<?xml version="1.0" encoding="utf-8"?><!--Property of Conjur CyberArk -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url><loc>https://www.conjur.org/</loc><changefreq>weekly</changefreq><priority>1.00</priority></url>
<url><loc>https://www.conjur.org/api/</loc><changefreq>weekly</changefreq><priority>0.98</priority></url>
<url><loc>https://www.conjur.org/api/secretless-broker/</loc><changefreq>weekly</changefreq><priority>0.98</priority></url>
<url><loc>https://www.conjur.org/blog/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/avoiding-secret-zero-securely-introducing-secrets-with-conjur/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/breathe-easy-with-a-self-healing-conjur-cluster/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/building-a-windows-installer-from-a-linux-ci-pipeline/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/ci-cd-servers-know-all-your-plumbing-secrets/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/cleaning-history-for-github-prs/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/cloud-foundry-integration-available-in-github/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/conjur-open-source-is-going-secretless/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/conjur-open-source-now-natively-integrates-with-terraform/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/conjur-store-n-fetch/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/cyberark-cncf-kubecon-2018-wrap-up/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/devops-automation/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/devsecops-is-an-abomination/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/docker-security/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/enhancing-aws-secrets-manager-with-summon/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/every-free-software-community-needs-a-code-of-conduct/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/flow-and-velocity/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/how-we-architected-the-conjur-service-to-handle-infinite-traffic/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/introducing-kubiscan-an-open-source-tool-for-scanning-risky-kubernetes-permissions/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/introducing-the-conjur-devops-security-blog/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/introducing-the-secretless-broker-open-source-beta/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/kubecon-2019-the-conference-for-the-sagrada-familia-of-software/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/kubernetes-authentication/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/loading-your-database-credentials-at-runtime-with-conjur/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/making-ruby-yours/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/managing-secrets-in-devops-a-maturity-model/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/microservices-first/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/mitigating-risk-in-the-cloud-with-authorization-of-amazon-web-services-apps/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/on-delivering-quality/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/one-click-access-to-kubernetes-container-authentication-secrets-management-for-gcp/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/open-source-software-isnt-really-free-but-its-the-future-of-business/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/protect-devops-tools-from-crypto-miners/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/pursuit-of-performance/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/running-a-kanban-standup-meeting/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/secure-task-runner/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/secure-your-kubernetes-deployed-applications-with-cyberark-conjur/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/securing-ansible-ssh-keys/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/securing-puppet-with-conjur/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/securing-your-day-to-day-devops-work-in-ansible/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/security-as-first-class-citizen/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/security-islands/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/security-policy-as-code/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/separation-of-duties/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/should-small-software-teams-use-kubernetes/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/special-cases-are-a-code-smell/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/syncing-the-enterprise-on-premises-world-of-security-with-devops/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/technology-adoption/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/the-sword-in-the-darkness-the-watcher-on-the-wall/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/to-key-or-not-to-key/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/top-3-things-to-avoid-when-using-containers/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/trustless-security-in-practice/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/understanding-conjur-policy/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/untangling-jenkins/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/using-conjur-rbac-with-your-kubernetes-cluster/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/using-conjur-with-terraform/</loc><changefreq>weekly</changefreq><priority>0.94</priority></url>
<url><loc>https://www.conjur.org/blog/using-rbac-for-iot-applications/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/using-summon-to-manage-secrets-as-you-move-from-dev-to-prod/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/blog/why-are-so-many-companies-getting-hacked-lately-and-what-can-be-done-about-it/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/careers/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/careers/openings/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/careers/puzzle/</loc><changefreq>weekly</changefreq><priority>0.90</priority></url>
<url><loc>https://www.conjur.org/get-started/</loc><changefreq>weekly</changefreq><priority>0.96</priority></url>
<url><loc>https://www.conjur.org/get-started/quick-start/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/quick-start/define-policy/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/quick-start/oss-environment/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/quick-start/run-demo-app/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/quick-start/store-secret/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/cloud-foundry/</loc><changefreq>weekly</changefreq><priority>0.98</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/delegating-policy-management/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/enrolling-application/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/jenkins-security/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/get-started/tutorials/ruby-api/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/job-openings/software-engineer/</loc><changefreq>weekly</changefreq><priority>0.98</priority></url>
<url><loc>https://www.conjur.org/newsletter/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/why-conjur/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/why-conjur/concepts/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/why-conjur/how-conjur-works/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
<url><loc>https://www.conjur.org/why-conjur/use-cases/</loc><changefreq>weekly</changefreq><priority>0.97</priority></url>
</urlset>