-the-workforce-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/saas-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/secure-your-critical-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/the-art-of-nudging</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast/whos-app-is-it-anyway-how-to-regain-control-of-saas-identity-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/2022-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/2024-wrapped-the-year-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/2025-in-review-major-product-updates-for-saas-and-ai-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/5-common-misconceptions-around-sso</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/5-ways-customers-use-security-nudges-to-drive-action-and-results</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/6-salesforce-security-configuration-settings-worth-getting-right</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/7-gartner-reads-on-saas-security-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ad-ldap-delegated-authentication-bypass-username-above-52-characters</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-adoption-in-practice-what-real-enterprise-usage-data-reveals-about-risk-and-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-agent-discovery-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-agent-governance-security-team-guide</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-discovery-methods-compared</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-governance-security-in-saas-driven-organizations</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-isnt-your-breach-risk-your-oauth-sprawl-is</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/ai-security-governance-at-scale-new-features-from-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/amazon-q-developer-extension-for-vs-code-compromised-with-a-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/an-action-plan-for-improving-workforce-security-decisions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/are-your-employees-looking-for-love-in-all-the-wrong-places</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/asana-mcp-server-data-exposure-incident</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/avoid-these-5-it-offboarding-pitfalls-for-a-smooth-transition</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-ai-security-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-browser-security-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-casb-solutions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-saas-management-platforms</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-shadow-it-management-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/best-sspm-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/beyond-the-browser-why-your-saas-ai-security-strategy-needs-more-than-just-an-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/breach-of-salesloft-drift-oauth-tokens-leads-to-salesforce-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/building-a-culture-of-trust-and-security-from-the-start</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/camoleak-prompt-injection-in-github-copilot-chat-enables-private-repo-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/campaign-targets-crypto-users-with-malicious-firefox-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/can-technology-be-used-to-guide-security-decisions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/castra-q-a-saas-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/cheers-to-an-incredible-start-at-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/claude-managed-agents-are-here-govern-them-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/comparison-nudge-security-vs-casb</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/comparison-nudge-security-vs-sspm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/critical-vulnerability-identified-in-base44-vibe-coding-platform</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/cutting-saas-sprawl-assess-saas-spend-security-and-usage-insights-all-in-one-place</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/cutting-saas-sprawl-here-are-the-5-things-you-should-do-first</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/cybersecurity-awareness-doesnt-cut-it-its-time-to-focus-on-behavior</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/data-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/debunking-the-stupid-user-myth-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/discover-and-secure-all-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/docusign-saas-services-used-to-deliver-phishing-campaigns</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/does-blocking-access-force-saas-into-the-shadows</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/does-privacy-put-you-to-sleep-youre-not-alone</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/dom-based-extension-clickjacking-vulnerabilities-in-popular-browser-extensions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/dynamic-vendor-assessments-for-a-dynamic-world</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/eliminate-wasted-saas-spend-to-help-fund-your-2026-priorities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/embrace-ai-securely-how-to-mitigate-ai-usage-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/embracing-ai-productivity-tools-securely-and-at-scale-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/employee-offboarding-by-the-numbers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/expand-saas-and-ai-security-governance-with-our-new-browser-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/exploring-ai-governance-5-strategies-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/extend-saas-security-and-governance-with-our-new-api</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/financially-motivated-threat-actor-targeting-salesforce-instances</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/forcedleak-indirect-prompt-injection-in-salesforce-agentforce</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/from-chaos-to-control-managing-saas-sprawl-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/from-github-star-to-security-nightmare-what-openclaw-ai-means-for-enterprise-saas-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/generative-ai-magnifies-a-crisis-in-enterprise-it-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/google-oauth-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/harden-your-identity-infrastructure-with-our-new-okta-connected-app</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/have-we-taken-zero-trust-too-far</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/hellcat-ransomware-targeting-jira-servers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/high-severity-data-exposure-vulnerability-identified-in-servicenow</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-can-cisos-improve-the-employee-experience</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-does-user-discretion-influence-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-glaad-protects-saas-identities-and-sensitive-data-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-gridx-leveled-up-its-saas-security-program-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-karmacheck-made-saas-security-pay-for-itself-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-much-are-rogue-aws-accounts-costing-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-nudge-security-is-useful-in-a-merger-acquisition</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-saas-dark-patterns-like-cloud-sync-can-put-your-organization-at-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-saas-sprawl-extends-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-stravito-scaled-its-saas-security-and-governance-program-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-assess-the-impact-of-circleci-and-lastpass-incidents-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-clean-up-saas-sprawl-without-breaking-a-sweat</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-conduct-an-ai-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-de-risk-your-critical-identity-infrastructure-with-nudge-securitys-new-sspm-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-decipher-oauth-and-app-to-app-integration-risks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-discover-and-govern-ai-usage-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-discover-and-secure-ai-adoption-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-identify-inactive-and-abandoned-saas-accounts-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-identify-rogue-aws-accounts-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-investigate-an-oauth-grant-for-suspicious-activity-or-overly-permissive-scopes</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-investigate-chatgpt-activity-in-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-manage-oauth-risks-at-scale-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-monitor-remote-mcp-server-connections-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-remove-otter-ai-from-your-organization-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-revoke-saas-to-saas-integrations-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-simplify-5-tedious-it-governance-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-to-use-nudge-security-to-minimize-risk-from-supply-chain-breaches-like-vercel</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/how-watershed-uses-nudge-security-for-saas-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/improve-okta-security-with-these-6-critical-configuration-settings</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/into-the-multiverse-of-saas-instance-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/introducing-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/investigate-and-remediate-oauth-risks-with-expanded-oauth-grant-context</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/its-time-for-a-new-saas-shared-responsibility-model</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/its-time-to-move-beyond-the-casb</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/live-demo-5-steps-to-full-saas-visibility</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/live-demo-saas-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/live-webcast-automate-tedious-it-offboarding-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/live-webcast-discover-and-secure-all-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/malicious-browser-extensions-the-saas-governance-gap-at-the-workforce-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/malicious-google-ads-campaign-targeting-saas-software-downloads</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/manage-saas-to-saas-risk-with-oauth-risk-scores</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/manage-your-saas-attack-surface-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/mandiants-2025-m-trends-report-highlights-saas-security-as-a-significant-source-of-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/masterminds-qubits-the-future-unfolds-at-rsa-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/mcp-security-risks-mcp-server-exposure-and-best-practices-for-the-ai-agent-era</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/microsofts-copilot-found-exposing-thousands-of-private-github-repositories</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/midnight-blizzard-using-microsoft-teams-to-launch-spear-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/monitor-for-saas-app-outages-with-our-new-app-health-statuses</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/myth-100-percent-api-coverage-modern-sspm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/new-job-5-ways-nudge-security-helps-you-build-a-foundation-for-success</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/newsday-tuesday-february</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-security-is-two-years-old-this-month</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-security-named-in-honorable-mentions-list-in-the-inaugural-2024-gartner-r-magic-quadrant-tm-for-saas-management-platforms</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-security-turns-one-year-old-today</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-security-unlocks-thousands-of-saas-security-profiles</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-securitys-2023-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-securitys-bsides-ctf-solution-an-overview</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/nudge-securitys-it-offboarding-checklist-for-a-saas-first-world</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/oauth-grants-the-hanging-chads-of-suspended-google-workspace-users</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/okta-classic-sign-on-policy-bypass-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/okta-sso-accounts-hit-by-vishing</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/onboard-new-generative-ai-tools-safely-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/openai-agentkit-and-agent-builder-building-secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/our-favorite-recipes-for-the-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/our-series-a-why-were-betting-on-the-workforce-as-securitys-greatest-asset</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-1-rethinking-the-modern-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-2-the-security-risk-that-should-be-avoidable</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-3-navigating-the-challenges-of-saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-4-how-incident-response-has-changed-in-a-saas-first-world</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-5-managing-risk-vs-friction-in-it-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/overshadowed-episode-6-considering-the-human-element-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/phishing-attacks-leveraging-app-specific-passwords-to-compromise-microsoft-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/phishing-campaign-uses-github-fake-security-alerts-to-target-developers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/predictions-for-saas-security-trends-in-2024</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/rein-in-saas-sprawl-with-our-saas-rationalization-toolkit</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/saas-adoption-and-the-rise-of-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/saas-management-platforms-a-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/saas-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/saas-security-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/saas-supply-chain-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/securing-the-workforce-edge-a-new-paradigm-for-saas-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/shadow-ai-is-just-the-new-shadow-it-heres-why-a-saas-first-approach-wins</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/shadow-ai-is-taking-notes-the-growing-risk-of-ai-meeting-assistants</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/shadow-ai-the-emerging-security-threat-in-ibms-2025-cost-of-a-data-breach-report</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/shadow-it-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/shifting-the-security-paradigm-embracing-the-identity-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/signaling-the-rise-of-saas-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/silk-typhoon-abusing-it-providers-and-stolen-credentials-in-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/simplify-sso-enrollment-for-okta-and-azure-ad-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/snowflake-cortex-ai-search-service-can-expose-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/soc-2-automation</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/social-engineering-campaign-using-fake-reviews-on-the-chrome-web-store</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/staring-at-the-car-wreck-of-sbom</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/streamline-employee-offboarding-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/streamline-saas-access-requests-with-nudge-securitys-new-app-directory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/streamline-soc-2-access-reviews-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/supply-chain-attack-affecting-multiple-github-actions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/suspected-compromise-of-gainsight-connected-salesforce-instances</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-ai-adoption-curve-and-what-it-means-for-your-business</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-best-solution-for-discovering-saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-challenge-of-soc-2-certification-in-a-remote-world</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-dangers-of-rogue-aws-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-dark-side-of-saas-gtm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-definitive-guide-to-saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-dirty-truth-about-offboarding-automation</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-end-of-the-ai-honeymoon-saas-data-risks-in-the-mcp-era</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-end-of-the-security-perimeter-how-ai-and-saas-are-redefining-data-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-essential-guide-to-identity-governance-for-saas</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-hidden-dangers-of-chatgpts-integrations-with-google-drive-and-microsoft-onedrive</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-impact-of-user-decisions-on-saas-supply-chain-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-impostars-take-on-bsides-las-vegas-2023</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-last-mile-of-sspm-where-most-tools-give-up</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-midnight-blizzard-attack-and-how-nudge-security-can-help-manage-oauth-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-new-hipaa-security-rule-why-saas-and-identity-governance-cant-wait</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-one-thing-nudge-security-doesnt-do</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-rise-of-agentic-ai-how-autonomous-ai-changes-security-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-rise-of-deepseek-and-the-implications-of-shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-risks-and-challenges-of-managing-oauth-grants-at-scale</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-rush-to-ai-opens-doors-to-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-saas-attack-surface-by-the-numbers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-salesloft-drift-breach-is-bigger-than-salesforce-what-it-says-about-saas-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-security-risks-of-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-security-risks-of-using-groups-for-shared-access-to-cloud-and-saas-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-three-body-problem-of-saas-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-ultimate-guide-to-saas-security-tools-top-vendors-solutions-and-how-to-choose</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/the-vercel-breach-what-to-do-in-the-next-24-hours</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/thousands-of-live-api-keys-and-passwords-found-exposed-in-training-datasets</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/threat-actor-targeting-commvault-saas-cloud-application</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/threat-actor-using-teamfiltration-tool-in-large-scale-account-takeover-attacks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/threat-actors-continue-to-create-chrome-extensions-impersonating-legitimate-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/three-ways-nudge-security-helps-counter-the-forgetting-curve-in-cybersecurity-awareness</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/to-curb-saas-sprawl-cisos-should-think-like-entrepreneurs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/top-10-sspm-evaluation-questions</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/top-5-google-workspace-security-settings-and-misconfigurations</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/top-5-microsoft-365-security-misconfigurations--and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/track-progress-against-saas-security-best-practices-with-our-new-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/unique-saas-applications-discovered-for-our-customers</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/upcoming-microsoft-onedrive-feature-could-expose-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/using-slack-integration-to-extend-your-saas-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/views-from-the-top-ciso-perspectives-on-the-state-of-saas-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/vpn-adblock-extensions-harvest-and-exfiltrate-ai-chat-conversations</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/we-are-taking-on-cybersecuritys-biggest-challenge-people</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/webcast-harden-your-identity-security-posture-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/webcast-nudge-security-product-demo-super-sspm-september</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/webinar-how-human-emotion-influences-security-behavior</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/weighing-the-risks-and-rewards-of-ai-productivity-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/were-going-deep-on-saas-security-and-governance-with-new-connected-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/what-do-you-actually-know-about-your-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/what-happens-when-social-psychology-and-cybersecurity-join-forces-we-are-about-to-find-out</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/what-is-ai-data-security-frameworks-and-tactics-explained</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/what-is-the-impact-of-employee-decisions-on-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/what-to-do-about-the-impending-shadow-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/where-does-shadow-it-come-from</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/whos-app-is-it-anyway-how-to-regain-control-of-saas-identity-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-a-threat-campaign-targeting-snowflake-customers-isnt-exactly-a-special-snowflake</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-finance-and-procurement-teams-love-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-i-joined-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-managing-browser-extensions-should-be-part-of-your-saas-governance-strategy</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-mining-expense-reports-wont-find-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-network-monitoring-cant-effectively-detect-saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-non-human-identity-management-is-critical-to-saas-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-nudge-security-doesnt-have-a-customer-success-team</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-saas-security-and-governance-requires-a-human-in-the-loop</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-saas-security-has-become-a-now-problem</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/why-the-sso-tax-needs-to-go</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/your-oauth-risk-investigation-checklist</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/post/your-rsa-survival-guide-how-to-get-the-most-out-of-security-conferences</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/bradley-gold</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/chris-murphy</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/danielle-russell</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/dunya-mahmood</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/emily-thurman</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/garrett-gross</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/jaime-blasco</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/julia-kisielius</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/mark-stone</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/omdia</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/rachel-ritchie</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/russell-spitler</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/tag-cyber</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/authors/the-nudge-security-team</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press-category/in-the-news</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/press-category/press-release</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/a-new-playbook-automates-common-saas-offboarding-tasks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/access-security-and-compliance-profiles-for-thousands-of-saas-vendors</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/add-context-to-nudges-with-a-new-custom-field</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/add-nudge-security-to-your-slack-channels-with-existing-slack-commands</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/additional-insight-into-authentication-methods-and-mfa</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/address-risky-behavior-with-real-time-notifications-for-activity-in-not-permitted-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/ai-dashboard-highlights-oauth-integrations-with-ai-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/audit-saas-usage-at-scale-and-avoid-wasted-saas-spend</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/audit-your-applications-field-history</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/automate-saas-and-genai-guardrails-in-real-time-with-nudge-securitys-new-browser-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/automated-notifications-based-on-approval-status</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/automatically-re-nudge-users-and-filter-nudge-history</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/cancel-sent-nudges-and-re-nudge-users</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/complete-offboarding-tasks-faster-with-nudge-securitys-updated-offboarding-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/configure-separate-destinations-for-nudges-and-notifications</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/connect-jumpcloud-to-see-sso-activity-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/connected-app-experience-updates</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/consolidate-saas-usage-by-visualizing-similar-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/contextualize-app-usage-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/create-and-manage-custom-fields-directly-in-the-ui</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/create-jira-tickets-for-saas-security-posture-findings-with-tines</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/customize-nudges-to-suit-your-organizations-needs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/data-exporting</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/default-table-sorting-now-shows-high-priority-items-first</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/define-your-personal-app-use-policy-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/delete-and-edit-old-or-unused-app-labels</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/deliver-nudges-and-receive-notification-on-microsoft-teams-with-new-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/deploy-the-nudge-security-browser-extension-on-ai-browsers-like-chatgpt-atlas-dia-and-perplexitys-comet-to-expand-your-saas-and-ai-visibility-and-enforcement</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/deploy-the-nudge-security-browser-extension-on-brave-to-expand-your-real-time-saas-and-genai-visibility-and-enforcement</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/deploy-the-nudge-security-browser-extension-on-firefox-for-more-complete-saas-ai-visibility</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/detect-sensitive-data-shared-in-ai-chatbot-conversations</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/discover-and-track-saas-spend-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/discover-redundant-and-duplicative-app-instances</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/easily-add-or-update-app-context-with-bulk-editing-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/engage-with-more-users-at-once-with-the-ability-to-bulk-nudge-selected-app-users</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/enhanced-amazon-web-services-aws-dashboard-views</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/enhanced-nudge-security-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/enhanced-saas-spend-dashboard-insights</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/enhanced-search-results</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/evaluate-ai-and-saas-tools-with-nudge-securitys-new-ai-data-training-policy-summary-feature</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/expanded-global-search</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/export-browser-extension-inventory</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/export-your-nudge-history-to-csv</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-accounts-by-department-or-mfa-status</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-and-prioritize-oauth-grants-based-on-risk-insights</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-applications-by-technical-contact</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-oauth-grants-by-risk-permissions-and-more</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-on-labels-on-the-apps-and-accounts-tables</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/filter-saas-accounts-by-authentication-method</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/find-what-you-need-faster-with-our-redesigned-product-navigation-menu</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/fix-risks-and-configurations-in-google-workspace-and-microsoft-356</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/gain-even-deeper-visibility-into-your-connected-apps-with-the-new-app-to-app-integrations-table</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/gain-visibility-into-ai-adoption-and-usage-trends-with-daily-active-user-monitoring-across-ai-chatbot-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/gain-visibility-into-risky-mcp-connections-with-new-oauth-risk-insight</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-ahead-of-upcoming-renewals-with-new-notification-and-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-alerted-when-sensitive-data-is-shared-in-ai-conversations-with-new-notification</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-clearer-visibility-into-user-activity-with-os-and-browser-details</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-deeper-insight-into-oauth-risks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-notified-immediately-when-users-respond-to-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-visibility-into-ai-agents-built-on-claude-and-langsmith</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/get-visibility-of-user-groups-at-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/google-workspace-user-data</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/identify-abandoned-or-inactive-accounts-automatically</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/identify-and-resolve-weak-passwords-with-new-finding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/identify-apps-with-high-amounts-of-individual-subscriptions-in-the-spend-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/identify-your-least-active-users-and-apps-with-the-ability-to-filter-based-on-last-account-activity</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/ignore-apps-and-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/improve-your-security-posture-with-notifications-for-security-findings</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/improved-default-filters-to-help-you-focus-on-what-matters</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/improved-exporting-for-user-groups</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/improved-prioritization-of-apps-for-sso-onboarding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/initiate-an-offboarding-playbook-via-api</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/inventory-browser-extensions-installed-across-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/investigate-saas-activities-faster-with-improved-saas-events-record</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/kickstart-your-ai-governance-program-with-nudge-securitys-newest-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/know-which-vendors-were-breached-in-an-apps-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/make-bulk-changes-to-saas-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/manage-saas-spend-more-accurately-by-disabling-analysis-for-select-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/manage-the-authorizing-user-for-your-microsoft-365-or-google-workspace-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/mark-existing-rogue-aws-accounts-as-managed-using-the-manage-aws-footprint-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-app-outages-with-new-app-health-statuses</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-atlassian-for-misconfigurations-identity-and-access-vulnerabilities-and-data-security-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-clickup-for-user-account-and-instance-details-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-fivetran-for-user-account-details-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-freshservice-for-user-account-details-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-github-for-security-risks-misconfigurations-and-app-to-app-integration-risks-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-netsuite-for-misconfigurations-identity-and-access-vulnerabilities-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-notion-security-risks-app-to-app-integrations-and-user-activity-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-pagerduty-for-user-activity-and-details-along-with-app-to-app-integrations-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-salesforce-for-misconfigurations-app-integrations-and-identity-and-access-vulnerabilities-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-sentry-for-misconfigurations-app-to-app-integrations-and-user-account-details-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-servicenow-for-misconfigurations-identity-and-access-vulnerabilities-and-data-security-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-slack-security-risks-app-to-app-integrations-and-user-activity-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-snowflake-for-misconfigurations-identity-and-access-vulnerabilities-and-data-security-risks-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-vercel-security-risks-app-to-app-integrations-and-user-activity-in-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-workday-for-misconfigurations-and-identity-and-access-vulnerabilities-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/monitor-zoom-for-risks-and-misconfigurations-and-take-action-directly-within-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/multi-select-filter-options</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/navigation-improvements</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-api-endpoints-for-security-posture-findings</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-api-helps-you-manage-saas-security-and-governance-across-your-entire-security-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-app-directory-simplifies-access-management-for-saas-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-attack-surface-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-browser-nudge-delivers-your-ai-acceptable-use-policy-to-help-drive-safe-compliant-ai-use-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-improvements-for-the-nudge-security-browser-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-monitor-hubspot-and-cisco-meraki-for-misconfigurations-assess-user-activities-and-take-action-directly-within-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-monitor-openai-cloudflare-and-fastly-for-risks-and-misconfigurations-and-take-action-directly-within-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-oauth-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-playbook-to-automate-soc-2-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-saas-security-posture-management-microsoft-sharepoint</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-spend-dashboard-highlights-opportunities-to-consolidate-costs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-sso-playbook-enhances-support-for-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/new-user-role-provides-more-granular-access-controls</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/nudge-employees-about-their-use-of-oauth-grants-before-revoking-access</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/nudge-employees-in-the-browser-to-update-weak-passwords</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/nudge-history</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/nudge-security-now-auto-approves-apps-when-a-jumpcloud-or-onelogin-sso-login-is-detected</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/nudge-technical-owners-to-delete-abandoned-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/offboard-inactive-users-using-nudges-offboarding-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/onboard-apps-more-effectively-by-collecting-additional-context</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/onboard-new-ai-tools-safely-with-our-new-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/opt-specific-employees-out-of-receiving-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/preview-number-of-recipients-before-sending-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/prioritize-apps-by-criticality-based-on-your-organizations-needs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/quickly-assess-multi-factor-authentication-options-with-added-security-context</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/re-nudging-enhancements</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/reduce-notifications-by-consolidating-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/reorder-table-columns</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/request-additional-information-for-a-saas-vendor-from-the-their-security-profile-page</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/reveal-shadow-spend-with-new-saas-spend-discovery-capabilities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/revoke-oauth-grants-and-nudge-users-in-bulk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/revoke-oauth-grants-for-google-workspace-and-microsoft-365-within-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/run-multiple-concurrent-offboarding-playbooks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/saas-supply-chain-breach-notifications</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/safeguard-against-new-google-oauth-vulnerability-with-automated-alerts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/safeguard-your-okta-infrastructure-with-our-new-okta-connected-app</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/see-and-control-which-ai-tools-access-your-sensitive-data-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/see-data-flows-from-source-saas-apps-to-ai-conversation-tools</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/send-bulk-nudges-directly-from-the-apps-and-accounts-table-to-engage-users-at-scale</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/send-notifications-to-multiple-slack-channels</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/sign-into-nudge-security-with-okta-sso</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/slack-integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/social-accounts-in-saas-attack-surface-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/start-your-nudge-security-journey-strong-with-our-new-onboarding-flow-during-the-initial-email-scan</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/stay-in-the-know-of-global-saas-app-and-account-activity-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/stay-updated-on-the-most-important-activity-across-your-organization-with-our-newly-redesigned-weekly-summary-emails</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-ai-governance-and-enforcement-with-nudge-securitys-ai-acceptable-use-policy-playbook</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-2</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-3</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-airtable-drata-ramp-knowbe4-and-more</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-alteryx-celonis-confluent-typeform-lattice-jfrog-and-rippling</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-docusign-yuja-brex-bitwarden-and-snyk-and-more</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-domo-envoy-productboard-help-scout-and-contentful</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-front-rootly-7shifts-site24x7-shortcut-and-teamwork</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-gong-zoho-basecamp-clickhouse-and-airbyte</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-make-harness-deel-sisense-and-temporalcloud</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-metabase-apollo-youtrack-twingate-pipedrive-expensify-and-rollbar</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/strengthen-your-saas-security-posture-with-our-latest-connected-apps-for-zendesk-crowdstrike-tines-monday-com-and-more</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/support-for-google-single-sign-on-sso-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/surface-and-visualize-shadow-app-usage-in-your-saas-estate-with-new-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/three-new-ways-to-customize-nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/track-key-saas-security-metrics-with-new-exec-ready-reporting</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/tune-out-the-noise-by-filtering-apps-by-number-of-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/updated-oauth-risk-scores-account-for-additional-risk-context</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/updated-onboarding-process-helps-users-surface-and-act-on-apps-with-access-to-sensitive-data-after-email-analysis</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/vendor-security-insights-now-available-for-apps</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/verify-or-update-technical-contacts-with-a-new-nudge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/view-accounts-linked-to-app-instances-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/visualize-ai-usage-trends-with-a-new-ai-dashboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/visualize-app-usage-by-organizational-unit</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog/visualize-saas-account-adoption-over-time</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/ai-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/browser-extension</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/employee-offboarding</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/feature-update</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/fix</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/integration</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/new-feature</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/new-product</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/notifications</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/nudges</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/oauth-grants</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/playbooks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/saas-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/saas-discovery</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/saas-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/changelog-categories/ux</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/5-steps-to-full-saas-visibility</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/a-look-inside-nudge-securitys-22-5-m-series-a</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/actual-tech-media-mega-cast</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/automate-tedious-it-offboarding-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/automating-saas-ai-governance-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/debunking-the-stupid-user-myth-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/discover-and-secure-all-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/discover-and-secure-all-saas-apps-with-nudge-security-castle-ventures</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/discover-secure-and-govern-saas-and-ai-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-1-rethinking-the-modern-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-2-the-security-risk-that-should-be-avoidable</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-3-navigating-the-challenges-of-saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-5-managing-risk-vs-friction-in-it-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-6-considering-the-human-element-in-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-7-transforming-it-governance-in-response-to-generative-ai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-8-data-privacy-implications-of-generative-ai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/episode-9-securing-modern-work-from-the-network-edge-to-the-identity-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/fortifying-your-saas-supply-chain-lessons-from-the-salesloft-drift-breach</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/from-chaos-to-control-managing-saas-sprawl-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/from-chaos-to-control-scaling-identity-security-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/full-of-saas-and-totally-secure</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/gain-control-of-saas-spend-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-decipher-oauth-and-app-to-app-integration-risks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-deliver-guardrails-to-your-workforce-via-the-browser</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-discover-and-govern-ai-usage-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-get-up-and-running-quickly-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-harden-your-identity-security-posture-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-scale-ai-governance-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-simplify-5-tedious-it-governance-tasks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/how-to-strengthen-security-posture-across-saas-apps-and-identities</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/implementing-security-guardrails-with-nudges-from-policy-to-practice</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/learn-how-to-take-control-of-shadow-ai-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/mitigate-ai-usage-risks-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/newsday-tuesday-april</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/newsday-tuesday-february</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/nudge-security-product-demo-pool-party-edition</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/nudge-security-product-demo-super-sspm-september</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/nudge-security-the-5-minute-product-tour</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/office-hours-special-session-fall-feature-showcase</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/q1-release-roundup-what-we-shipped-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/regain-control-of-saas-spend-and-sprawl-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/regain-control-of-shadow-saas-and-secure-the-workforce-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/running-ai-governance-at-the-workforce-edge</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/saas-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/secure-your-critical-saas-apps-with-nudge-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/the-art-of-nudging</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/unlocking-saas-identity-governance-with-nudge-security-actual-tech</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/webcast-recording/whose-app-is-it-anyway-how-to-regain-control-of-saas-identity-governance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/glaad</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/gridx</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/karmacheck</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/nonstop-health</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/stravito</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/wallace-plese-dreher</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/case-study/watershed</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/research-guides-categories/comparisons</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/research-guides-categories/guides</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/research-guides-categories/research</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/research-guides-categories/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/7shifts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/abacus-ai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/aha</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/airbyte</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/airtable</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/alteryx</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/anthropic</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/apollo</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/asana</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/atlassian</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/basecamp</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/bitrise</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/bitwarden</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/brex</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/buildkite</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/calendly</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/celonis</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/claude-managed-agents</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/clickhouse</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/clickup</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/cloudflare</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/confluent</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/contentful</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/cursor</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/databricks</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/datadog</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/deel</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/docusign</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/domo</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/drata</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/dynatrace</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/elastic-cloud</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/envoy</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/expensify</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/fastly</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/fivetran</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/freshservice</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/front</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/gemini</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/github</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/gong</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/grafana</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/grammarly</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/greenhouse</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/harness</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/help-scout</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/hubspot</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/jfrog</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/jumpcloud</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/knowbe4</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/langsmith-fleet</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/lattice</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/launchdarkly</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/linear</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/linode</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/lucidchart</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/mailgun</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/make</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/meraki</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/metabase</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/microsoft-copilot-studio</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/miro</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/monday-com</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/mongodb</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/n8n</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/netlify</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/netsuite</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/new-relic</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/notion</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/okta</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/openai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/openai-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/pagerduty</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/pandadoc</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/pipedrive</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/postman</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/productboard</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/ramp</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/render</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/retool</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/rippling</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/rollbar</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/rootly</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/salesforce</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/scaleway</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/sendgrid</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/sentry</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/servicenow</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/shortcut</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/sisense</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/site24x7</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/slack</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/smartsheet</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/snowflake</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/snyk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/sumo-logic</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/tableau</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/tailscale</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/teamwork</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/temporal-cloud</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/tines</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/twingate</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/typeform</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/vercel</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/vultr</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/workato</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/workday</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/youtrack</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/yuja</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/zendesk</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/zoho</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/connected-app/zoom</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/access-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/account-takeover</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/agent-to-agent-protocol</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/ai-agent</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/ai-agent-protocol</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/ai-agentic-framework</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/ai-security-posture-management-aispm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/cloud-access-security-broker-casb</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/cloud-security-posture-management-cspm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/configuration-drift</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/data-breach</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/generative-ai-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-and-access-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-attack-surface-management-iasm</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-hygiene</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-provider</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-security</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/identity-threat-detection-and-response-itdr</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/large-language-model</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/mcp-client</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/mcp-server</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/model-context-protocol</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/non-human-identity</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/oauth-open-authorization</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/openid-connect-oidc</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/password-manager</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/privileged-accounts</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/saas-sprawl</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/secure-access-service-edge-sase</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/secure-web-gateway-swg</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/security-assertion-markup-language-saml</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/shadow-it</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/shadow-saas</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/shadow-saas-management</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/single-sign-on-sso</loc>
    </url>
    <url>
        <loc>https://www.nudgesecurity.com/saas-security-glossary/vulnerability-assessment</loc>
    </url>
</urlset>