<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>
            https://www.bearer.com
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/advisory-board
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/an-in-depth-guide-to-conducting-a-data-security-audit
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/announcing-bearer-8m-seed-round
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/announcing-beta-support-for-php-alpha-for-go-and-python
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/api-security-best-practices
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/apidays-data-privacy
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/automatic-data-flow-mapping
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/aws-rds-data-security-best-practices
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-cli-1-2-0-typescript
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-cli-1-3-0
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-cli-2-months-in-retrospect-of-new-features-and-improvements
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-cli-battle-test
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-cli-new-features-and-improvements-summer-update
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-entered-into-an-agreement-to-be-acquired-by-cycode
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearer-privacy-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/bearers-data-first-security-platform
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/benchmarking-top-sast-products
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/celebrating-100-000-scans
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/celebrating-50-000-downloads-of-bearer-cli
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/compliance-data-flow-map-apis
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-breach-mitigation-6-steps-you-can-take
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-discovery-a-detailed-guide-to-the-what-why-and-how
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-first-security-should-become-the-standard
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-flow-mapping-why-it-matters-and-how-to-do-it
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-protection-impact-assessment-dpia
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-protection-privacy-and-data-security-laws
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-security-best-practices-and-how-to-implement-them
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-security-controls-six-types-and-how-to-implement-them
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-security-is-a-mirage
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/data-security-is-not-data-privacy
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/developers-dont-care-about-data-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/devsecops-ai-openai
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/devsecops-data-security-development-workflow
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/dpa-subprocessors-gdpr
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/empowering-security-champions-with-modern-static-application-security-testing-sast
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/enhancing-developer-experience-and-security-reporting-on-workflows
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/establish-data-security-policy
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/github-code-scanning
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/gitlab-security-scanner-integration
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/heres-why-your-saas-needs-a-dpa
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/holistic-data-management
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-rust-lets-us-monitor-30k-api-calls-min
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-assess-third-party-data-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-build-modals-with-hotwire-turbo-frames-stimulusjs
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-detect-unauthorized-data-sharing
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-discover-sensitive-data
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-make-remote-a-success
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-to-monitor-sensitive-data-encryption
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-we-got-900-applications-on-our-developer-position
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/how-we-usability-test
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/improving-precision-and-recall
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/infinite-scrolling-pagination-hotwire
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/introducing-bearer-assistant
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/introducing-bearer-cloud
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/introducing-bearers-advanced-gitlab-integration
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/introducing-bearers-github-app
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/key-insights-on-security-and-privacy
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/loom-express-session-incident
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/module-overrides-ruby-prepend-alias
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/monitor-cross-border-data-transfers
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/okr-at-bearer
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/pivoting-to-data-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/privacy-by-design
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/privacy-vs-data-protection
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/product-design-intern-perspective
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/product-engineering-workflow
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/record-of-processing-activities-ropa
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/redefining-sast-when-appsec-meets-developer-experience
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/redesigning-our-graphql-api
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/releasing-our-open-sourcing-sast-solution
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/ruby-security-top-10
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/saas-hiring-tips
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/sast-ci-cd
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/scaling-secure-code-review-in-modern-enterprises
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/securing-ai-generated-code
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/security-with-a-high-engineer-to-appsec-ratio-insights-from-jeevan-singh
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/sensitive-data-in-code
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/shadow-apis-detect-business-risk
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/snapshot-testing-viewcomponents-with-rspec
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/soc-reports-api-vendor
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/starting-a-remote-first-and-multicultural-company
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/static-code-analysis-data-flow-mapping
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/step-by-step-integrating-sast-into-your-development-workflow
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/tips-for-using-tree-sitter-queries
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/tips-for-virtual-offsite
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/top-3-data-security-problems
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/turbo-streams-and-turbo-frames
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/ultimate-ruby-rails-data-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/understanding-an-api-providers-privacy-policy
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/webflow-blog-code-blocks
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/what-does-a-modern-code-security-pipeline-look-like-hint-not-like-a-pipeline
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/what-is-sensitive-data
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/what-is-sla-service-level-agreements-and-how-to-find-them
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/why-hotwire
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog/working-remotely-insights-bearer
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog-pages/announcements
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog-pages/engineering
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog-pages/industry
        </loc>
    </url>
    <url>
        <loc>
            https://www.bearer.com/blog-pages/the-bear-den
        </loc>
    </url>
</urlset>