<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.beyondidentity.com/solutions/eliminate-identity-based-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/get-demo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/collections/blog</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/collections/phishing-101</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/collections/all</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/demo-center</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/guided-demo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/partners</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/company/about-us</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/integrations</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/careers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/search</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/news</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/partner-resource-center</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/company/events</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/secure-sso</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/device-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/exceed-compliance-requirements</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/get-rid-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/achieve-zero-trust-maturity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/support</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/see-the-proof</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/realitycheck</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/collections/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/compare/vs-traditional-sso</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/compare/vs-traditional-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/connectivity-test</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/get-demo-1</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/government</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/podcast</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/accelerator</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/secure-legacy-systems</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/secure-ai-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/ai-trust-layer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/solutions/customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/products/secure-customers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/beyond-identity-on-the-freight-guru-podcast</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/brandt-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/firehydrant-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/hr-tech-startup-reduces-threat-of-phishing-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/monolithic-power-systems-secures-critical-ai-infrastructure-while-eliminating-credential-theft</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/orum-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/red-cup-it-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/runbuggy-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/snowflake-beyond-identity-secure-devops-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/snowflake-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/taulia-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/teamtailor-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/top-50-international-retailer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/customer-stories/ylopo-case-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/agent-on-the-endpoint</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/authenticator-assurance-levels</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/beyond-identity-failed-phishing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/beyond-identity-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/biometrics</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/continuous-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/device-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/fido-passkey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/hardware-security-key</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/o365-number-matching</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-insecure-launch</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-sso-duo-biometrics</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-sso-duo-yubikey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-sso-push</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-sso-sms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/okta-sso-totp</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/ping-one-push</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/push</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/secure-launch-mechanisms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/sms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/totp</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/verifier-impersonation-resistance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/what-is-phish-resistant</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/phishing-101/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/10-organizations-that-suffered-massive-data-breaches-in-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/10-secure-software-development-myths</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/10-states-most-at-risk-for-malware-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/10-statistics-that-show-the-cost-of-a-data-breach-to-companies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/3-alternative-authentication-methods-for-online-customers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/3-ci-cd-pipeline-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/3-major-trends-at-gartner-identity-and-rsa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/3-ways-to-decrease-customer-authentication-friction-while-increasing-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/451-business-impact-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/451-research-pathfinder-report-a-zero-trust-strategy-starts-with-strong-authentication---of-both-users-and-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/451-round-table-recap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/451-round-table-what-role-does-passwordless-mfa-device-trust-and-managing-developer-keys-play-in-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-authentication-requirements-for-zero-trust-environments</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-best-practices-for-authentication-in-a-zero-trust-strategy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-github-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-key-takeaways-from-the-2021-verizon-data-breach-investigations-report-dbir</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-mobile-device-management-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-risks-to-your-current-code-signing-system</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-things-a-modern-mfa-should-do</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-types-of-security-vulnerabilities-in-e-commerce-and-how-to-protect-against-them</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-unsolved-cybersecurity-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/5-ways-to-check-if-any-of-your-employees-passwords-have-been-leaked-or-reused</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/7-requirements-you-must-have-in-a-zero-trust-authentication-solution</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/8-dont-miss-sessions-at-rsac-2024</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-better-way-to-prevent-account-takeover-and-other-password-based-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-clear-path-forward-with-oktas-har-file-challenges</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-digital-dive-into-brand-security-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-look-inside-beyond-identity-and-oktas-passwordless-single-sign-on-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-practitioners-guide-to-the-cisa-zero-trust-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-risk-based-case-for-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/a-tale-of-two-keys-the-simple-explanation-of-passwordless</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/about-the-bridge-to-zero-trust-virtual-event</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/accelerate-authentication-for-broker-dealers-and-clients</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/account-recovery-sucks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/achieving-cjis-compliance-with-beyond-identitys-phishing-resistant-passwordless-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/acquisition-and-retention-how-does-authentication-impact-each</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/active-microsoft-adfs-phishing-campaign-bypasses-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/advance-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/adversaries-exploit-japanese-brokerage-accounts-in-700m-stock-manipulation-spree</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ai-chat-podcast-how-hackers-use-ai-how-to-stop-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ai-for-founders-agentic-ai-deepfakes-and-the-end-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/aligning-with-nsas-new-cloud-commandments-the-beyond-identity-blueprint-for-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/an-avalanche-of-news-about-snowflake-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcement-beyond-identity-authenticator-now-in-kandji-auto-apps-library</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-beyond-identity-splunks-partnership-and-integration-get-full-authentication-event-data-for-risk-modeling-and-security-insights</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-beyond-identitys-new-auth0-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-beyond-identitys-new-integration-with-microsoft-adfs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-beyond-identitys-new-integration-with-the-curity-identity-server</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-misa-partnership-and-microsoft-azure-ad-sso-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/announcing-okta-defense-kit</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/api-security-starts-with-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/are-account-moochers-putting-your-money-at-risk-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/are-passkeys-2fa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/are-password-resets-costing-your-company-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/are-you-using-phishing-resistant-mfa-probably-not</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/assume-a-hostile-environment</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/asymmetric-cryptography-and-secure-enclaves</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/asymmetric-encryption-vs-symmetric-encryption</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/attackers-love-your-sso-heres-how-to-fight-back</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/augments-authentication-flows</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/august-product-update-livestream</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authentication-flows-explained</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authentication-meets-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authentication-metrics-to-track-and-why-they-matter</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authentication-metrics-to-track-and-why-they-matter-1fd02</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authentication-vs-authorization-differences-and-similarities</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authquake-a-new-brute-force-attack-on-microsoft-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/authquake-the-brute-force-attack-exploiting-microsoft-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/automatic-provisioning-with-scim</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/best-practices-for-customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/better-byod-maintaining-security-and-employee-privacy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-device-management-closing-the-security-gap-over-risky-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-admin-console-overview</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-bubble</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-crowdstrike-configuration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-crowdstrike-configuration-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-crowdstrike-integration-advanced-attack-prevention-and-a-strong-zero-trust-foundation</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-crowdstrike-the-foundation-of-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-microsoft-adfs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-okta</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-palo-alto-networks-integration-helps-customers-on-the-journey-to-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-splunk-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-the-zero-trust-security-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-and-zscaler</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-announces-fido2-certification</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-appoints-new-leaders-to-support-strategic-growth-initiatives</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-comic</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-crowdstrike-the-deepest-iam-integration-for-continuous-risk-based-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-expands-crowdstrike-integration-to-enforce-real-time-access-decisions-with-comprehensive-risk-attributes</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-expands-integrations-ecosystem-to-no-code-passkey-plugin-for-bubble</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-fido2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-for-educational-institutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-for-fsi-financial-services-banking-insurance-fintech</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-for-technology-leaders</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-is-conquering-cross-platform-woes-for-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-isnt-what-i-expected-but-could-be-what-we-need</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-joins-nvidia-inception-program-to-advance-hardware-enforced-security-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-launches-new-channel-program-to-accelerate-partner-business-growth</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-launches-partner-program-for-account-onboarding-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-microsoft-adfs-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-nextauth-js</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-okta-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-on-the-freight-guru-podcast</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-secure-devops-video</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-secure-sso-delivering-99-99-uptime</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-signs-cisa-secure-by-design-pledge</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-signs-reseller-agreement-with-mki</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-teams-with-forgerock-to-form-the-building-blocks-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-vs-duo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-vs-duo-only-one-delivers-true-phishing-resistance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-vs-duo-putting-phishing-resistance-to-the-test</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-vs-microsoft-the-secure-iam-choice-for-modern-enterprises</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-vs-okta-what-sets-us-apart</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identity-was-not-impacted-by-the-recent-okta-security-incident</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-crowdstrike-integration-going-from-detection-response-to-prevention</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-investment-in-identity-standards-ipsie</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-security-guarantees</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-unphishable-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-vision-roadmap-2024</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-zero-trust-assessment-tool-unlock-your-security-potential</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-identitys-zero-trust-authentication-under-the-hood</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-crowdstrike-2025-global-threat-report</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-easy-to-use</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-hot-takes-hot-standards-with-jasson-casey-the-office-of-the-cto</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-secure-by-design</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-simple-to-administer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-the-3-zero-trust-perimeters-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyond-talk-why-you-need-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyondtrust-and-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyondtrust-and-beyond-identity-secure-remote-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyondtrust-incident-does-not-impact-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/beyondtrust-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/billions-spent-on-security-and-were-still-losing-to-phishing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/binding-identity-to-device</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/biometric-compliance-and-privacy-with-beyond-identitys-modern-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/blog-the-unseen-threat-why-non-human-identity-nhi-is-the-next-frontier-in-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/bridging-the-gap-honoring-veterans-in-cybersecurity-with-vetsec-at-rsac</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/browsing-in-the-age-of-malware-the-most-dangerous-work-related-search-terms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/building-a-modern-authentication-architecture</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/byod-exploring-the-evolution-of-work-device-practices-in-a-new-remote-forward-era-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/byod-security-risks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/california-cell-phone-reimbursement-law-stop-two-device-mfa-costs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/can-passwordless-authentication-replace-my-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/can-you-have-zero-trust-authentication-with-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/case-study-passwordless-authentication-for-drupal-with-beyond-identity-universal-passkey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/chatgpts-dark-side-cyber-experts-warn-ai-will-aid-cyberattacks-in-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/chips-and-slsa-why-tpms-matter-for-code-commits</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cicd-pipelines-are-a-no-mans-land-of-ownership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ciso-brief-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ciso-brief-eu-ai-act-2c43c</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/closing-the-gaps-in-endpoint-security-beyond-traditional-solutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cloudflare-breach-looking-into-cloudflares-thanksgiving-2023-security-incident</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/code-injection-attack-what-it-is-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/colleges-with-the-most-cybersecurity-alumni-in-the-u-s</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/combating-deepfakes-and-generative-ai-a-zero-trust-approach-to-authenticity-assurance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/companies-cybersecurity-concerns-with-gig-economy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/context-based-authentication-examples-across-industries</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/continuous-authentication-and-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/continuous-risk-based-access-control-with-beyond-identitys-crowdstrike-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cost-of-passwords-resets-breaches-and-more</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/countries-with-the-most--and-least--digital-freedom</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/credential-theft-and-signing-fools</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/crowdstrike-and-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/crowdstrike-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/customer-authentication-with-zero-friction-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cve-2025-59363-onelogin-breach-highlights-urgent-need-to-secure-non-human-identities</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybereason-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-habits-of-hyper-growth-companies-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-in-an-economic-downturn</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-maturity-model-certification</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-does-mfa-stop-99-of-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-does-mfa-stop-credential-theft</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-is-mdm-enough</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-is-there-such-a-thing-as-a-strong-password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-more-devices-mean-more-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-passwords-vs-passkeys</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-mythbusters-tpms-cant-be-hacked</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/cybersecurity-risks-of-improper-offboarding-after-layoffs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/darcula-phishing-as-a-service-platform-that-autogenerates-branded-kits</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/data-breaches-are-more-costly-for-these-10-industries</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/december-product-update-livestream</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/deepfake-defense-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/delivering-on-the-secure-by-design-pledge</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/design-unfiltered-ai-tooling-adoption-with-allan-ziolkowski</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/device-integrity-checks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/device-trust-a-key-element-of-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/device-trust-the-future-of-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/devs-dont-want-to-talk-to-sales</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/dimensions-of-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/dr-zero-trust-on-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/drizly-ftc-verdict-could-set-new-precedent-for-ceos</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/early-access-secure-desktop-access-with-beyond-identity-windows-desktop-login-and-yubikeys</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/elevate-passkey-security-with-beyond-identity-nametag</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/eliminate-password-based-attacks-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/eliminating-passwords-a-security-vp-shares-rationale-journey-and-impacts</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/em360-podcast-software-supply-chain-attacks-and-the-best-defense</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/engineers-hate-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/enterprise-deployment-of-fido2-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/everything-you-need-to-know-about-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/everything-you-need-to-know-about-the-bridge-to-zero-trust-virtual-event</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/evilginx-demo-it-costs-130-to-hack-your-idp</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/fido-alliance-the-road-ahead-for-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/fido-is-the-future-but-not-for-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/fido2-vs-u2f-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/fido2-vs-webauthn-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/fintech-security-concerns-solve-them-with-stronger-and-frictionless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/five-takeaways-from-the-zero-trust-leadership-series-kickoff</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/for-developers-whats-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/former-employees-admit-to-using-continued-account-access-to-harm-previous-employers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/four-ways-to-make-quick-gains-in-zero-trust-maturity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/friction-isnt-bad</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/frictionless-authentication-across-ecommerce-media-travel-and-fintech-industries</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/frictionless-security-protect-critical-resources-with-seamless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/from-concept-to-practice-architecting-and-accelerating-your-zero-trust-objectives</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/from-corporate-leader-to-trailblazer-mike-starr-on-start-up-life</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/from-reactive-to-proactive-a-practitioners-guide-to-zero-trust-after-the-f5-breach</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/from-the-battlefield-to-the-cyber-frontlines-why-veterans-belong-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/futurecon-recap-the-past-present-and-future-of-strong-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/gartner-designates-passwordless-authentication-a-priority-for-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/getting-hacked-through-a-video-game</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/githubs-2fa-mandate-is-not-enough</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/gitlab-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/goodbye-legacy-microsoft-mfa-future-proofing-with-modern-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/guarantee-ai-deception-prevention-with-realitycheck</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/guaranteed-security-from-probabilities-to-absolutes</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/guarding-the-gates-navigating-oktas-confusing-recommendations-for-a-robust-security-posture</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/guest-episode-from-category-visionaries-featuring-tj-jermoluk-ceo-of-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-april-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-december-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-february-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-january-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-march-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-may-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-november-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacker-tracker-october-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacking-duo-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacking-microsoft-in-real-time-number-matching</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hacking-microsoft-in-real-time-username-and-password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hardening-desktop-operating-systems-in-security-conscious-organizations</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hello-from-the-other-side-phishing-through-the-eyes-of-a-cyber-attacker</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hello-world-presenting-beyond-identity-universal-passkey-sdks-and-apis-for-developers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/here-are-some-of-the-ways-they-stole-passwords-in-2020</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/high-availability-at-cloud-scale</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hiring-fraud-is-costing-you-more-than-you-think</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/history-of-online-security-from-captcha-to-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/hitting-a-balance-between-security-and-customer-friction</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-ai-is-accelerating-threats</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-attackers-bypass-fido-why-synced-passkeys-fail-and-what-to-do-instead</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-addresses-the-executive-order-on-improving-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-nametag-stop-identity-fraud-at-onboarding-recovery</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-protects-against-account-takeover-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-reinforces-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-secures-its-workforce-with-our-new-crowdstrike-integration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-beyond-identity-works</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-can-eliminating-passwords-help-prevent-ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-companies-can-prevent-identity-based-attacks-sept-2025</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-delegation-federation-work</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-device-trust-is-key-to-securing-cloud-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-do-chrome-users-react-to-password-alerts-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-has-a-decade-of-cybercrime-impacted-the-united-states-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-is-continuous-authentication-different-from-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-mfa-is-bypassed-0ktapus-explained</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-mfa-is-bypassed-attacker-in-the-endpoint</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-mfa-is-bypassed-attacker-in-the-middle</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-mfa-is-bypassed-mfa-fatigue-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-passkeys-change-the-authentication-game</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-passwordless-and-unphishable-mfa-underpins-zero-trust-initiatives</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-secure-is-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-the-product-design-team-at-beyond-identity-leverages-ai-designing-with-claude-code</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-block-rdp-enabled-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-choose-an-authentication-method-for-your-new-project</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-defend-against-rockstar-2fa-bypass-attacks-targeting-microsoft-and-google</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-eliminate-identity-based-threats</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-eliminate-identity-based-threats-with-the-hacker-news</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-ensure-security-settings-are-configured-properly-on-your-employees-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-maintain-security-when-employees-work-remotely</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-manage-secure-access-for-contractors-and-third-parties</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-prevent-phishing-a-new-approach</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-protect-your-source-code</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-stop-lateral-movement-in-on-prem-apps-with-crowdstrike-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-to-stop-malicious-code-injection-at-repo-infographic</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-your-mfa-can-be-hacked</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/how-your-mfa-can-be-hacked-with-examples</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-a-key-element-to-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-analytics-to-ai-my-journey-into-llms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-based-cyber-jasson-casey-on-beyond-identity-and-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-binding-for-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-first-strategies-for-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-in-organizations-is-too-entrenched-to-warrant-a-rethink</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/identity-should-be-self-sovereign</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/if-not-passwords-then-what</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/implementing-beyond-identity-frequently-asked-questions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/importance-of-provenance-tpms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/improving-user-access-and-identity-management-to-address-modern-enterprise-risk</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/inside-the-crowdstrike-2025-global-threat-report-identity-woes-and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/integrate-beyond-identity-with-okta</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/intro-to-beyond-identity-secure-workforce</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-access360</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-ceros-the-agentic-ai-trust-layer-now-open-for-public-preview</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-code-commit-signing-to-secure-your-sdlc</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-device360-device-security-visibility-across-all-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-new-device-context-and-mdm-integrations</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-no-code-passkey-plugins-for-bubble-applications</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-realitycheck</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-secure-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-self-serve-access-to-secure-customers-sdks-and-apis</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-the-passkey-journey-free-tool-to-simplify-passkey-adoption</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-the-passkey-journey-free-tool-to-simplify-passkey-adoption-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introducing-zero-friction-passwordless-authentication-for-customers-that-eliminates-account-takeover-fraud</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/introduction-to-webauthn-what-is-it-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/is-duo-authentication-safe</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/is-it-finally-time-to-kill-traditional-two-factor-authentication-and-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/is-two-factor-authentication-2fa-worth-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/is-your-organization-still-using-the-old-ways-to-prevent-ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/january-2025-breach-roundup</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/jarrod-benson-ciso-of-koch-industries-on-securing-the-cloud-and-passwordless-identity-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/jim-clark-on-founding-netscape-pki-and-the-elimination-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/july-hacker-tracker</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/june-hacker-tracker</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/kuppingercole-executive-view-beyond-identity-secure-customers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/kuppingercole-executive-view-beyond-identity-secure-devops</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/kuppingercole-executive-view-beyond-identity-secure-work</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/lastpass-isnt-the-problem</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/latest-innovations-defending-against-deepfakes-and-universal-mfa-coverage</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/leadership-panel-authentication-meets-the-zero-trust-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/level-up-microsoft-conditional-access-with-beyond-identitys-device-security-checks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/live-coding-embed-passwordless-authentication-in-an-ios-application-in-under-20-minutes</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/logging-in-sucks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/logging-in-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/lost-value-in-customer-authentication-frustration-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/machine-credentials-are-identities-its-time-to-treat-them-that-way</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/make-identity-based-attacks-impossible</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/managing-your-attack-surface-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mario-duarte-vp-of-security-at-snowflake-on-going-beyond-passwordless-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/marks-spencer-cyberattack-disrupts-operations-what-happened-and-how-to-respond</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/maximizing-authentication-performance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/measuring-password-fatigue-usability-and-cybersecurity-impacts-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/meet-secure-access-the-only-secure-by-design-sso-platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/meeting-cjis-compliance-with-wdl</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/meeting-cjis-compliance-with-wdl-c5169</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/merging-safely-beyond-identitys-blueprint-for-secure-corporate-expansion</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mfa-and-autofill-security-and-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mfa-and-phishing-explained</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mfa-breaches-are-endemic-best-practices-from-snowflakes-response</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/microsoft-azure-ad-sso-integration-user-experience</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mitigating-risks-in-the-wake-of-okta-breaches-a-two-pronged-approach</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mitigating-risks-of-mfa-related-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/mobile-device-security-checklist-5-things-to-check</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/most-mfa-is-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/multi-factor-authentication-trends-challenges</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/nea-on-why-they-invested-in-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-beyond-identity-rebrand-built-to-make-identity-based-threats-impossible</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-executive-order-prioritizes-phishing-resistant-authentication-for-federal-agencies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-feature-announcement-risk-dashboards</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-realitycheck-for-teams-to-protect-every-communication-with-verifiable-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-secure-credential-extension-now-available-in-secure-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/new-self-remediation-features-to-reduce-help-desk-tickets-and-improve-ux</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/nist-and-passwordless-solutions-meeting-compliance-needs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/nist-and-zero-trust-architecture-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/no-more-compromise-the-first-and-only-secure-by-design-access-platform-is-here</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/not-all-mfas-are-created-equal-some-mfas-are-more-equal-than-others</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ntt-com-breach-exposes-18-000-organizations-what-went-wrong-and-how-to-fight-back</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/nycrr-nydfs-compliance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/nydfs-and-multi-factor-authentication-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/oauth-security-workshop-2025-wrap-up</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/offensive-ai-could-replace-red-teams</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/oidc-vs-saml-understanding-the-differences</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/okta-breach-timeline-breaking-down-the-hacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/okta-cyber-trust-report-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/okta-lastpass-cisco-twilio-lessons-learned-from-recent-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/online-job-board-safety-how-and-why-to-avoid-a-scam</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/operationalizing-enterprise-deployment-of-fido2-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/optiv-zero-trust-assessment-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/osquery-transforming-endpoint-security-and-fleet-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/over-1-000-americans-divulge-their-password-habits-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/palo-alto-networks-and-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/palo-alto-networks-and-beyond-identitys-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/palo-alto-networks-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/panel-on-eliminating-passwords-and-other-ways-to-stop-ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passkey-is-a-great-branding</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passkeys-building-blocks-for-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-based-mfa-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-faux-pas</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-managers-hacked-a-comprehensive-overview</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-palooza-webinar-recap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-palooza-whats-the-real-exposure-and-how-to-fix-the-password-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-security-check-is-mfa-still-effective</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-sharing-at-work-exploring-employees-habits-around-passwords-in-the-workplace</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/password-statistics-what-are-passwords-costing-you</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-authentication-guide</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-authentication-user-experience-ux-why-its-better</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-customer-authentication-reduce-friction-and-increase-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-desktop-login</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-e-commerce-make-the-checkout-experience-enjoyable</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-identity-management-for-workforces</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-mfa-vs-one-time-codes</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-sso-login</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwordless-unphishable-mfa-for-practically-any-sso-in-the-market</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passwords-suck</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/passworldess-customer-authentication-reduce-friction-and-increase-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/pci-dss-compliance-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/pci-dss-revision-4-what-you-need-to-know-for-march-2025-enforcement</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/phishable-mfa-vs-phishing-resistant-mfa-demo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/phishable-vs-unphishable-mfa-factors</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/phishing-101-the-ultimate-phishing-and-identity-protection-glossary</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/phishing-resistant-low-friction-mfa-advances-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/phishing-resistant-mfa-the-answer-to-the-mfa-emergency</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/pin-code-vs-password-which-is-more-secure</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ping-identity-and-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/pki-based-mfa-requires-mature-identity-management-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/platform-authenticators-in-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/policy-is-the-essence-of-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/prevention-is-better-than-detection</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/privacy-first-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/pros-cons-of-social-logins</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/protecting-against-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/protecting-hybrid-work-a-guide-to-unmanaged-device-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/psd2-compliance-requirements-how-to-meet-them-with-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/putting-the-continuous-in-continuous-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/q1-2023-new-features-announcement</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/q2-product-update-livestream</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ransomware-prevention-is-the-new-recovery</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/rebuilding-authentication-for-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/recent-breaches-what-happened-how-to-protect-your-organization-in-2025</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/reclaim-the-moments-that-matter-with-secure-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/red-cup-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/registration-sucks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/regular-people-dont-need-to-care-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/rela8-central-roundtable</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/rela8-roundtable-what-brands-get-wrong-about-customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/reliable-and-available-authentication-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/risk-policies-and-step-up-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/rolling-out-passwordless-just-got-easier</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/rust-beyond-identitys-journey-to-memory-safety</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/salt-typhoon-jumbledpath-malware-targeting-us-telecom-providers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/scaling-application-authentication-to-enable-digital-agility</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/scaling-down-to-drive-adoption</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/scattered-spider</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secret-blizzard-a-russian-mitm-operation-targeting-embassies-and-why-modern-identity-security-matters</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-access-how-beyond-identity-enables-security-guarantees</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-access-platform-overview</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-code-commits-with-gitlab</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-customers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-customers-by-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-customers-datasheet</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-customers-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-desktop-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-devops-datasheet</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-non-human-identities-how-to-protect-your-agents-automated-scripts-and-service-accounts</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-remote-access-what-is-it-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-sdlc-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-software-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-work-for-cyberark-workforce-identity-single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-work-for-google-sso</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-work-for-onelogin-by-one-identity-sso</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-workforce-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-workforce-zero-trust-authentication-in-action</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-your-private-ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/secure-your-repo-access-code-commits-with-gitlab-and-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/securing-agentic-ai-from-mcps-tool-use-to-shadow-api-key-sprawl</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/securing-remote-work</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/securing-remote-work-insights-into-cyber-threats-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/securing-user-and-device-access-for-a-distributed-multi-cloud-world</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/securing-your-workforce-with-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-analogies-are-misleading</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-deep-dive-hardware-bound-versus-software-bound-passkey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-is-a-ux-problem</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-perimeters-in-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-unfiltered-podcast-the-future-of-device-authentication-is-here</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-vulnerabilities-in-git-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/security-within-reach-practical-steps-to-get-on-the-road-to-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/should-passwords-be-considered-a-ubiquitious-cve</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/shut-the-front-door-eliminating-passwords-and-other-ways-to-stop-ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/single-device-mfa-eliminating-risks-and-enabling-frictionless-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/six-easy-steps-to-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/sneaky-2fa-dangerous-new-threat-targeting-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/so-long-and-thanks-for-all-the-phish</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/social-logins-suck</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/software-people-stories-podcast-exploring-cybersecurity-innovation-with-jasson-casey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/software-supply-chain-attack-methods-behind-solarwinds-kaseya-and-notpetya-and-how-to-prevent-them</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/sorry-about-all-the-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ssh-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/statement-on-recent-snowflake-security-incident</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/static-access-control-is-over-how-to-make-real-time-decisions-with-integrated-risk-signals</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/steps-to-secure-your-sdlc</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/stop-blaming-users-for-their-insecure-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/stop-bot-executed-credential-attacks-with-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/strengthening-cyber-defenses-in-the-wake-of-the-midnight-blizzard-attack-on-microsoft</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/strengthening-industry-authentication-standards-with-the-tpm</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/strong-authentication-is-the-nexus-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/strong-passwordless-authentication-101-virtual-beer-tasting</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/taher-elgamal-on-how-ssl-paved-the-way-for-a-passwordless-future</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/taher-elgamal-the-father-of-ssl-on-why-passwords-must-be-eliminated</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ten-ise-fireside-chat</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/ten-ise-fireside-chat-recap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-attacker-gave-claude-their-api-key-why-ai-agents-need-hardware-bound-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-benefits-of-integrating-zero-trust-authentication-and-iam</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-benefits-of-passwordless-identity-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-cisos-report-infographic</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-cisos-report-perspectives-challenges-and-plans-for-2022-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-cyber-readiness-podcast-sept-2025</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-cybersecurity-labor-shortage-is-a-population-problem</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-definitive-zero-trust-authentication-checklist</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-evolving-legal-landscape-for-biometric-privacy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-future-is-passwordless-if-you-do-it-right</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-future-of-authentication-technologies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-future-of-hacking-is-ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-hacker-news-winning-the-ai-arms-race</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-history-and-future-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-importance-of-user-experience-in-customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-journey-to-and-then-beyond-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-journey-to-zero-trust-starts-with-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-mfa-emergency-and-the-changing-status-quo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-new-blind-spot-in-ai-native-orgs-untrusted-devices-agentic-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-new-cybersecurity-perimeter-part-1</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-new-cybersecurity-perimeter-part-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-new-cybersecurity-perimeter-part-3</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-new-salesforce-mfa-requirement-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-next-frontier-of-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-next-phase-of-identity-and-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-nexus-of-strong-authentication-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-past-present-and-future-of-strong-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-power-of-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-rise-of-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-rise-of-zero-trust-authentication-6e8df</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-things-you-wanted-to-know-about-beyond-identity-but-were-afraid-to-ask</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-top-10-mfa-bypass-hacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-unpatchable-user-the-case-for-continuous-device-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/the-us-government-is-now-requiring-phishing-resistant-mfa-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/thinking-zero-trust-with-dr-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/threads-shouldve-launched-with-passkeys</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/thwart-supply-chain-attacks-by-securing-development</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/thwart-supply-chain-attacks-by-securing-development-build-vulnerabilities-webinar-recap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/tj-and-nyse</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/tom-tj-jermoluk-co-founder-and-ceo-of-beyond-identity-on-the-benefits-of-passwordless</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/top-10-takeaways-from-beyondcon-2024</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/top-trends-and-topics-coming-out-of-the-rsa-and-gartner-conferences</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/traditional-two-factor-authentication-vs-beyond-identitys-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/trusted-computing-has-a-negative-connotation</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/turn-off-push-based-mfa-today</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/understanding-the-7-keys-to-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/universal-identity-defense-for-legacy-and-on-prem-applications-with-beyond-identity-and-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/universal-passkeys-integration-for-wordpress-and-drupal</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/unlock-high-fidelity-security-with-the-new-beyond-identity-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/us-government-on-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/user-self-enrollment-through-single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/user-self-service-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/using-push-notifications-for-mfa-is-a-security-liability</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/verizon-dbir-2025-access-is-still-the-point-of-failure</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/webauthn-capabilities-and-limitations</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/webinar-2025-identity-security-trends-and-compliance-strategies-for-tech-companies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/webinar-recap-eliminating-passwords-and-other-ways-to-stop-ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/webinar-the-myth-of-mfa-how-legacy-authentication-fails-us</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-50-cisos-told-us-the-top-ai-risks-theyre-budgeting-for-in-2026</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-are-passkeys</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-brands-get-wrong-about-customer-authentication-a-discussion-around-approaches-to-customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-brands-get-wrong-about-customer-authentication-eliminating-frustration-and-friction</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-brands-get-wrong-about-customer-authentication-security-and-the-user-experience</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-brands-get-wrong-about-customer-authentication-why-its-imperative-to-get-customer-authentication-right</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-developers-need-to-know-about-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-asymmetric-cryptography-and-how-does-beyond-identity-use-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-device-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-invisible-mfa-and-why-do-you-need-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-needed-for-a-modern-authentication-solution</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-oauth-2-0</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-oidc</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-phish-resistance-really</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-push-bombing-and-how-beyond-identity-makes-it-impossible</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-risk-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-secure-devops</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-step-up-authentication-how-it-works-and-examples</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-is-the-tpm-trusted-platform-module-and-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-makes-a-good-access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-to-do-about-unknown-devices-attempting-to-access-accounts</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-to-know-from-the-2022-verizon-data-breach-investigations-report-dbir</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-you-missed-at-the-bridge-to-zero-trust-virtual-event</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/what-you-need-to-know-from-the-2023-verizon-data-breach-report</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/whats-fido</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/whats-next-for-beyond-identity-after-raising-100-million</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/whats-the-difference-between-passkeys-and-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/whats-the-most-secure-and-trustworthy-cryptocurrency-exchange-study</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/whats-wrong-with-our-sign-in-process-hackers-dont-break-in-they-log-in</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/which-authentication-method-is-most-secure</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/which-mfa-is-better-beyond-identity-vs-duo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/who-is-most-affected-by-ransomware-and-why</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-companies-need-both-zero-trust-authentication-and-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-evolution-equity-partners-invested-in-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-is-code-provenance-non-negotiable-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-passwords-stink</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-shared-signals-framework-will-transform-your-security-roi</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-strong-passwordless-authentication-is-a-foundational-element-of-your-iam-and-security-portfolio</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-the-github-2023-2fa-mandate-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-unqork-chose-beyond-identity-for-secure-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-you-have-an-mfa-emergency</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-you-should-remove-the-password-to-your-single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/why-your-mfa-is-insecure</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/will-the-a-in-rsa-be-replaced-by-ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/windows-desktop-login-with-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/workforce-user-self-enroll-manage-recover-devices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/world-wide-technology-advanced-technology-center-atc</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/would-you-rather-be-hacked-survey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/your-credit-card-set-the-precedent-for-passwordless</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/your-first-5-minutes-with-ceros-see-what-youve-been-missing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-click-airplay-exploit-puts-apple-devices-at-risk-learn-how-to-protect-your-organization</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-and-continuous-authentication-a-partnership-for-network-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-7-requirements</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-and-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-and-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-and-remote-access-strengthening-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-defined</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-laying-the-foundation-for-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-request-for-information-rfi</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-that-fortifies-it-and-inspires-users</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-the-key-to-securing-remote-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-authentication-within-nist-800-207-framework</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-doesnt-mean-dont-trust-anything</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-foundational-concepts</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-maturity-model-getting-serious-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-means-attackers-shouldnt-trust-you</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-security-what-it-is-and-how-to-achieve-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-sentiments-of-cyber-security-professionals</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zero-trust-vs-vpn-is-it-time-to-ditch-vpns</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zscaler-and-beyond-identity-introduce-integrations-that-lower-the-risk-of-password-based-breaches-and-secure-application-access</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/resource/zscaler-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/atlas-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/auth0</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/aws</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/beyondtrust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/bitbucket</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/bubble</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/ciphertechs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/citrix</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/climb-channel-solutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/curity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/cyberark</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/cybereason</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/cyberone</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/datadog</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/drupal</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/elastic</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/evotek</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/forgerock</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/github</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/gitlab</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/google</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/ignition-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/is4u</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/jamf</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/k-logix</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/legion-star</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/microsoft-adfs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/microsoft-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/microsoft-intune</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/miel</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/nametag</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/netskope</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/onelogin</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/optiv</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/ping-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/pub-sub</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/red-cup-it</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/scsk</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/set-solutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/shibboleth</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/silverfort</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/splunk</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/ssh-communications-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/sumo-logic</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/tachtech</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/tevora</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/the-cyber-monks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/the-migus-group</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/unicloud</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/vmware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/vmware-workspace-one</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/wordpress</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/integrations/world-wide-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/adaptive-authentication-1</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/attack-surface-1</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/brute-force-attack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/dictionary-attack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/federated-identity-management</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/fido2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/identity-as-a-service-idaas</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/insider-threats</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/keystroke-logging</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/magic-links</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/man-in-the-middle-attack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/one-time-passwords-otps</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/out-of-band-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/password-spraying-attack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/phishing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/provisioning-and-deprovisioning</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/rainbow-table-attack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/ransomware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/shoulder-surfing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/glossary/unphishable</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/10-coolest-cybersecurity-products-at-crowdstrike-fal-con-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/10-passwordless-authentication-solutions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/101-best-cyber-security-startups-to-follow-in-2021</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/11-cybersecurity-trends-to-take-from-black-hat-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/16-hot-cybersecurity-startups-pulling-in-funding-and-recognition-despite-the-recession</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/1password-no-user-data-accessed-in-okta-linked-incident</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/2023-sc-awards-finalists-best-authentication-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/49-of-survey-respondents-were-fooled-by-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/5-areas-where-zero-trust-cant-protect-your-organization</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/5-it-security-and-cybersecurity-trends-in-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/5-minutes-with-bob-burke---the-importance-of-advanced-mfa-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/7-security-mistakes-others-made-so-you-probably-shouldnt</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/7-steps-for-navigating-a-zero-trust-journey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/a-new-category-enters-the-cyber-vocabulary-zero-trust-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/ai-and-data-the-15-next-big-things-from-culture-aware-algorithms-to-password-free-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/announcing-zero-trust-authentication-for-managed-devices-and-byod</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/anti-ransomware-day-2023---disaster-is-imminent-without-proactive-steps</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/apple-google-and-microsoft-promise-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/best-identity-management-advice-from-the-first-half-of-2021</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/best-practices-fur-eine-zero-trust-authentisierung</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-a-passwordless-identify-platform-raises-75-million-in-series-b-funding</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-achieves-fedramp-moderate-certification-through-smx-elevate</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-achieves-record-growth-and-momentum-in-2022-tripling-revenue-achieving-fido2-certification-and-attaining-new-strategic-partnerships</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-achieves-soc-2-type-2-certification</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-adds-former-emc-netapp-and-securityscorecard-executive-bill-hogan-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-adds-zero-trust-authentication-addresses-passwords-limitations</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-atlas-identity-announce-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-carahsoft-partner-to-enhance-identity-and-access-management-solutions-in-the-public-sector</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-distology-announce-strategic-distribution-partnership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-ignition-technology-announce-strategic-distribution-partnership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-nametag-announce-strategic-partnership-to-strengthen-identity-access-management-using-deepfake-defense-tm-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-teamworx-security-partner-to-deliver-on-collective-defense-with-the-most-secure-information-sharing-solution-for-governments-aerospace-and-defense</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-world-wide-technology-announce-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-and-world-wide-technology-announce-strategic-partnership-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-announces-expansion-in-europe</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-announces-that-it-has-tripled-its-annual-revenue-in-2022</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-announces-upgrade-with-behavioral-biometrics</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-appoints-juha-hakava-as-regional-director-for-the-nordics</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-appoints-new-leaders-to-support-strategic-growth-initiatives</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-appoints-tony-shadrake-as-emea-vice-president</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-biometrics-launched-to-auth0-marketplace-for-frictionless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-brings-together-pantheon-of-the-security-industry-to-launch-zero-trust-authentication-and-zero-trust-leadership-series-of-events</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-brings-together-pantheon-of-the-security-industry-to-launch-zero-trust-authentication-and-zero-trust-leadership-series-of-events-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-brings-together-pantheon-of-the-security-industry-to-launch-zero-trust-authentication-and-zero-trust-leadership-series-of-events-90cba</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-ceo-passwords-plague-the-world</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-closes-software-supply-chain-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-cybereason-build-zero-trust-solution</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-delivers-the-end-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-enables-any-business-to-eliminate-authentication-friction-and-account-takeover-fraud</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-expands-integration-with-crowdstrike-to-deliver-universal-identity-defense-for-on-prem-resources</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-expands-integrations-with-leading-sso-providers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-integrates-with-microsoft-azure-active-directory-sso</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-integration-with-auth0-enables-completely-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-invests-in-europe-with-new-hires-and-a-frankfurt-data-centre</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-is-now-helping-firms-to-solve-passkey-problems</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-fido-alliance</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-forgerocks-trust-network-of-certified-technology-partners-to-deliver-passwordless-single-sign-on-and-risk-based-authorization</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-gitlab-inc-s-alliance-partner-program-to-secure-software-supply-chains-from-malicious-attacks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-ping-identitys-technology-alliance-program-to-enable-passwordless-single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-the-forgerock-trust-network</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-joins-the-microsoft-intelligent-security-association</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-lands-100m-for-password-free-zero-trust-mfa</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-industrys-first-secure-access-platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-joint-integration-with-cybereason-to-accelerate-enterprise-zero-trust-authentication-strategies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-joint-integration-with-zscaler-to-accelerate-enterprise-zero-trust-security-strategies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-new-passkey-adoption-tool-the-passkey-journey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-new-passkey-adoption-tool-the-passkey-journey-23f80</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-okta-defense-kit-to-identify-and-prevent-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-passkey-adoption-tool</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-passkey-adoption-tool-the-passkey-journey</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-with-30m-to-replace-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-zero-trust-authentication-and-zero-trust-leadership-series-of-events</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-launches-zero-trust-authentication-to-align-verification-with-zero-trust-principles</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-makes-passwordless-free</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-named-one-of-the-most-innovative-companies-by-fast-company</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-named-rookie-security-company-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-passkey-adoption-tool-offers-better-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-raises-100-million-to-accelerate-adoption-of-invisible-un-phishable-mfa-for-customers-and-employees</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-raises-30m-to-boost-log-in-security-by-eliminating-passwords-forever</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-raises-75-million-to-expand-passwordless-identity-platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-raises-75-million-to-take-customers-beyond-passwordless-to-the-identity-platform-of-the-future</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-raises-75m-to-push-passwordless-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-receives-fido2-certification</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-releases-defense-kit-for-okta-customers</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-releases-new-assessment-to-guide-companies-toward-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-releases-new-assessment-to-guide-companies-toward-zero-trust-01e4a</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-releases-new-assessment-to-guide-companies-toward-zero-trust-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-study-highlights-whos-streaming-but-not-paying-84-of-people-mooch-off-someone-elses-netflix-account</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-study-shows-former-employees-are-likely-to-continue-accessing-old-employer-information</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-study-shows-the-self-imposed-risks-hyper-growth-businesses-are-taking-with-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-taps-adam-clay-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-unveils-the-passkey-journey-to-aid-enterprise-passkey-deployment-decisions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-welcomes-accomplished-cybersecurity-veterans-pia-mcsharry-and-susanne-gurman-to-leadership-team</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-what-is-zero-trust-authentication-and-why-does-it-matter</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-identity-wins-german-stevie-award</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-the-password-beyond-identity-ceo-talks-to-verdict</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyond-trust-cybersecurity-companies-launch-zero-trust---techdecisions</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/beyondtrust-and-beyond-identity-partner-for-zero-trust-pam</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/british-cyber-security---the-next-threats-call-for-action</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cloud-identity-is-new-normal-replacement-for-on-prem-tools</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cloud-professionals-cling-to-their-passwords-despite-the-risks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cloud-professionals-overly-attached-to-password-based-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cloud-professionals-remain-attached-to-password-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cloud-professionals-remain-overly-attached-to-password-based-security-despite-growing-risks-and-widespread-user-frustration-according-to-new-research</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/could-simpler-language-improve-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/covid-19s-acceleration-of-cloud-migration-identity-centric-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cyber-defense-jasson-casey-of-beyond-identity-on-the-5-things-every-american-business-leader-should-do-to-shield-themselves-from-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cybersecurity-firm-raised-75m-says-passwords-will-soon-be-history</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cybersecurity-has-53-unicorns-here-are-10-to-watch</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cybersecurity-leadership-whats-your-180-day-plan</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/cybersecurity-prioritized-by-hyper-growth-firms</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/datenschutz-und-sicherheit-bei-der-remote-arbeit</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/demystifying-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/die-schwachstelle-passwort-passwortbasierte-angriffe-im-keim-ersticken</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/disrupt-lateral-movement-by-eliminating-the-utility-of-a-stolen-password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/everything-you-need-to-know-about-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/evolving-beyond-the-password-its-time-to-up-the-ante</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/exciting-milestones-and-growth-at-beyond-identity-the-leading-secure-iam-platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/father-of-ssl-and-public-key-cryptography-co-inventor-headline-beyond-identitys-technical-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/five-easy-wins-in-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/for-credentials-these-are-the-new-seven-commandments-for-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/four-in-ten-americans-use-embarrassing-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/from-ai-driven-defense-to-dark-web-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/go-phish-jasson-casey-chief-technology-officer-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/going-incognito-this-identity-management-day</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/happy-world-password-day-2023-your-online-security-starts-here</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/hire-missionaries-not-mercanaries</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-a-shakespeare-loving-former-skidmore-basketball-star-wound-up-on-the-executive-team-at-a-100-million-tech-startup</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-businesses-can-vet-their-cybersecurity-vendors</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-does-hacking-impact-password-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-password-fatigue-can-cost-organizations-time-money-and-mental-energy</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-password-troubles-could-cost-your-online-business-potential-sales</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-safe-is-it-to-store-your-credit-card-information-online</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/how-to-balance-security-and-privacy-in-byod-policies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/human-misconceptions-of-risk-the-blocker-to-password-evolution</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/identity-and-authentication-in-the-metaverse</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/identity-management-day-the-power-of-prevention-and-protection</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/international-womens-day-2023-time-to-embraceequity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/is-it-time-to-make-world-password-day-a-thing-of-the-past</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/is-it-time-to-say-goodbye-to-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/is-the-gig-up-when-it-comes-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/its-finally-time-to-go-passwordless</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/its-world-password-day---and-theyre-now-more-important-than-ever-to-consider</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/jargon-buster-untangling-the-complexity-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/jasson-casey-beyond-identity-malware-doesnt-care-if-your-password-is-four-characters-or-four-thousand-characters-long</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/jim-clark-beyond-identity-and-netscape-co-founder-a-fortt-knox-conversation</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/jim-clark-why-hes-giving-away-passwordless-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/join-jasson-casey-on-the-confident-defense-podcast</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/kommentar-zum-welt-passwort-tag-es-gibt-keine-starken-passworte</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/leading-female-technologists-speak-out-embracing-equality-and-narrowing-the-pay-gap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/lets-authenticate-beyond-identity-pitches-app-wrapped-certificate-authority</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/managed-security-services-provider-mssp-market-news-14-november-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/microsoft-apple-and-google-promise-to-expand-passwordless-features</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/microsoft-fully-ditches-the-password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/multi-factor-authentication-can-be-pretty-confusing-what-are-the-best-options</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/multi-factor-authentication-why-its-time-for-a-rethink</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/okta-security-breach-report-134-clients-impacted-including-cloudflare-and-1password</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/pandemic-could-accelerate-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/passkeys-are-cool-but-they-arent-enterprise-ready</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/passwordless-tech-startup-beyond-identity-raises-75-million</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/passworthygiene-mehr-frustration-oder-vertrauen</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/passworthygiene-mehr-frustration-oder-vertrauen-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/people-on-the-move</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/phishable-multi-factor-authentication-a-matter-of-national-emergency</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/phishing-weshalb-traditionelle-mfa-kein-sicherheitsnetz-bietet</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/please-stop-giving-bad-password-advice</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/popular-authentication-app-pulled-from-google-play-for-being-financial-malware</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/post-pandemic-technologists-pose-secure-certification-for-immunity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/putting-an-end-to-weak-passwords-this-world-password-day</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/q-a-the-pioneers-of-web-cryptography-on-the-future-of-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/research-explores-consumer-susceptibility-to-chatgpt-scams</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/research-reveals-cybersecurity-professionals-are-diving-head-first-into-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/research-reveals-cybersecurity-professionals-are-diving-head-first-into-zero-trust-2f9d1</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/retail-giant-wh-smith-cyberattack---employee-data-stolen</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/retailers-offboarding-procedures-leave-potential-risks</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/rsac-2023-10-coolest-cybersecurity-startup-companies</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/russian-actors-exploit-known-mfa-bug-to-attack-organization</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/security-leaders-chime-in-on-new-sec-disclosure-rules</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/seven-critical-requirements-true-zero-trust-authentication-solutions-should-meet</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/sharing-your-streaming-passwords-is-more-dangerous-than-you-think</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/sicherheit-durch-null-vertrauen---best-practices-fur-eine-zero-trust-authentisierung</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/sicherheit-durch-null-vertrauen---best-practices-fur-eine-zero-trust-authentisierung-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/silicon-valley-icons-jim-clark-and-tom-jermoluk-launch-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/silicon-valley-legend-jim-clark-on-why-he-wants-to-eliminate-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/silicon-valley-legends-launch-beyond-identity-in-quest-to-eliminate-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/startup-beyond-identity-aims-to-kill-passwords-with-certificate-chains</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/startup-offers-free-version-of-its-passwordless-technology</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/study-cloud-professionals-overly-confident-in-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/study-cloud-professionals-remain-attached-to-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/survey-underscores-the-importance-of-vigilance-against-ai-powered-phishing-app-and-password-threats</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/tech-heavyweights-launch-beyond-identity-to-deliver-the-end-of-passwords-raise-30m-series-a</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-20-best-cybersecurity-startups-to-watch-in-2020</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-decades-old-tech-that-could-kill-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-end-of-the-password-protection-era</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-hidden-dangers-of-employee-offboarding</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-hidden-security-risks-in-tech-layoffs-and-how-to-mitigate-them</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-importance-of-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-insanity-of-using-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-role-of-stronger-authentication-in-protecting-rewards-programs</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-state-of-ai-and-cybersecurity-in-2023</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/the-venturefizz-podcast-thomas-jermoluk---ceo-co-founder-of-beyond-identity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/these-former-netscape-execs-helped-create-the-password-as-we-know-it-their-new-startup-beyond-identity-now-raised-30-million-to-kill-passwords-forever</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/this-week-in-enterprise-tech-441-pass-worthless-authentication</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/tj-jermoluk-and-jim-clark-team-up-to-launch-beyond-identity-zero-trust-authentication-platform</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/tom-jermoluk-on-the-end-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/tom-jermoluk-techstrong-tv</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/tom-jermoluk-the-lightbulb-moment-to-eliminate-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/users-cant-let-go-of-passwords-despite-all-the-risks-and-stress</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/web-pioneers-launch-identity-startup-that-ditches-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/what-financial-services-organizations-need-to-know-about-zero-trust-maturity</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/what-is-the-future-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/which-on-bank-mobile-app-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/why-are-professionals-remaining-overly-attached-to-password-based-security-despite-growing-risks-and-widespread-frustration</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/why-isnt-zero-trust-authentication-already-a-thing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/why-its-time-to-move-towards-a-passwordless-future</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/why-traditional-multi-factor-authentication-doesnt-provide-a-safety-net</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/widespread-brute-force-attacks-tied-to-russias-apt28</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/world-password-day-2023-simple-habits-to-protect-your-data</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/world-password-day-2023-tech-leaders-discuss-critical-threats-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/world-password-day-experts-share-best-practices-for-avoiding-password-pain</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/youre-not-already-using-zero-trust-authentication-why</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-sum-security-zero-trust-is-compromised-as-long-as-passwords-remain</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-authentication-7-key-principles-of-the-new-security-concept</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-authentication-aims-to-boost-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-authentication-foundation-of-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-authentication-zta-promises-a-password-less-future</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-protecting-from-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.com/announcements/zero-trust-rated-as-highly-effective-by-businesses-worldwide</loc>
    </url>
</urlset>