<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.duranium.io/archive</loc><changefreq>daily</changefreq></url><url><loc>https://blog.duranium.io/about</loc><changefreq>weekly</changefreq></url><url><loc>https://blog.duranium.io/p/sua-empresa-sobreviveria-a-um-ataque</loc><lastmod>2026-04-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/med-20-o-novo-campo-de-batalha-do</loc><lastmod>2026-03-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/qual-o-custo-de-nao-investir-em-seguranca</loc><lastmod>2026-03-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/seu-codigo-esta-seguro-os-riscos</loc><lastmod>2026-03-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/clawdbot-5-licoes-sobre-como-um-projeto</loc><lastmod>2026-02-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/gartner-ia-generativa-vai-forcar</loc><lastmod>2026-01-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/resolucao-bcb-5382025-o-que-muda</loc><lastmod>2026-01-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/relatorio-aponta-85-dos-incidentes</loc><lastmod>2025-12-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/voce-sabe-o-que-seus-colaboradores</loc><lastmod>2025-11-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/tdd-e-genai-coding-como-os-testes</loc><lastmod>2025-11-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/o-custo-real-da-ia-desprotegida</loc><lastmod>2025-10-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/anatomia-de-um-ataque-como-hackers</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/como-o-langsec-poderia-ter-evitado</loc><lastmod>2025-07-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/cyber-jitsu-a-arte-suave-da-seguranca</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/5-maneiras-de-usar-o-security-analytics</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/criptografia-e-tokenizacao-voce-sabe</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/jailbreak-em-llms-entendendo-as-ameacas</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/duranium-and-skyflow-partnership</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/parceria-duranium-and-skyflow</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/lgpd-e-tokenizacao-uma-estrategia</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/os-5-maiores-erros-na-implementacao</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/iam-a-base-da-seguranca-da-informacao</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/da-criptografia-egipcia-a-tokenizacao</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.duranium.io/p/ia-e-privacidade-equilibrando-inovacao</loc><lastmod>2025-07-09</lastmod><changefreq>monthly</changefreq></url></urlset>