<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cyberhaven.com</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/partners</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/legal/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/legal/security-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/about/brand</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/legal/extension-privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/contact</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/about/awards</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events/data-defense-forum</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/careers</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/data-detection-response</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/industries/technology</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/use-cases/stop-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/use-cases/accelerate-internal-investigations</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/use-cases/understand-how-data-flows</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/use-cases/detect-and-stop-risky-behavior</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/how-data-lineage-works</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/integrations</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/cloud</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/gen-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/email</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/removable-storage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/web</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/technologies/printing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/industries/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/industries/law-firms</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/industries/investment-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/industries/healthcare</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/linea</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ai-enterprise-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ciso-series-navigating-shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/how-cios-implement-ai-protect-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/harnessing-ai-safely</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ciso-archetypes</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ciso-series-balancing-innovation-and-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ciso-series-decoding-cybersecurity-language</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/introduction-to-ddr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/data-security-reimagined</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/demystifying-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/up-leveling-data-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/navan-customer-story</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/vaxcare-customer-story</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/iron-mountain-customer-story</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/ivp-customer-story</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/about</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/cyberhaven-and-microsoft-purview</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launches</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-platform</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-security-for-healthcare</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-security-for-investment-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-security-for-law-firms</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-security-for-technology</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/casb-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/data-lineage-next-gen-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/dlp-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/dlp-checklist</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/dlp-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/dlp-program-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/dlp-disconnect</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/insider-risk-management-oreilly</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/irm-broken-perimeter</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/top-15-ddr-use-cases</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/2025-ai-adoption-risk-report</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/data-report-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/data-report-q1-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/data-report-q2-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/insider-risk-report-great-data-heist</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers/motorola</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers/large-law-firm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/labs</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/labs/ai-leaderboard</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/newsroom</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events/black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events/rsac</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/request-demo</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/cooley-customer-story</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/on-demand-demo</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/ai-adoption-risk-report-2026</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/navigating-security-for-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/services</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/support</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/ebook/modern-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/whitepaper/cmmc-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/sitemap</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/google-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/whitepaper/departing-employees-data-exfiltration-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers/bio-ivt</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers/surgical-robotics</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/customers/axos-bank</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/whitepaper/core-capabilities-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-lineage-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/2026-ai-adoption-risk-report-financial-services</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/2026-ai-adoption-risk-report-professional-services</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/2026-ai-adoption-risk-report-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/legal/opt-out</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/data-governance-ai-era</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/report/gartner-market-guide-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/whitepaper/idc-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events/google-cloud-next</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/webinar/isaca-data-security-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-legacy-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-platform-security-vendors</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-insider-risk-management-specialists</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-dspm-vendors</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-nascent-saas-dlp-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/comparison/cyberhaven-vs-hyperscaler-native-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/insider-risk-intelligence-service</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/whitepaper/security-framework-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product/ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/events/gartner-security-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/use-cases/secure-ai-usage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/resources/datasheet/ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/10-most-common-forms-of-company-data-employees-steal-or-expose</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/4-2-of-workers-have-pasted-company-data-into-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/5-reasons-you-cant-afford-to-ignore-false-positives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/agentic-ai-governance-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/agentic-ai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/agentic-ai-visibility-control</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-at-work-is-exploding-but-71-of-tools-put-your-data-at-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-governance-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-native-endpoint-dlp-foundation</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-orchestrated-espionage-is-here-your-data-controls-decide-what-happens-next-dlp-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-security-use-cases</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-security-webinar-2026-adoption-risk-report</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ai-the-future-of-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/americas-ai-action-plan-has-arrived-3-key-takeaways-that-data-security-leaders-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/analyst-plugin</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/anatomy-insider-threat-investigation</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/automatic-visibility-the-key-to-proactive-data-security-program</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/axos-bank-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/banks-fined-billions-for-using-non-compliant-chat-apps</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/best-ai-security-vendors</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/best-dlp-for-macos</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/best-enterprise-dlp-tools-ai-data-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/bioivt-dspm-ai-readiness</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/browser-agent-security-risk-chatgpt-atlas</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/casb-arent-enough-how-to-protect-your-valuable-intellectual-property</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/celebrating-cyberhavens-33m-series-b-funding-round</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ciso-series-digest-2-decoding-cybersecurity-language</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ciso-series-digest-mark-settle-ciso-cio-collaboration</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ciso-series-digest-prabhath-karanth-blueprint-dlp-program-success</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cmmc-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/code42-incydr-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/crowdstrike-dlp-review</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/crying-wolf-the-challenge-of-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-2023-gartner-cool-vendor-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-cloud-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-dspm-access</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-jamf-macos-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-product-update-may-2022</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-product-update-november-2021</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-product-update-october-2021</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-spring-2026-release</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-unlocked-ai-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-unlocked-designing-your-deployments</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cyberhaven-unlocked-linea-ai-for-analysts</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/cybersecurity-budget-roi</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-centric-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-defense-forum</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-detection-and-response-introduction</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-discovery-classification-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-exfiltration-detection-real-time</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-lineage-improves-labeling</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-loss-prevention-evolution</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-security-innovator-arlan-mcmillan-kirkland</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-security-innovator-chris-payne-vaxcare</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-security-innovator-kheun-chan-iron-mountain</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-security-innovator-mike-santos-cooley</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-security-innovator-zack-willis-michael-traski-ivp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/data-visibility-robotics-qa</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/digital-guardian-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-beyond-compliance-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-compliance-guide-hipaa-gdpr-pci</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-dspm-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-false-positives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-maturity-stages</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dlp-risk-assessment-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dont-be-fooled-data-security-requires-global-data-lineage-not-local-data-lineage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-data-discovery-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-data-governance-challenges</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-for-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-unified-data-risk-visibility</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-use-cases</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-vs-cspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-vs-cspm-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dspm-vs-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/dtex-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/early-insider-threat-indicators</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/endpoint-ai-agents-blind-spot</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/endpoint-ai-agents-security-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/endpoint-visibility-control</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/enhancing-cyberhaven-data-loss-prevention-with-exact-data-match</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/fastest-growing-ai-categories-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/finding-unexpected-security-gems-with-ddr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/fireside-chat-breaking-free-from-legacy-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/forcepoint-dlp-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/foundational-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/fragmented-ai-adoption-data-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/free-ai-app-risk-checker</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/from-shadow-it-to-shadow-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/fullcontext-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/gartner-dlp-magic-quadrant</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/gartner-dspm-report</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/generative-ai-dlp-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/generative-ai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/grc-cybersecurity-privacy-alignment</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/hidden-insider-risk-gaps</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-ai-companies-can-use-data-lineage-to-stop-ip-theft</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-cert-pinning-and-e2ee-broke-your-casb</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-cyberhaven-uses-data-lineage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-dlp-actually-works-ciso-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-dspm-works</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-legacy-dlp-leaves-you-exposed</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-to-mitigate-risks-of-data-sprawl-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/how-to-protect-company-data-when-youre-preparing-for-a-layoff</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/improve-security-with-instant-feedback-how-policies-with-notifications-educate-users</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-risk-management-culture-vs-controls</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-risk-management-program-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-risk-vs-insider-threat</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-risk-why-data-lineage-and-ai-are-the-only-path</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-threat-detection-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-threat-program-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/insider-threats-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/introducing-full-context-blocking</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/introducing-linea-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ip-theft-statistics</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/irm-monitoring-prevention</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/january-product-update</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/key-takeaways-from-the-gartner-roadmap-for-world-class-security-of-unstructured-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/lineage-over-labels-a-better-way-to-protect-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/managing-shadow-ai-best-practices-for-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/microsoft-purview-dlp-review</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/mission-australia-data-protection-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/modern-data-security-why-the-convergence-of-dlp-and-irm-is-more-effective-than-the-sum-of-its-parts</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/mole-wars-rise-of-the-insider-menace-september-17th</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/multi-cloud-dspm-deployment</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/nightfall-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/non-compete-ban-a-guide-for-information-security-teams</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/one-platform-complete-protection-why-data-security-is-moving-on-from-point-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/prioritizing-data-security-in-your-acquisition-strategy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/proactive-insider-risk-management-with-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/proofpoint-observeit-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/protecting-innovation-use-ai-securely-while-safeguarding-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/pure-play-dspm-vendors-whats-their-second-act</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/redefining-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/reflecting-on-a-momentous-year-at-cyberhaven-and-looking-ahead-to-2024</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/reimagining-data-security-four-new-capabilities</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/rethinking-dspm-ai-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/roi-modern-dlp-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/roi-of-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/rsac-2026-kick-off-where-to-find-team-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/secure-employee-offboarding-improvements</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/secure-enterprise-ai-adoption</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/securing-source-code-requires-securing-the-commit-and-a-whole-lot-more</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/sensitive-data-flowing-into-ai-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/shadow-ai-how-employees-are-leading-the-charge-in-ai-adoption-and-putting-company-data-at-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/shadow-ai-new-data-defense-paradigm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/smarter-than-ever-linea-ais-next-leap-forward-in-data-security-agents</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/standalone-browser-extension</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/summer-2025-product-launch</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/symantec-dlp-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ten-data-security-trends-for-2026</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/ten-insider-threat-types</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-cubicle-culprits-how-in-office-employees-are-leading-the-charge-in-corporate-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-essential-requirements-checklist-for-insider-threat-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-file-and-saas-data-perimeter-is-broken-data-security-needs-data-lineage-ddr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-hidden-risk-in-enterprise-ai-and-the-smarter-way-to-safeguard-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-next-chapter-in-cyberhavens-journey</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-only-day-zero-dlp-solution-available-for-macos-big-sur</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/the-top-5-reasons-you-need-an-endpoint-agent-for-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/three-pillars-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/time-to-value</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-casb-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-cyera-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-dlp-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-dspm-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-insider-threat-software</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-sase-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-ueba-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/top-varonis-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/traditional-dlp-fails-cloud-collaboration-tools</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/trellix-dlp-alternatives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/types-of-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/unified-dspm-dlp-single-platform</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/uniting-dspm-dlp-for-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/virtual-demo-dinner-next-gen-data-protection-with-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/virtual-holiday-demo-dinner-next-gen-data-protection-with-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/what-is-casb</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-data-security-needs-a-platform-what-recent-dspm-and-dlp-acquisitions-tell-us-about-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-i-joined-cyberhaven-iulia</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-i-joined-cyberhaven-saro</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-insider-risk-management-needs-to-be-proactive-not-reactive</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-insider-threat-risk-grows-when-moving-to-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/blog/why-legacy-data-loss-prevention-dlp-fails</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/abac</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/access-control</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/access-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/ai-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/ai-spm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/arp-poisoning</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/cloud-data-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/cloud-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/command-and-control-c2</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/content-vs-context-inspection</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/ddos-attack</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/examples-of-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/identity-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/ids-ips</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/man-in-the-middle-attack</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/network-segmentation</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/network-traffic-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-are-false-positives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-a-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-a-siem</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-a-vpn</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ai-data-leakage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ai-powered-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-an-insider-threat</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-audit-log</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-catfishing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ccpa</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-cmmc</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-access-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-breach</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-classification</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-governance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-lineage</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-privacy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-data-security-posture-management-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-digital-forensics</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-dlp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-doxxing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-endpoint-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-entitlement-creep</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-extended-detection-and-response-xdr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-firewall</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-gdpr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-generative-ai-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-hipaa</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-information-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-malware</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-mttd-mttr</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-nist-cybersecurity-framework</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-personally-identifiable-information-pii</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-phi</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-phishing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-principle-of-least-privilege-polp</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ransomware</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-rbac</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-sase</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-soc2</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-sox</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-ueba</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/what-is-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/infosec-essentials/zero-trust-data-security</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/2020-insider-threat-report</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/ai-101-when-and-how-to-properly-use-ai-at-work-without-putting-your-employers-data-at-risk</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-2026-ai-adoption-risk-report</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-addresses-critical-ai-security-gap</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-announces-accelerating-customer-adoption-and-appoints-key-leadership-to-drive-next-phase-of-growth</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-announces-first-ever-data-defense-forum</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-announces-record-year-of-growth-as-enterprises-race-to-secure-ai-and-data</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-closes-the-ai-security-gap-amid-the-meteoric-rise-of-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-expands-leadership-team-with-key-industry-executives</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-introduces-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-labs-reports-24-of-enterprises-have-installed-chatgpt-atlas-new-agentic-browser-poses-emerging-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-launches-unified-ai-data-security-platform-dspm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-leaders-recognized-on-crns-2026-women-of-the-channel-list</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-named-to-built-ins-2026-best-places-to-work-lists</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-names-james-mccarthy-svp-of-sales</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-now-available-aws-azure-google-cloud-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-product-launch-2019-12-05</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-raises-100-million-series-d-at-1-billion-valuation</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-raises-33m-in-series-b-funding</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-raises-88-million-to-protect-enterprise-data-in-the-ai-economy</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-ranked-among-the-fastest-growing-companies-in-north-america-on-the-2025-deloitte-technology-fast-500-tm</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-report-majority-of-corporate-ai-tools-present-critical-data-security-risks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-solves-the-surge-in-shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-transforms-enterprise-data-security-with-reimagined-dlp-and-insider-threat-platform</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-unveils-first-autonomous-ai-agent-to-halt-corporate-data-leaks</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-unveils-first-insider-threat-product-that-prevents-data-leaks-in-real-time</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-unveils-full-context-blocking-to-transform-stagnant-and-ineffective-dlp-market</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-welcomes-accomplished-cybersecurity-officer-aman-sirohi</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-winner-infosec-awards-2020</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/cyberhaven-wins-fortress-award-for-data-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/ignition-technology-x-cyberhaven-partnership</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/press-releases/redpoint-release</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/data-tracing-vs-data-tagging</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/graph-analytics-data-protection</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/graph-analytics-data-protection-part-2</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/hybrid-endpoint-dlp-inline-out-of-band</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/innovation-week-at-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/large-lineage-model-llim</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/macos-endpointsecurity-debugging-guide</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/mcp-security-mcpignore</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/engineering-blog/security-agent-endpoint-performance</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/cyberhaven-product-launch-spring-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/fall-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/spring-2026</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/summer-2025-product-launch-is-here</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/winter-2025</loc>
    </url>
    <url>
        <loc>https://www.cyberhaven.com/product-launch/winter-2026</loc>
    </url>
</urlset>