<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//tenable.shipchain.io/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://tenable.shipchain.io/blog/</loc>
		<lastmod>2026-01-05T08:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/shipchain-accounting-tenable-finance-confidence/</loc>
		<lastmod>2026-03-19T05:24:12+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/how-shipchain-accounting-and-tenable-build-finance-confidence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Why-Finance-Leaders-Now-Worry-About-Control-and-Trust.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Confidence-Means-in-Modern-Accounting-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Accurate-Reports-Alone-Are-Not-Enough.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Why-Cyber-Risk-Is-a-Serious-Accounting-Problem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Compliance-Audit-and-Reputation-Impact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Exposure-in-Accounting-Systems.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Centralized-Accounting-Workflows-Matte.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Risk-Awareness-and-Accounting-Operations-Work-Together.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Business-Benefits-for-Finance-and-Accounting-Leaders.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/cyber-attacks-affect-supply-chain/</loc>
		<lastmod>2026-03-19T05:23:05+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Cyber-Attacks-Affect-Supply-Chain-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Realistic-Scenario-Using-a-Modern-Platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Attack-Easily-in-Digital-Supply-Chains.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/End-your-exposure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Practical-Playbook-for-Supply-Chain-Leaders.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/tenable-review/</loc>
		<lastmod>2026-03-17T10:47:52+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Review.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-interface-website.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-exposure-solutions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/OT-Exposure-Tenable-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-io-dashboards-asset-management-overview.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-io-Vulnerability-Scanning.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-io-VPRSummary-final.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-io-Exec_Summ_Comp_Dashboard-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Reporting-Alerts-syslog_map-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-Logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Nessus-ranks-at-the-top.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-One-ai-powered-exposure-management-.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-cloud-security-Unify-visibility-for-multi-cloud-resources.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Web-App-Scanning.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-OT-Security-comprehensive-visibility.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Identity-Exposure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Nessus-pricing-plans-detailed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Vulnerability-Management-pricing-plans-details.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-solutions.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/G2-ranks-Tenable-as-a-leader-in-risk-based-vulnerability-management.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Cloud-Security-data-fabric.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/tenable-vs-rapid7/</loc>
		<lastmod>2026-03-17T10:02:10+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-vs-Rapid7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Vulnerability-Management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Prioritize-vulnerabilities-tenable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Exposure-Management-rapid7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/rapid7-Icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/rapid7-mdr-with-unlimited-incident-responsed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/The-Preemptive-MDR-Leader-that-Outpaces-Attackers-rapid7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-risk-overview.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/rapid7-Icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Cloud-Native-Application-Protection-rapid7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-pricing-plan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/RAPID7-product-pricing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/rapid7-Icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Instantly-see-every-risk-rapid7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/tenable-vs-qualys/</loc>
		<lastmod>2026-02-23T09:31:01+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-vs-Qualys.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Vulnerability-Management-in-tenable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Vulnerability-Management-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Qualys-website-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/qualys-Icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-one-exposure-card.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/csam-ciso-dashboard.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Level-up-exposure-management-with-AI-intelligence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-pricing-plan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Included-with-all-subscriptions-qualys.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/qualys-Icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/OT-Exposure-Tenable-Product.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/tenable-pricing-plans/</loc>
		<lastmod>2026-02-23T09:29:02+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-pricing-plan-thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Vulnerability-exposure-Cloud-exposure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Nessus-pricing-plans-detailed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-Vulnerability-Management-pricing-plans-details.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/OT-Exposure-Tenable-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Try-Nessus-professional-for-free.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Register-for-your-30-day-free-license-Tenable-Nessus-Essentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-One-ai-powered-exposure-management.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/tenable-icon.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/02/Tenable-exposure-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/api-security-risks-supply-chain-operations/</loc>
		<lastmod>2026-02-23T08:12:05+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/API-Security-Issues-Affecting-Modern-Supply-Chain-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/The-Invisible-Glue-Holding-Supply-Chains-Together.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Supply-Chain-APIs-Are-Prime-Targets-for-Attackers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Exposed-to-the-Internet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Common-API-Vulnerabilities-in-Logistics-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Mass-Assignment-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Real-Cost-of-Compromised-API-Endpoints-on-Supply-Chain-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Real-Cost-of-Compromised-API-Endpoints.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Continuous-API-Security-Monitoring-Without-Breaking-Integrations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Securing-Third-Party-API-Connection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Best-Practices-for-API-Security-in-Supply-Chain-Platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/tenable-and-shipchain-integration/</loc>
		<lastmod>2026-02-23T08:10:23+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Tenable-and-Shipchain-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Tenable-and-Shipchain-Each-Do.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Need-Cyber-Exposure-Visibility.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/tenable-documentation-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/shipchain-api-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Tenable-Correlates-Exposure-with-Business-Impact.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Disruptions-Before-They-Impact-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Who-Should-Use-the-ShipChain-and-Tenable-Integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/ot-security-hidden-industrial-risks/</loc>
		<lastmod>2026-02-23T08:09:05+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Tenable-OT-Security-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Take-control-of-your-assets-Tenable-OT-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/What-OT-Systems-Exist-in-Modern-Supply-Chains.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/comprehensive-visibility-Tenable-OT-Security-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/risk-based-vuln-management-Tenable-OT-Security-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Warehouse-OT-Breach-Triggers-Chain-Reaction.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Supply-Chain-Visibility-Problem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/The-Role-of-OT-Security-Visibility-in-Preventing-Downtime%F0%9F%9B%A1%EF%B8%8F.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/How-Supply-Chain-Platforms-Are-Impacted-by-OT-Disruptions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Operational-Impact-Comes-Before-Security-Labels.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Proactive-Oversight-Reduces-Recovery-Costs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/cyber-exposure-management-for-business/</loc>
		<lastmod>2026-02-23T08:07:16+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/What-Is-Cyber-Exposure-Management-Why-Businesses-Need-It.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/What-Does-Cyber-Exposure-Really-Mean.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Why-Traditional-Security-Models-Are-No-Longer-Enough.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Modern-Attack-Surface-Has-Expanded.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Cloud-exposure-Tenable-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Vulnerability-exposure-Cloud-exposure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/OT-Exposure-Tenable-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Eliminate-attack-paths.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Real-Business-Impact-of-Cyber-Exposure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Free-products-from-Tenable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Shift-Toward-Exposure-Based-Security-Thinking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Should-Care-About-Cyber-Exposure-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/unsecured-iot-devices-supply-chain-logistics/</loc>
		<lastmod>2026-02-21T11:12:41+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/How-Unsecured-IoT-Devices-Disrupt-Supply-Chain-Logistics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/The-IoT-Revolution-in-Modern-Supply-Chains.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Why-IoT-Devices-Are-Critical-to-Supply-Chain-Visibility.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/The-Hidden-Vulnerability-Unsecured-IoT-Endpoints.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Common-IoT-Security-Risks-in-Supply-Chain-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/How-Compromised-IoT-Devices-Disrupt-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Compromised-IoT-Devices-Disrupt-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/The-Real-Cost-of-IoT-Related-Supply-Chain-Breaches.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Identifying-IoT-Exposure-in-Supply-Chain-Infrastructure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Modern-Exposure-Management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Monitoring-IoT-Risk-Without-Breaking-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Integrating-IoT-Security-with-Supply-Chain-Platforms.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Integrating-IoT-Security-with-Supply-Chain-Platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://tenable.shipchain.io/supply-chain-operational-confidence-digital-logistics/</loc>
		<lastmod>2026-01-07T05:47:48+00:00</lastmod>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/How-ShipChain-and-Tenable-Give-Supply-Chain-Leaders-Real-Operational-Confidence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Digital-supply-chain-ecosystem-with-cloud-connections-and-partner-networks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Supply-chain-control-tower-dashboard-showing-real-time-visibility-and-metrics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Cyber-attack-disrupting-supply-chain-operations-with-locked-trucks-and-error-screens.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Cyber-exposure-heatmap-showing-vulnerabilities-across-digital-supply-chain-infrastructure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/digital-risk-assessment-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/logistics-workflow-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/supply-chain-operations-platform-managing-workflows-and-shipments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Cyber-risk-awareness-integrated-with-supply-chain-operations-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Enabling-Coordinated-Decisions-Between-Security-and-Operations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Business-Benefits-for-Supply-Chain-Leaders.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://tenable.shipchain.io/wp-content/uploads/sites/16/2026/01/Business-growth-chart-showing-supply-chain-resilience-and-confidence-metrics.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->