<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://panati.one/2026/01/04/early-2026-publication-venue-map/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2026/01/pexels-photo-7648054.jpeg</image:loc><image:title>a man wearing headphones while talking at a business conference</image:title><image:caption>Photo by RDNE Stock project on &lt;a href="https://www.pexels.com/photo/a-man-wearing-headphones-while-talking-at-a-business-conference-7648054/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-01-04T15:36:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/chatgpt-pulse-archive/</loc><lastmod>2026-01-04T14:57:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://panati.one/2026/01/04/choosing-threat-modeling-as-code-or-platformhead-to-head-comparison-of-open-source-frameworks-and-commercial-tools-for-ci-cd-driven-threat-modeling/</loc><lastmod>2026-01-04T14:23:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/runnable-ci-cd-threat-model-pilot/</loc><lastmod>2026-01-04T14:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/ai-driven-dependency-triage-framewoautomated-gate-criteria-using-scorecard-slsa-and-ai-risk-scoring-to-prioritize-human-review-of-dependencies-rk/</loc><lastmod>2026-01-04T14:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/detecting-ci-anomalies-with-provenanframework-to-pair-anomaly-detection-models-with-provenance-enforcement-for-reliable-build-integrity-ce-gates/</loc><lastmod>2026-01-04T14:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/comparing-cloud-workload-identity-standardcross-walk-between-spiffe-spire-oidc-federation-and-sigstore-mapped-to-azure-aws-and-gcp-identity-patterns-s/</loc><lastmod>2026-01-04T14:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/mapping-controls-across-ai-trust-standardsix-concrete-checkpoints-linking-nist-ai-rmf-tasks-to-slsa-in-toto-ml-bom-and-runtime-identity-enforcement-s/</loc><lastmod>2026-01-04T14:21:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/end-to-end-attestation-for-ai-pipelines/</loc><lastmod>2026-01-04T14:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/network-patterns-for-regulated-ai/</loc><lastmod>2026-01-04T14:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/embedding-enforcement-hooks-in-ci-cdstep-by-step-enforcement-pattern-with-azure-policy-and-deployifnotexists-to-auto-provision-secure-network-controls/</loc><lastmod>2026-01-04T14:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/policy-testing-in-pull-requests/</loc><lastmod>2026-01-04T14:18:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2026/01/04/designing-the-governance-as-code-repository/</loc><lastmod>2026-01-04T14:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2024/01/02/evaluating-spiffe-spire-for-enterprise-microservice-security-a-strategic-perspective/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2024/01/untitled-10.png</image:loc><image:title>Untitled-10</image:title></image:image><lastmod>2024-01-03T02:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/about/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2023/12/image-12-31-23-at-10.46e280afam.jpeg</image:loc><image:title>image-12-31-23-at-10.46e280afam</image:title></image:image><lastmod>2023-12-31T16:14:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://panati.one/2023/12/31/navigating-the-maze-of-modern-authentication-turning-fragmented-identities-into-cybersecurity-strengths/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2023/12/untitled-8.png</image:loc><image:title>Untitled-8</image:title></image:image><lastmod>2023-12-31T15:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2023/12/30/what-exactly-is-api-security/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2023/12/untitled-2.png</image:loc><image:title>Untitled-2</image:title></image:image><lastmod>2023-12-30T21:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one/2023/12/30/rakesh-panatis-blog/</loc><image:image><image:loc>https://panati.one/wp-content/uploads/2023/12/untitled.png</image:loc><image:title>Untitled</image:title></image:image><lastmod>2023-12-30T21:41:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://panati.one</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-04T15:36:00+00:00</lastmod></url></urlset>
