<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.zestsecurity.io</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/dev/get-started</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/dev/brand</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/dev/styles</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/dev/ui-elements</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/dev/layouts</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/partners</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/integrations</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/pricing</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/meet-the-product</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/about-us</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/become-a-partner</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/divider</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/vip-dinner-at-aws-re-invent</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/remediation-assessment</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/vip-dinner-raleigh</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/legal/terms-conditions</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/business-development-representative-bdr</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/devops-engineer</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/founding-account-executive</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/full-stack-engineer</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/security-engineer-research</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/senior-backend-developer</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/careers/senior-full-stack-engineer</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/a-world-beyond-cnapp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/building-a-cloud-security-program-that-actually-works</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/cisos-making-sense-of-ai-for-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/evolving-vulnerability-management-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/preemptive-cloud-security-with-nick-coury</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/runtime-visibility-meets-intelligent-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/the-cost-of-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/the-future-of-cloud-security-and-the-role-of-ai</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/webinars/zest-for-cloud-security-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/use-cases/application-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/use-cases/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/use-cases/exposure-mitigation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/use-cases/risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/use-cases/unified-vulnerability-management-uvm</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/a-conversation-with-matthew-hurewitz-the-cost-of-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/a-world-beyond-cnapp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/building-a-cloud-security-program-that-actually-works</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/fireside-chat-cisos-making-sense-of-ai-for-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/from-managing-to-resolving-evolving-vulnerability-management-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/runtime-visibility-meets-intelligent-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/the-future-of-cloud-security-and-the-role-of-ai</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/events/zest-for-cloud-security-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/32-billion-google-wiz-deal-bodes-well-for-cloud-security-experts-say</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/5-ways-cloud-security-teams-can-apply-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/7-cloud-security-startups-not-named-wiz</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/7-rsac-2025-cloud-security-sessions-you-dont-want-to-miss</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/ai-powered-cloud-risk-resolution-startup-zest-security-launches-with-5m-in-funding</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/black-hat-usa-2025---summary-of-vendor-announcements-part-2</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/cloud-risks-rise-due-to-slow-remediation-costs-usd-2m</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/cloud-security-report-shows-growing-remediation-gap-amid-increased-risk-awareness</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/essential-tools-with-critical-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/from-weeks-to-hours-how-zest-is-redefining-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/googles-32-billion-wiz-buy-bolsters-its-cloud-security-capabilities-experts-say</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/how-does-zest-security-enhance-cloud-safety-with-aws-scps</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/ipo-pops-are-back-ai-starts-to-pay-off-for-big-tech-and-palo-alto-networks-spends-big</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/mitigation-without-remediation-rethinking-cloud-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/over-60-percent-of-enterprise-cybersecurity-incidents-relate-to-known-risks</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/resilient-cyber-newsletter-33</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/risk-mitigation-beyond-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/rsa-conference-2025---pre-event-announcements-summary</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/runtime-stat-of-the-week</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/securityweek-aws-re-invent-2025-roundup-featuring-zest</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/survey-sees-organizations-being-overwhelmed-by-remediation-challenges</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/techcrunch-top-9-cybersecurity-startups-from-disrupt-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/the-cloud-security-paradox-why-we-keep-losing-to-known-risks</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/the-new-defensive-mandate-anthropics-mythos-model-and-project-glasswing</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/the-top-21-most-promising-israeli-start-ups-2024</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/this-startup-doesnt-just-find-your-weaknesses-it-also-fixes-them</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/thousands-of-organizations-at-risk-by-salesforce-industry-cloud-bugs</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-adds-aws-service-control-policies-to-ai-cloud-platform</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-adds-aws-service-control-policies-to-expand-cloud-risk-mitigation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-aims-to-resolve-cloud-risks</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-aims-to-resolve-not-just-mitigate-cloud-risks</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-and-upwind-partner-to-close-the-gap-between-cloud-threat-detection-and-action</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-enables-security-teams-to-proactively-block-attacker-activity-using-aws-service-control-policies-as-a-mitigation-pathway</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-exits-stealth-to-resolve-not-just-flag-enterprise-cloud-risks-using-genai</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-exits-stealth-to-resolve-not-just-flag-enterprise-cloud-risks-using-genai-e7cde</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-featured-on-nyse-live</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-integrates-with-upwind</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-interview-with-ceo-snir-ben-shimol</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-named-among-leading-infosec-products</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-partners-with-upwind-for-faster-ai-driven-cloud-fixes</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-raises-5-million-seed-round-for-cloud-risk-resolution-platform</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-selected-to-techcrunch-disrupt-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-security-unveils-multi-agent-ai-system-to-autonomously-remediate-and-mitigate-cloud-risks-at-rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-securitys-cloud-risk-exposure-impact-report</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-securitys-cloud-risk-exposure-impact-report-reveals-62-of-incidents-are-related-to-risks-known-to-the-organization</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-securitys-free-remediation-report</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/news/zest-turns-aws-policies-into-a-defense-tool-for-cloud-security-teams</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/4-reasons-cloud-security-risk-management-is-adopting-an-incident-response-mentality</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/5-key-takeaways-a-conversation-with-matthew-hurewitz</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/6-core-capabilities-for-cloud-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/aaron-brown-joins-zest-securitys-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/agentic-exposure-management-explained</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/aws-organizations-and-delegated-administrator-security-pros-and-cons</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/beyond-cvss-why-epss-and-kev-are-game-changers-for-prioritizing-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/building-a-cloud-native-ctem-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/cisco-kenna-end-of-life</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/cloud-risk-exposure-impact-report-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/cloud-under-siege-6-cloud-breaches-and-leaks-in-spring-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/code-to-cloud-and-back-closing-the-remediation-loop</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/how-aws-scps-mitigate-risk-cut-noise-and-reduce-backlogs</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/how-malicious-aws-lambda-layers-can-compromise-your-serverless-environment</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/how-to-build-an-efficient-risk-resolution-plan</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/how-to-go-from-zero-to-a-well-secured-managed-cloud-security-state</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/meet-zest-ai-powered-cloud-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/navigating-the-ctem-journey-guide</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/runtime-visibility-meets-intelligent-remediation-zest-upwind</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/secure-and-streamline-automate-the-cleanup-of-container-images-across-aws-azure-and-gcp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/security-controls-for-mitigating-cups-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/the-new-defensive-mandate-anthropics-mythos-model-and-project-glasswing</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/the-role-of-ai-consolidation-and-more-on-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/top-9-cloud-native-security-controls-you-must-know-about</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/trivy-supply-chain-attack-github-actions</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/understanding-preemptive-exposure-management-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/unified-vulnerability-management-explained</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/why-resolution-paths-should-replace-risk-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-ai-agents-risk-remediation-reimagined</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-expands-its-iac-tool-support</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-now-supports-aws-azure-and-gcp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-platform-now-available-in-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-releases-ai-sweeper-agents</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/resources/content/zest-securitys-cloud-security-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/banner/2025-cloud-risk-exposure-impact-report</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/banner/get-a-free-remediation-assesment</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/banner/meet-us-at-black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/4-reasons-cloud-security-risk-management-is-adopting-an-incident-response-mentality</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/5-key-takeaways-a-conversation-with-matthew-hurewitz</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/aaron-brown-joins-zest-securitys-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/agentic-exposure-management-explained</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/aws-organizations-and-delegated-administrator-security-pros-and-cons</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/beyond-cvss-why-epss-and-kev-are-game-changers-for-prioritizing-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/cisco-kennas-end-of-life-marks-the-end-of-traditional-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/cloud-under-siege-6-cloud-breaches-and-leaks-in-spring-2025</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/code-to-cloud-and-back-closing-the-remediation-loop</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/how-aws-scps-mitigate-risk-cut-noise-and-reduce-backlogs</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/how-malicious-aws-lambda-layers-can-compromise-your-serverless-environment</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/how-to-build-an-efficient-risk-resolution-plan</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/how-to-go-from-zero-to-a-well-secured-managed-cloud-security-state</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/meet-zest-ai-powered-cloud-risk-resolution</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/navigating-the-ctem-journey-guide</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/runtime-visibility-meets-intelligent-remediation-zest-upwind</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/secure-and-streamline-automate-the-cleanup-of-container-images-across-aws-azure-and-gcp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/security-controls-for-mitigating-cups-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/the-role-of-ai-consolidation-and-more-on-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/top-6-cloud-native-security-controls-you-must-know-about</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/understanding-preemptive-exposure-management-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/unified-vulnerability-management-explained</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/why-resolution-paths-should-replace-risk-remediation</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/zest-ai-agents-risk-remediation-reimagined</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/zest-expands-its-iac-tool-support</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/zest-now-supports-aws-azure-and-gcp</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/zest-platform-now-available-in-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.zestsecurity.io/blog/zest-securitys-cloud-security-predictions-for-2025</loc>
    </url>
</urlset>