<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyberark.ilogoindonesia.id/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyberark.ilogoindonesia.id/membangun-kepercayaan-dalam-ritel-digital-bagaimana-keamanan-identitas-melindungi-e-commerce/</loc>
		<lastmod>2024-11-25T10:52:09+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2024/11/88_cyberark_indonesia.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-akses-jarak-jauh-praktik-terbaik-untuk-manajemen-risiko-pihak-ketiga/</loc>
		<lastmod>2024-12-05T03:35:45+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2024/12/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/login-itu-murah-kedamaian-pikiran-tak-ternilai-harganya/</loc>
		<lastmod>2024-12-19T16:33:10+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2024/12/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-siber-pada-tahun-2025-konvergensi-identitas-ai-pribadi-dan-apt-otonom/</loc>
		<lastmod>2025-01-08T09:35:28+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/penjelasan-audit-keamanan-cloud-tantangan-dan-solusi/</loc>
		<lastmod>2025-01-08T09:40:13+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/refleksi-seorang-white-hat-di-tahun-2024-wawasan-dan-pelajaran-dalam-keamanan-siber/</loc>
		<lastmod>2025-01-19T07:20:46+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/cara-mempersiapkan-diri-untuk-umur-sertifikat-tls-90-hari-dengan-automatisasi/</loc>
		<lastmod>2025-01-19T07:23:51+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/7-faktor-kunci-yang-perlu-dipertimbangkan-saat-memilih-solusi-pam-modern-di-2025/</loc>
		<lastmod>2025-01-23T08:59:02+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/cio-pov-ransomware-dan-ketahanan-cerita-cyber-terbesar-tahun-2024/</loc>
		<lastmod>2025-01-23T09:03:28+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/serangan-terhadap-departemen-keuangan-as-peristiwa-penting-dan-implikasi-keamanan/</loc>
		<lastmod>2025-02-18T04:25:24+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/modernisasi-direktori-anda-tanpa-mengorbankan-keamanan-linux/</loc>
		<lastmod>2025-02-18T04:29:38+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-tulang-punggung-genai-perusahaan/</loc>
		<lastmod>2025-02-18T04:35:34+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bersiap-menghadapi-ancaman-siber-2025-dengan-wawasan-riset-dari-cyberark-labs/</loc>
		<lastmod>2025-02-18T04:39:59+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1-3_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/tingkatkan-keamanan-cloud-tanpa-mengganggu-developer-anda/</loc>
		<lastmod>2025-02-25T04:01:09+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/evolusi-penipuan-bagaimana-teknologi-deepfake-mengubah-kejahatan-siber/</loc>
		<lastmod>2025-02-25T04:05:02+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1-1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/deepseek-ddos-mengapa-ai-membutuhkan-keamanan-identitas-mesin/</loc>
		<lastmod>2025-02-25T04:09:59+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/agen-ai-berbasis-web-mengungkap-ancaman-internal-yang-muncul/</loc>
		<lastmod>2025-02-25T04:14:44+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/seberapa-aman-oauth-anda-wawasan-dari-100-situs-web-part-1/</loc>
		<lastmod>2025-03-04T02:40:16+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/membentuk-ulang-iga-untuk-perusahaan-modern-selamat-datang-zilla-security-ke-cyberark/</loc>
		<lastmod>2025-03-04T02:46:31+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1-1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/seberapa-aman-oauth-anda-wawasan-dari-100-situs-web-part-2/</loc>
		<lastmod>2025-03-04T02:53:52+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/pov-cio-lima-tema-penting-yang-membentuk-agenda-teknologi-cio/</loc>
		<lastmod>2025-03-08T17:50:32+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/realitas-deepfake-pengalaman-saya-sebagai-target/</loc>
		<lastmod>2025-03-08T18:00:51+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1-2_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/revolusi-ai-agen-5-tantangan-keamanan-tak-terduga/</loc>
		<lastmod>2025-03-19T02:35:03+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1-3_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/apa-yang-akan-datang-dalam-manajemen-risiko-ai/</loc>
		<lastmod>2025-03-19T02:38:33+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/endpoint-yang-tidak-dikelola-titik-buta-dalam-keamanan-anda/</loc>
		<lastmod>2025-03-27T06:14:45+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/realitas-mendesak-keamanan-identitas-mesin-di-tahun-2025/</loc>
		<lastmod>2025-03-27T06:17:36+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/capture_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/kebangkitan-agen-ai-kolaborasi-kecerdasan/</loc>
		<lastmod>2025-04-10T17:14:01+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/04/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-ciso-dapat-memanfaatkan-identitas-untuk-mendorong-zero-trust/</loc>
		<lastmod>2025-04-10T17:18:37+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/04/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/realitas-mendesak-keamanan-identitas-mesin-di-tahun-2025-2/</loc>
		<lastmod>2025-04-11T03:06:35+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/04/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/otentikasi-tanpa-kata-sandi-untuk-tenaga-kerja-melampaui-hype-dan-siap-bertahan/</loc>
		<lastmod>2025-04-11T03:10:01+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/04/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/penemuan-saja-tidak-cukup-anda-memerlukan-konteks-untuk-mengamankan-identitas-mesin/</loc>
		<lastmod>2025-05-02T03:51:28+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ancaman-yang-mengintai-di-sesi-pasca-otentikasi/</loc>
		<lastmod>2025-05-02T03:53:42+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/agen-yang-diserang-pemodelan-ancaman-pada-agentic-ai-pendahuluan/</loc>
		<lastmod>2025-05-02T03:56:06+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/pandangan-cio-identitas-dan-ketegangan-tidak-seimbang-antara-penyerang-dan-pembela/</loc>
		<lastmod>2025-05-02T04:01:28+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/visi-cyberark-untuk-memelopori-akses-aman-untuk-workload/</loc>
		<lastmod>2025-05-02T04:04:33+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-2_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/terobosan-chip-kuantum-mengapa-ketahanan-identitas-mesin-tidak-bisa-menunggu/</loc>
		<lastmod>2025-05-02T04:06:54+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-3_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/meningkatkan-keamanan-kubernetes-strategi-untuk-manajemen-secrets-yang-efektif/</loc>
		<lastmod>2025-05-02T04:12:54+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-4_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-identitas-untuk-lanskap-ai-agentik/</loc>
		<lastmod>2025-05-23T04:08:08+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/strategi-keamanan-siber-modern-untuk-server-linux/</loc>
		<lastmod>2025-05-23T04:10:40+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-3_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/investasi-keamanan-siber-yang-paling-banyak-gagal-diamankan-oleh-organisasi/</loc>
		<lastmod>2025-05-23T04:14:30+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-4_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-proaktif-menangani-risiko-endpoint-yang-tidak-terkelola/</loc>
		<lastmod>2025-05-23T04:16:59+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ciem-dan-akses-cloud-yang-aman-praktik-terbaik-dari-wiz-dan-cyberark/</loc>
		<lastmod>2025-05-23T06:54:48+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1-5_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/penemuan-saja-tidak-cukup-anda-membutuhkan-konteks-untuk-mengamankan-identitas-mesin/</loc>
		<lastmod>2025-05-23T06:57:07+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/05/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-siber-whole-of-state-pendekatan-terpadu-untuk-melindungi-pemerintahan/</loc>
		<lastmod>2025-06-05T07:13:45+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/pengurangan-masa-berlaku-sertifikat-tls-ke-47-hari-apa-yang-perlu-diketahui/</loc>
		<lastmod>2025-06-05T07:17:15+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/membuka-jailbreak-baru-dengan-penjelasan-ai/</loc>
		<lastmod>2025-06-05T07:26:35+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/membuka-nilai-investasi-membuktikan-nilai-program-keamanan-identitas-kepada-eksekutif-c-suite/</loc>
		<lastmod>2025-06-05T07:28:53+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-3_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-red-hat-openshift-virtualization-dengan-cyberark-identity-security-untuk-vm-dan-kontainer/</loc>
		<lastmod>2025-06-22T07:31:19+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/modernisasi-ti-federal-menyeimbangkan-efisiensi-dengan-keamanan-siber-tingkat-lanjut/</loc>
		<lastmod>2025-06-22T07:33:15+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-4_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-pengalaman-pengguna-ux-yang-buruk-dapat-melemahkan-keamanan-perusahaan/</loc>
		<lastmod>2025-06-22T07:35:14+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-5_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/presisi-dalam-identitas-mesin-mengamankan-identitas-non-manusia-yang-penting/</loc>
		<lastmod>2025-06-22T07:37:19+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/waktu-persiapan-tls-semakin-sempit-5-langkah-praktis-untuk-bersiap-menghadapi-sertifikat-tls-47-hari/</loc>
		<lastmod>2025-06-25T07:19:57+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-2_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/racun-di-mana-mana-tidak-ada-output-dari-server-mcp-yang-aman/</loc>
		<lastmod>2025-06-25T07:24:13+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/masa-depan-tata-kelola-identitas-cepat-aman-dan-skalabel/</loc>
		<lastmod>2025-07-13T14:02:37+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/01/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-terpadu-menjembatani-celah-dengan-pendekatan-defense-in-depth/</loc>
		<lastmod>2025-07-13T14:05:44+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/03/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/pesan-ini-akan-terdekripsi-sendiri-dalam-5-tahun-mengapa-persiapan-pasca-kuantum-harus-dimulai-sekarang/</loc>
		<lastmod>2025-07-13T14:08:09+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/07/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/kriptografi-pasca-kuantum-pqc-membangun-ketahanan-saat-gembok-masih-berfungsi/</loc>
		<lastmod>2025-07-13T14:12:39+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/07/Untitled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/apakah-ai-anda-aman-analisis-ancaman-model-context-protocol-mcp/</loc>
		<lastmod>2025-07-13T14:15:18+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/04/picture1-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/kini-di-aws-marketplace-dukungan-perusahaan-cyberark-untuk-cert-manager/</loc>
		<lastmod>2025-07-13T14:17:46+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/07/picture1_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/kekacauan-identitas-mesin-tantangan-volume-variasi-dan-kecepatan/</loc>
		<lastmod>2025-07-25T03:27:34+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-agentic-ai-mengubah-alur-kerja-perusahaan-wawasan-dari-mit-genai-lab/</loc>
		<lastmod>2025-07-25T03:31:03+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/02/picture1-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/tabrakan-quantum-dan-ai-apa-yang-harus-dilakukan-ciso-sekarang-untuk-tetap-terdepan/</loc>
		<lastmod>2025-07-25T03:35:00+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/07/untitled_cyberark_indonesia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/c4-bomb-mengungkap-kerentanan-enkripsi-cookie-appbound-chrome/</loc>
		<lastmod>2025-07-25T03:39:08+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/06/picture1-3_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/merombak-akun-sekunder-bagaimana-zero-standing-privileges-zsp-mengubah-keamanan-identitas/</loc>
		<lastmod>2025-08-25T07:06:31+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/kehidupan-dan-kematian-agen-ai-pelajaran-keamanan-identitas-dari-pengalaman-manusia/</loc>
		<lastmod>2025-08-25T07:09:13+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111-1_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/malware-plague-ancaman-backdoor-pam-yang-mengintai-sistem-linux/</loc>
		<lastmod>2025-08-25T07:12:33+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111-2_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-penyerang-eksternal-dan-orang-dalam-berbahaya-mengeksploitasi-hak-istimewa-tetap-di-cloud/</loc>
		<lastmod>2025-08-25T07:31:26+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111-3_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/perspektif-cio-apa-yang-harus-dilakukan-dengan-agen-ai/</loc>
		<lastmod>2025-08-25T07:34:30+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111-4_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-kontainer-skala-besar-memperkuat-rantai-pasokan-perangkat-lunak/</loc>
		<lastmod>2025-08-25T07:37:07+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/08/111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/panduan-ciso-untuk-kesiapan-pasca-kuantum-cara-membangun-ketangkasan-kripto-sekarang/</loc>
		<lastmod>2025-09-02T09:12:50+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/declutter-crypto-anda-keamanan-identitas-mesin-untuk-dunia-pasca-kuantum/</loc>
		<lastmod>2025-09-02T09:15:03+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/555_cyberark_indonesia.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-akses-konsol-dan-cli-cloud-untuk-pengembangan-perangkat-lunak-agile/</loc>
		<lastmod>2025-09-12T04:11:55+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1757650226_222_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/insiden-drift-salesloft-gambaran-umum-dan-respons-cyberark/</loc>
		<lastmod>2025-09-12T04:32:16+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1757651473_222_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengapa-penyebaran-rahasia-keamanan-mungkin-ancaman-terbesar-anda-dan-cara-memperbaikinya/</loc>
		<lastmod>2025-09-29T08:09:10+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759132495_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/apakah-autofill-aman-risiko-clickjacking-dan-pertimbangan-keamanan-dijelaskan/</loc>
		<lastmod>2025-09-29T08:09:51+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759132599_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/revolusi-ai-dalam-keamanan-siber-keuangan/</loc>
		<lastmod>2025-09-29T08:11:32+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759132697_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/panduan-praktis-untuk-tata-kelola-identitas-mesin-yang-siap-ai-di-sektor-keuangan/</loc>
		<lastmod>2025-09-29T08:11:58+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759132827_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/sandworm-di-rantai-pasok-pelajaran-dari-serangan-shai-hulud-npm-pada-identitas-pengembang-dan-mesin/</loc>
		<lastmod>2025-09-29T08:12:33+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759132953_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/persuasi-engineering-cara-memengaruhi-manusia-llm-dan-agen-ai/</loc>
		<lastmod>2025-09-29T08:12:45+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/09/1759133073_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/sandworm-di-rantai-pasok-pelajaran-dari-serangan-shai-hulud-npm-pada-identitas-pengembang-dan-mesin-2/</loc>
		<lastmod>2025-10-13T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1760331798_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ancaman-tak-terlihat-ekspansi-identitas-mesin-dan-sertifikat-yang-kedaluwarsa/</loc>
		<lastmod>2025-10-13T05:14:13+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1760331906_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/agen-ai-di-jasa-keuangan-bagan-organisasi-tersembunyi/</loc>
		<lastmod>2025-10-13T05:14:44+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1760332079_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ketika-agen-ai-menjadi-admin-memikirkan-ulang-akses-istimewa-di-era-ai/</loc>
		<lastmod>2025-10-13T05:14:58+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1760332240_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/96-mesin-per-manusia-krisis-identitas-ai-agenik-di-sektor-keuangan/</loc>
		<lastmod>2025-10-22T08:32:35+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1761119693_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengamankan-identitas-mesin-berprivilese-untuk-agen-ai-dalam-skala-tanpa-presepsi/</loc>
		<lastmod>2025-10-22T08:33:36+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1761120118_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/cyberark-dinamai-pemimpin-dalam-magic-quadrant-gartner-2025-untuk-pam/</loc>
		<lastmod>2025-10-22T08:34:10+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1761120504_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/agen-ai-di-jasa-keuangan-bagan-organisasi-tersembunyi-2/</loc>
		<lastmod>2025-10-22T08:36:01+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/10/1761119551_111_cyberark_indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/sertifikat-tls-47-hari-apa-yang-berubah-dan-cara-mempersiapkan/</loc>
		<lastmod>2025-11-11T03:26:18+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762830844_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/rahasia-terbongkar-mengapa-workload-identity-penting-untuk-keamanan-ai-agent/</loc>
		<lastmod>2025-11-11T03:26:46+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762830932_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/menerapkan-iga-tantangan-dan-solusi-untuk-keamanan-identitas-enterprise/</loc>
		<lastmod>2025-11-11T03:27:13+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762831084_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/crash-hack-deviate-tiga-kegagalan-agen-ai-yang-harus-dihadapi-setiap-enterprise/</loc>
		<lastmod>2025-11-11T03:27:37+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762831258_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/otomatisasi-kepatuhan-mengapa-keamanan-identitas-membutuhkan-penyetelan-data-driven/</loc>
		<lastmod>2025-11-11T03:27:48+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762831362_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/selamat-datang-di-agentic-park-apa-yang-diajarkan-teori-kekacauan-tentang-keamanan-ai/</loc>
		<lastmod>2025-11-11T03:28:03+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1762831484_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-ai-agenik-apa-yang-tidak-bisa-diabaikan-pemimpin-bisnis-dari-cyberark/</loc>
		<lastmod>2025-11-26T04:42:22+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1764131498_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-ai-meresap-tata-kelola-identitas-untuk-ciso-dan-cio-dari-cyberark/</loc>
		<lastmod>2025-11-26T04:42:52+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1764131583_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bab-selanjutnya-keamanan-identitas-dimulai-dengan-privilege-panduan-lengkap-cyberark-2025/</loc>
		<lastmod>2025-11-26T04:43:31+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1764131664_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengapa-manajemen-akses-membutuhkan-mindset-challenger-dari-cyberark/</loc>
		<lastmod>2025-11-26T04:43:57+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/11/1764131747_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bab-selanjutnya-keamanan-identitas-dimulai-dengan-privilege/</loc>
		<lastmod>2025-12-24T04:35:32+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/12/1766549326_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ketika-kejahatan-siber-bertemu-perang-siber-ancaman-nyata-di-era-digital-modern/</loc>
		<lastmod>2025-12-24T04:36:23+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/12/1766549470_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/manajemen-sertifikat-tls-di-tahun-2026-permainan-tanpa-akhir-whack-a-cert/</loc>
		<lastmod>2025-12-24T04:37:54+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/12/1766549571_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/ai-agents-dan-risiko-identitas/</loc>
		<lastmod>2025-12-24T04:40:14+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2025/12/1766549657_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-hak-istimewa-ai-agent-mendefinisikan-ulang-ekspektasi-asuransi-siber/</loc>
		<lastmod>2026-01-08T04:44:19+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1767847054_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/masa-depan-privilege-keamanan-identitas-dinamis-secara-real-time/</loc>
		<lastmod>2026-01-08T04:44:50+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1767847150_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-fondasi-esensial-strategi-cybersecurity-ciso-2026/</loc>
		<lastmod>2026-01-08T04:45:14+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1767847250_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mandat-ca-b-forum-katalisator-modernisasi-manajemen-identitas-mesin/</loc>
		<lastmod>2026-01-08T04:45:39+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1767847337_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/vibe-check-your-vibe-code-menambahkan-pertimbangan-manusia-pada-pengembangan-berbasis-ai-dari-cyberark/</loc>
		<lastmod>2026-01-20T04:12:11+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1768880818_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-post-quantum-dari-risiko-menuju-kesiapan-dari-cyberark/</loc>
		<lastmod>2026-01-20T04:12:29+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/01/1768882253_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/akankah-agen-ai-menjadi-nyata-di-tahun-2026-tantangan-keamanan-identitas-di-era-otonom/</loc>
		<lastmod>2026-02-18T04:40:12+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387386_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/menyelami-cyberark-labs-mengungkap-evolusi-risiko-pada-ai-browser-dan-oauth/</loc>
		<lastmod>2026-02-18T04:40:43+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387473_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/di-balik-gunung-es-ai-kekuatan-yang-mengubah-dunia-kerja-dan-keamanan-siber/</loc>
		<lastmod>2026-02-18T04:41:21+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387569_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/apa-yang-membentuk-pasar-keamanan-agen-ai-di-tahun-2026-pandangan-komprehensif/</loc>
		<lastmod>2026-02-18T04:41:57+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387674_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/bagaimana-masa-depan-hak-istimewa-privilege-mengubah-lanskap-kepatuhan-compliance/</loc>
		<lastmod>2026-02-18T04:42:30+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387790_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/biaya-tersembunyi-dari-pki-mengapa-kegagalan-sertifikat-bukan-sekadar-masalah-it/</loc>
		<lastmod>2026-02-18T04:42:58+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387873_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/apakah-kita-terlalu-mempercayai-ai-risiko-keamanan-di-balik-otomatisasi-otonom/</loc>
		<lastmod>2026-02-18T04:43:23+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771387977_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengejar-hantu-digital-di-lingkungan-iga-modern-mengapa-identitas-lama-adalah-ancaman-utama/</loc>
		<lastmod>2026-02-18T04:43:50+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771388083_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/agen-ai-revolusi-produktivitas-yang-memaksa-revaluasi-identitas-dan-kontrol/</loc>
		<lastmod>2026-02-24T08:58:16+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771922494_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/membatasi-blast-radius-sso-mengapa-keamanan-identitas-harus-melampaui-mfa/</loc>
		<lastmod>2026-02-24T08:58:52+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771922607_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/munculnya-agen-ai-otonom-bagaimana-openclaw-dan-teknologi-serupa-mengubah-keamanan-identitas/</loc>
		<lastmod>2026-02-24T09:00:14+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771922734_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-fondasi-utama-crypto-agility-di-era-pasca-kuantum/</loc>
		<lastmod>2026-02-24T09:01:18+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/02/1771922850_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-fondasi-utama-bagi-keberhasilan-di-era-ai/</loc>
		<lastmod>2026-04-09T07:12:56+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717065_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/strategi-identitas-global-dengan-tata-kelola-lokal-kunci-keamanan-siber-dan-kepatuhan-uu-pdp-di-indonesia/</loc>
		<lastmod>2026-04-09T07:13:28+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717183_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/masalah-akses-ai-baru-mengapa-identitas-mesin-menjadi-penentu-kepercayaan-di-sektor-perbankan/</loc>
		<lastmod>2026-04-09T07:13:58+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717307_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/keamanan-identitas-sebagai-aset-produksi-transformasi-keamanan-siber-di-sektor-manufaktur-modern/</loc>
		<lastmod>2026-04-09T07:14:30+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717387_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/melampaui-autentikasi-mengapa-keamanan-akses-saas-harus-dipikirkan-ulang-setelah-login/</loc>
		<lastmod>2026-04-09T07:14:59+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717483_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/mengurangi-risiko-ai-mengapa-agen-ai-harus-dikelola-sebagai-identitas-digital-yang-setara-dengan-manusia/</loc>
		<lastmod>2026-04-09T07:15:19+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717555_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/menjembatani-it-dan-ot-menyatukan-keputusan-identitas-di-lantai-pabrik-untuk-ketahanan-industri/</loc>
		<lastmod>2026-04-09T07:15:31+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717637_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.ilogoindonesia.id/menutup-celah-tata-kelola-identitas-mengapa-profil-ai-adalah-masa-depan-keamanan-siber/</loc>
		<lastmod>2026-04-09T07:15:46+00:00</lastmod>
		<image:image>
			<image:loc>http://cyberark.ilogoindonesia.id/wp-content/uploads/2026/04/1775717742_111.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->