<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://tracebit.com</loc>
    </url>
    <url>
        <loc>https://tracebit.com/about</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog</loc>
    </url>
    <url>
        <loc>https://tracebit.com/contact</loc>
    </url>
    <url>
        <loc>https://tracebit.com/careers</loc>
    </url>
    <url>
        <loc>https://tracebit.com/resources/canary-101</loc>
    </url>
    <url>
        <loc>https://tracebit.com/search</loc>
    </url>
    <url>
        <loc>https://tracebit.com/demo</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customers</loc>
    </url>
    <url>
        <loc>https://tracebit.com/pricing</loc>
    </url>
    <url>
        <loc>https://tracebit.com/canaries-in-the-wharf-2-june</loc>
    </url>
    <url>
        <loc>https://tracebit.com/community-edition</loc>
    </url>
    <url>
        <loc>https://tracebit.com/pricing/enterprise</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/a-hard-look-at-guardduty-shortcomings</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/announcing-azure-canaries-general-availability</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/announcing-our-seed-fundraise</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/announcing-security-canaries-in-kubernetes</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/announcing-tracebit-community-edition</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/announcing-tracebits-partnership-with-panther</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/automated-moving-target-pre-emptive-cyber-defense-and-security-canaries</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/azure-detection-engineering-log-idiosyncrasies-you-should-know-about</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/breaching-the-data-perimeter-cloudtrail-as-a-mechanism-for-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/building-community-edition</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canaries-in-the-era-of-generative-ai</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canaries-in-the-wild---episode-2-josh-yavor</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canaries-in-the-wild---episode-3-mandy-andress</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canaries-in-the-wild---episode-4-kevin-conley</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canary-infra-bringing-honeypots-towards-general-adoption</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canary-infrastructure-vs-real-world-ttps</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/canary-program-communication-secrecy-vs-discretion</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/code-exec-deception-gemini-ai-cli-hijack</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/deception-should-not-be-a-luxury-control</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/deploying-effective-canary-aws-credentials</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/do-canaries-first</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/fwd-cloudsec-talk-on-s3-bucket-research</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/honeypots-for-intrusion-detection</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/how-fast-is-cloudtrail-today-investigating-cloudtrail-delays-using-athena</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/how-to-find-the-aws-account-id-of-any-s3-bucket</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/introducing-canaries-in-the-wild</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/no-wildcard-how-i-discovered-the-organization-id-of-any-aws-account</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/security-outcomes-with-canaries</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/series-a</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/short-term-vs-long-term-canary-credentials</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/the-full-costs-of-building-your-own-canary-program</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/where-security-canaries-fit-in-nist-csf-2-0-832c2</loc>
    </url>
    <url>
        <loc>https://tracebit.com/blog/why-tracebit-is-written-in-c-sharp</loc>
    </url>
    <url>
        <loc>https://tracebit.com/jobs/founding-account-executive</loc>
    </url>
    <url>
        <loc>https://tracebit.com/jobs/founding-engineer</loc>
    </url>
    <url>
        <loc>https://tracebit.com/jobs/founding-engineer-relocate</loc>
    </url>
    <url>
        <loc>https://tracebit.com/jobs/founding-sdr</loc>
    </url>
    <url>
        <loc>https://tracebit.com/jobs/security-researcher</loc>
    </url>
    <url>
        <loc>https://tracebit.com/event/detecting-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customer/coveo</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customer/cresta</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customer/docker</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customer/riot-games</loc>
    </url>
    <url>
        <loc>https://tracebit.com/customer/synthesia</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/aws</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/azure</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/ci-cd</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/credentials-and-artifacts</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/google-cloud</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/identity</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/kubernetes</loc>
    </url>
    <url>
        <loc>https://tracebit.com/platform/workstations</loc>
    </url>
    <url>
        <loc>https://tracebit.com/use-cases/ai-agent-detection</loc>
    </url>
    <url>
        <loc>https://tracebit.com/use-cases/cloud-kubernetes-breach</loc>
    </url>
    <url>
        <loc>https://tracebit.com/use-cases/insider-threat-detection</loc>
    </url>
    <url>
        <loc>https://tracebit.com/use-cases/supply-chain-ci-cd-attack</loc>
    </url>
    <url>
        <loc>https://tracebit.com/use-cases/workstation-compromise</loc>
    </url>
</urlset>