<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://troj.ai</loc>
    </url>
    <url>
        <loc>https://troj.ai/products/detect</loc>
    </url>
    <url>
        <loc>https://troj.ai/products/defend</loc>
    </url>
    <url>
        <loc>https://troj.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://troj.ai/legal/security</loc>
    </url>
    <url>
        <loc>https://troj.ai/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://troj.ai/legal/terms-of-service</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog</loc>
    </url>
    <url>
        <loc>https://troj.ai/legal/license-agreement</loc>
    </url>
    <url>
        <loc>https://troj.ai/company/partners</loc>
    </url>
    <url>
        <loc>https://troj.ai/company/partners-contact</loc>
    </url>
    <url>
        <loc>https://troj.ai/lp/fs-isac</loc>
    </url>
    <url>
        <loc>https://troj.ai/company/about-us</loc>
    </url>
    <url>
        <loc>https://troj.ai/company/careers</loc>
    </url>
    <url>
        <loc>https://troj.ai/company/partners-deal-registration</loc>
    </url>
    <url>
        <loc>https://troj.ai/resources/newsroom</loc>
    </url>
    <url>
        <loc>https://troj.ai/products/defend-mcp</loc>
    </url>
    <url>
        <loc>https://troj.ai/products/defend-employee</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/advanced-ai-red-teaming-trojai-now-simulates-agentic-and-multi-turn-attacks</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/agent-led-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/agentic-ai-defend-for-mcp-model-context-protocol</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/agentic-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/agentic-ai-risks-and-security-challenges</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/ai-isnt-just-a-tool-orchestrated-attack-anthropic</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/ai-model-scanning-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/ai-red-teaming-insights-from-the-front-lines-of-genai-security</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/ai-security-ecosystem-is-evolving-partnerships</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/content-moderation-chatgpt-enterprise-and-mcp-go-mainstream</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/data-extraction-attack</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/devsecops-ai-security-trojai-jfrog-integration</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/driving-secure-ai-practices-in-the-ai-supply-chain</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/five-ai-security-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/llm-pentesting-trojai-detect</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/model-abliteration-essential-for-modern-ai-safety-evaluation</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/model-denial-of-service</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/predictions-2026-ai-security-and-the-next-wave-of-tech</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/red-teaming-voice-ai</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/rise-of-the-agentic-browser</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/securing-ai-applications-in-the-enterprise-three-lessons-learned</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/securing-ai-apps-from-genai-threats-mongodb-atlas-and-trojai</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/security-for-ai-vs-ai-security</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/the-2025-owasp-top-10-for-llms</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/top-3-reasons-why-you-need-a-firewall-for-your-ai-applications</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/top-7-reasons-to-try-the-trojai-free-red-team-report-card</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/trojai-cloud-security-alliance-ai-corporate-member</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/trojai-joins-microsoft-for-startups-pegasus-program</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/trojai-openai-ai-security-compliance-strategic-integration</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/trojai-securing-ai-models</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/trojai-wiz-closing-the-loop-on-ai-security</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/using-llm-as-judge</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-ai-jailbreaking</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-ai-red-teaming-in-practice</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-genai-runtime-defense-gard</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-model-context-protocol-mcp</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-prompt-injection-ai</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/what-is-the-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/when-ai-became-the-target</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/why-traditional-appsec-tools-fail-against-mcp-based-architectures</loc>
    </url>
    <url>
        <loc>https://troj.ai/blog/why-we-founded-trojai-behavioral-risk-is-the-biggest-threat-to-ai-models</loc>
    </url>
    <url>
        <loc>https://troj.ai/job/senior-data-scientist</loc>
    </url>
    <url>
        <loc>https://troj.ai/job/senior-software-engineer</loc>
    </url>
</urlset>