<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://devici.com/</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://devici.com/platform</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/podcasts</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/ebooks/how-to-threat-model</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/platform/pricing</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/about/company</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/about/contact-us</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/introducing-design-static-application-security-testing-dsast-with-devici-code-genius</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/capabilities-limitations-of-ai-in-application-security</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/brian-mosley-joins-devici-as-coo</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/introducing-the-devici-technical-advisory-board</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://devici.com/platform/ai-infusion</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/platform/devici-codex</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/platform/code-genius</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/platform/collaboration</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/platform/simplicity-scalability</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/threat-modeling-capabilities</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/first-threat-modeling-conference</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/rethinking-the-scan-and-fix-hamster-wheel-a-new-paradigm-for-application-security</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/zero-trust-threat-modeling</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/elevating-your-threat-modeling-game-how-to-use-the-threat-modeling-manifesto</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/software-centric-threat-modeling</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/comprehensive-threat-modeling-strategy</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/a-product-led-approach-to-threat-modeling</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/striking-the-perfect-balance-embracing-the-hybrid-approach-to-threat-modeling</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/blog-devici-launch</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://devici.com/resources/blog/the-art-and-science-of-threat-modeling-representation</loc>
  <lastmod>2024-06-02T14:31:12+00:00</lastmod>
  <priority>0.51</priority>
</url>


</urlset>