<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.hiddenlayer.com</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/careers</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/newsroom</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/platform/ai-discovery</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/platform/ai-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/platform/ai-attack-simulation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/platform/ai-runtime-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/ciso</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/ai-leaders</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/application-developers</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/technology-services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/government-services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/agentic-mcp-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/ai-guardrails</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/red-teaming</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/solutions/model-scanning</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/partners/databricks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/partners/advisory-resale-partners</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/partners/technology-alliance</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/insights</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/reports-and-guides</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/webinars</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/podcast</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/sai-security-advisory</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/glossary</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/platform</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/reseller-application</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/case-study</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/innovation-hub/research</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/2023-sc-awards-finalists-most-promising-early-stage-start-up</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/422-37-billion-global-artificial-intelligence-ai-market-size-likely-to-grow-at-39-4-cagr-during-2022-2028-industry</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/ai-and-ml-reliability-and-security-blenderbot-and-other-cases</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/ai-model-vulnerability-scan-with-hiddenlayer-model-scanner</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/ai-trickery-security-cam-hack-turns-crooks-into-dogs</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/all-major-gen-ai-models-vulnerable-to-policy-puppetry-prompt-injection-attack</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/beating-the-ai-game-ripple-numerology-darcula-special-guests-from-hidden-layer-malcolm-harkins-kasimir-schulz-swn-471</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/cisa-announces-secure-by-design-commitments-from-leading-technology-providers</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/civilian-ai-is-already-being-misused-by-the-bad-guys</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/cyera-and-hiddenlayer-announce-strategic-partnership-to-deliver-end-to-end-ai-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/edge-infrastructure-7-key-facts-cios-should-know-about-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/emerging-threats-to-modern-ai-podcast</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/eu-becomes-ai-regulation-pioneer-senate-judiciary-committee-considers-reauthorization-of-section-702</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/googles-gmail-decision---significant-risk-warning-for-millions-of-users</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-adds-ai-detection-amp-response-for-generative-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-ai-threat-landscape-report-finds-that-77-of-companies-identified-breaches-to-their-ai-in-the-past-year</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-ai-threat-landscape-report-reveals-ai-breaches-on-the-rise</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-aws-genai-integrations</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-launch-of-its-mlsec-platform-to-secure-enterprise-machine-learning-models</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-launch-of-its-mlsec-platform-to-secure-enterprise-machine-learning-models-4a626</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-launch-of-its-mlsec-platform-to-secure-enterprise-machine-learning-models-cf305</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-machine-learning-security-collaboration-with-intel</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-mike-bruchanski-as-chief-product-officer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-announces-new-features-to-safeguard-enterprise-ai-models-with-improved-risk-detection</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-appoints-chelsea-strong-as-chief-revenue-officer-to-accelerate-global-growth-and-customer-expansion</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-appoints-chloe-messdaghi-as-head-of-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-appoints-malcolm-harkins-as-chief-security-and-trust-officer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-attains-soc-2-type-ii-compliance-elevating-data-security-for-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-awarded-afwerx-sttr-phase-ii-contract-to-accelerate-usa-department-of-defense-security-adoption</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-awarded-phase-2-sbir-contract-by-the-u-s-department-of-defense</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-collaborates-with-microsoft-azure-ai-to-enhance-model-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-creates-a-threat-intelligence-team-focused-on-thwarting-ml-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-emerges-from-stealth-to-protect-ai-models-from-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-expands-security-for-ai-solutions-to-major-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-inc-selected-as-finalist-for-rsa-conference-2023-innovation-sandbox-contest</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-is-a-proud-participant-in-the-microsoft-security-copilot-partner-private-preview</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-joins-center-for-threat-informed-defense-in-research-initiative-to-secure-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-joins-databricks-data-intelligence-platform-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-joins-the-coalition-for-secure-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-launches-channel-partner-program-to-secure-ai-and-mlops-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-launches-security-solution-to-protect-ai-powered-products</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-launches-the-first-security-solution-to-protect-ai-powered-products</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-listed-in-aws-icmp</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-nabs-most-innovative-startup-crown-at-rsac</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-named-in-crn-stellar-startups-2023</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-named-most-innovative-startup-at-rsa-conference-2023-innovation-sandbox-contest</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-named-to-fast-companys-fourth-annual-list-of-the-next-big-things-in-tech</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-named-winner-of-global-infosec-awards-during-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-partners-with-cve-program-as-a-numbering-authority-to-secure-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-partners-with-databricks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-raises-50m-in-series-a-funding-to-safeguard-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-recognized-as-a-gartner-cool-vendor-for-ai-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-recognized-in-2025-gartner-market-guide-for-ai-trust-risk-and-security-management-ai-trism</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-releases-the-2026-ai-threat-landscape-report-spotlighting-the-rise-of-agentic-ai-and-the-expanding-attack-surface-of-autonomous-systems</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-selected-as-awardee-on-missile-defense-agency-shield-idiq</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-uncovers-critical-security-flaw-on-hugging-face</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-unveils-aisec-platform-2-0-to-deliver-unmatched-context-visibility-and-observability-for-enterprise-ai-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-unveils-new-agentic-runtime-security-capabilities-for-securing-autonomous-ai-execution</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-wins-2023-sc-award-for-most-promising-early-stage-start-up</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayer-with-openpolicy-announces-participation-in-the-department-of-commerce-consortium-dedicated-to-ai-safety</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/hiddenlayers-malcolm-harkins-inducted-into-the-cso-hall-of-fame</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/ibm-continues-ai-push-with-500m-enterprise-ai-venture-fund</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/ibm-launches-500-million-enterprise-ai-venture-fund</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/industry-leaders-expand-threat-informed-defense-to-ai-enabled-systems</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/innovation-sandbox-cybersecurity-investors-pivot-to-safeguarding-ai-training-models</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/insights-from-the-2023-rsa-conference-generative-ai-quantum-and-innovation-sandbox</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/machine-learning-creates-a-new-attack-surface-requiring-specialized-defenses</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/machine-learning-models-a-dangerous-new-attack-vector</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/managed-security-services-provider-mssp-market-news-20-july-2022</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/mitre-harris-poll-finds-lack-of-trust-among-americans-in-ai-technology</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/mlsec-could-be-the-answer-to-adversarial-ai-and-machine-learning-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/navigating-the-ai-security-landscape-a-deep-dive-into-the-hiddenlayer-threat-report</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/new-hiddenlayer-platform-provides-protection-for-machine-learning-models</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/new-hugging-face-vulnerability-exposes-ai-models-to-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/new-r-programming-vulnerability-exposes-projects-to-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/new-tokenbreak-attack-bypasses-ai-moderation-with-single-character-text-changes</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/one-prompt-can-bypass-every-major-llms-safeguards</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/protecting-neural-networks---cybertheory</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/r-language-flaw-allows-code-execution-via-rds-rdx-files</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/r-programming-bug-exposes-orgs-to-vast-supply-chain-risk</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/r-programming-language-implementations-are-vulnerable-to-arbitrary-code-execution-during-deserialization-of-rds-and-rdx-files</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/researchers-weaponize-machine-learning-models-with-ransomware</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/rsac-2023-spotlight-ai-innovation-sandbox-top-new-attack-techniques-and-more</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/secretary-blinken-says-u-s-needs-to-connect-to-tech-ecosystems-like-austin</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/security-for-ai-platform-expansion-introducing-automated-red-teaming-for-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/security-in-2023-6-trends-for-it-leaders</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/spruce-picked-up-26m-tecovas-new-ceo-and-more-austin-tech-news</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/supply-chain-attacks-likely-with-exploitation-of-novel-r-programing-bug</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/the-cyberwire---design-and-innovation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/the-cyberwire-v11-issue-162</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/the-cyberwire-v11-issue-163</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/the-hottest-cybersecurity-startups-to-watch-in-2023-according-to-vcs</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/these-5-austin-tech-companies-raised-a-combined-507m-in-july</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/three-best-practices-for-ai-ml-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/vulnerability-in-r-programming-language-could-fuel-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/why-adversarial-ai-is-the-cyber-threat-no-one-sees-coming</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/news/why-ai-is-the-key-to-cutting-edge-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/a-guide-to-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/advancements-in-security-for-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/agents</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-coding-assistants-at-risk</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-discovery-in-development-environments</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-model-scanner-accelerates-adoption</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-policy-in-the-u-s</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-red-teaming-best-practices</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-risk-management-effective-strategies-and-framework</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/ai-security-2025-predictions-recommendations</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/behind-the-build-hiddenlayers-hackathon</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/beyond-the-hype-addressing-the-real-threats-to-ai-security-adoption</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/built-in-ai-model-governance</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/cisa-guidelines-and-how-hiddenlayers-aisec-platform-helps-you-meet-them</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/claude-mythos-ai-security-gaps-beyond-vulnerability-discovery</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/enhancing-ai-security-with-hiddenlayers-refusal-detection</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/from-detection-to-evidence-making-ai-security-actionable-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/from-national-security-to-building-trust-the-current-state-of-securing-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/governing-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/hiddenlayer-achieves-iso-27001-and-renews-soc-2-type-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/how-to-secure-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/how-well-do-you-know-your-ai-environment</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/inside-hiddenlayers-research-team-the-experts-securing-the-future-of-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/integrating-ai-security-into-the-sdlc</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/integrating-hiddenlayers-model-scanner-with-databricks-unity-catalog</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/introducing-the-security-for-ai-council</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/introducing-workflow-aligned-modules-in-the-hiddenlayer-ai-security-platform</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/key-takeaways-from-nists-recent-guidance</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/life-at-hiddenlayer-where-bold-thinkers-secure-the-future-of-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/llm-security-101-the-hidden-risks-of-genai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/mitre-atlas-at-crossroads-of-cybersecurity-and-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/model-intelligence</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/openssf-model-signing-for-safer-ai-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/reflections-on-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/risks-related-to-the-use-of-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/rsac-2025-takeaways</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/safeguarding-ai-with-mldr</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/sec-rules-and-what-they-mean-for-your-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securely-introducing-open-source-models-into-your-organization</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-agentic-ai-a-beginners-guide</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-ai-a-guide-for-secops</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-ai-agents-the-questions-that-actually-matter</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-ai-through-patented-innovation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-your-ai-a-guide-for-cisos-pt4</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-your-ai-a-step-by-step-guide-for-cisos-pt2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-your-ai-a-step-by-step-guide-for-cisos-pt3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-your-ai-systems-with-hiddenlayer-professional-services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/securing-your-ai-with-optiv-and-hiddenlayer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/security-for-ai-vs-ai-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/structuring-transparency-for-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-ai-security-playbook</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-beginners-guide-to-llms-and-generative-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-eu-ai-act-a-groundbreaking-framework-for-ai-regulation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-next-step-in-ai-red-teaming-automation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-tactics-and-techniques-of-adversarial-ml</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/the-threat-congress-just-saw-isnt-new-what-matters-is-how-you-defend-against-it</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/three-distinct-categories-of-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/top-5-ai-threat-vectors-in-2025</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/understanding-ai-data-poisoning</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/understanding-the-threat-landscape-for-ai-based-systems</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/whats-new-in-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/why-ai-systems-are-at-risk</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/why-autonomous-ai-is-the-next-great-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/why-revoking-bidens-ai-executive-order-wont-change-course-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/insight/why-traditional-cybersecurity-wont-fix-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/adversarial-machine-learning-the-new-frontier</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/agentic-shadowlogic</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/ai-a-new-potential-launchpad-for-ransomware</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/ai-agents-in-production-security-lessons-from-recent-incidents</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/ai-system-reconnaissance</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/aill-be-watching-you</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/attack-on-aws-bedrocks-titan</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/beyond-mcp-expanding-agentic-function-parameter-abuse</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/boosting-security-for-ai-unveiling-krop</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/crossing-the-rubika-the-use-and-abuse-of-ai-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/deepseek-r1-architecture</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/deepsht-exposing-the-security-risks-of-deepseek-r1</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/echogram-the-hidden-vulnerability-undermining-ai-guardrails</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/evaluating-prompt-injection-datasets</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/exploiting-mcp-tool-parameters</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/exploring-the-security-risks-of-ai-assistants-like-openclaw</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/hi-from-sai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/how-hidden-prompt-injections-can-hijack-ai-code-assistants-like-cursor</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/indirect-prompt-injection-of-claude-computer-use</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/insane-in-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/introducing-a-taxonomy-of-adversarial-prompt-engineering</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/litellm-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/machine-learning-threat-roundup</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/malware-found-in-trending-hugging-face-repository-open-oss-privacy-filter</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/mcp-and-the-shift-to-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/mcp-model-context-pitfalls-in-an-agentic-world</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/models-are-code</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/new-gemini-for-workspace-vulnerability-enabling-phishing-content-manipulation</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/new-google-gemini-vulnerability-enabling-profound-misuse</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/novel-universal-bypass-for-all-major-llms</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/persistent-backdoors</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/pickle-strike</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/prompt-injection-attacks-on-llms</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/prompts-gone-viral-practical-code-assistant-ai-viruses</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/r-bitrary-code-execution</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/same-model-different-hat</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/shadowgenes-uncovering-model-genealogy</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/shadowlogic</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/shall-we-play-a-game</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/silent-sabotage</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/sleeping-with-one-ai-open</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-dark-side-of-large-language-models-part-1</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-dark-side-of-large-language-models-part-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-expanding-ai-cyber-risk-landscape</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-first-ai-powered-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-lethal-trifecta-and-how-to-defend-against-it</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-machine-learning-adversary-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/the-tokenbreak-attack</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/ultralytics-python-package-compromise-deploys-cryptominer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/visual-input-based-steering-for-output-redirection-visor</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/research/weaponizing-machine-learning-models-with-ransomware</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/beating-the-ai-game-ripple-numerology-darcula-special-guests-from-hidden-layer-malcolm-harkins-kasimir-schulz-swn-471-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-ai-detection-amp-response-for-genai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-model-scanner</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-webinar-2024-ai-threat-landscape-report</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-webinar-a-guide-to-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-webinar-accelerating-your-customers-ai-adoption</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/hiddenlayer-webinar-women-leading-cyber</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/how-to-build-secure-agents</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/webinars/offensive-and-defensive-security-for-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/podcasts/blackhat-2024-winning-the-rsa-sandbox-1-year-on---chris-sestito-hiddenlayer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/podcasts/chris-tito-sestito-ceo-amp-co-founder-hiddenlayer</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/podcasts/design-goals-amp-cybersecurity-integrity-redefining-the-ciso-role-to-avoid-failure-malcolm-harkins</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/podcasts/hacking-security-camera-ai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/podcasts/securing-ai-systems-against-adversarial-attacks</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/ai-threat-landscape-report-2024</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/ai-threat-landscape-report-2025</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/ciso-guide</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/financial-services-playbook</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/forrester-opportunity-snapshot</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/gartner-healthcare-cios</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/hiddenlayer-named-a-cool-vendor-in-ai-security</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/intel-ebook</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/technology-playbook</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/report-and-guide/threatreport2026</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml-4</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml-5</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-clearml-6</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-onnx</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-02-onnx-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-04-aws</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-04-aws-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-10</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-11</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-4</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-5</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-6</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-7</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-8</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-mlflow-9</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-skops</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-ydata</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-ydata-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-06-ydata-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-07-tensorflow</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-07-wyze</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-08-llamaindex</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-08-llamaindex-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-autolabel</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-autolabel-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-cleanlab</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-guardrails</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsd-5</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-10</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-4</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-5</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-6</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-7</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-8</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-09-mindsdb-9</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-10-nvidia</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-12-boschai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2024-12-boschai-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-04-pytorchlightning</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-06-backendai</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-06-backendai-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-06-backendai-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-keras</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-qodogen</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-qodogen-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-windsurf</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-windsurf-2</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2025-10-windsurf-3</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/2026-02-flair</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/how-hidden-prompt-injections-can-hijack-ai-code-assistants-like-cursor</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/r-bitrary-code-execution</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/sai-security-advisory/sai-security-advisor-2025-11-cursor</loc>
    </url>
    <url>
        <loc>https://www.hiddenlayer.com/case-study/financial-case-study-ai-red-teaming</loc>
    </url>
</urlset>