<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.paloaltonetworks.com/blog/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/</loc>
		<lastmod>2026-04-10T12:49:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/how-autonomous-ai-agents-like-openclaw-are-reshaping-enterprise-identity-security/</loc>
		<lastmod>2026-04-10T12:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/autonomous-AI-agents-enterprise-identity-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/contain-the-sso-blast-radius-identity-security-beyond-mfa/</loc>
		<lastmod>2026-04-10T12:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/SSO-blast-radius-dentity-security-MFA.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-hidden-cost-of-pki-why-certificate-failures-arent-just-an-it-problem/</loc>
		<lastmod>2026-04-10T12:46:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/pki-certificate-security-digital-keys-machine-identity.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/how-the-future-of-privilege-is-reshaping-compliance/</loc>
		<lastmod>2026-04-10T12:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/privileged-access-compliance-identity-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/whats-shaping-the-ai-agent-security-market-in-2026/</loc>
		<lastmod>2026-04-10T12:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/ai-identity-security-least-privilege-agent-controls.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/secure-ai-agents-a-closer-look-at-new-solution-capabilities/</loc>
		<lastmod>2026-04-10T12:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/01/agentic-ai.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-ca-b-forum-mandate-a-catalyst-for-modernizing-machine-identity-management/</loc>
		<lastmod>2026-04-10T12:46:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/post-quantum-identity-security-readiness.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-future-of-privilege-dynamic-identity-security-in-real-time/</loc>
		<lastmod>2026-04-10T12:46:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/privilege-dynamic-identity-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-next-chapter-of-identity-security-begins-with-privilege/</loc>
		<lastmod>2026-04-10T12:46:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/privilege-future-access.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/agentic-ai-security-what-business-leaders-cant-afford-to-ignore/</loc>
		<lastmod>2026-04-10T12:47:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/agentic-ai-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/think-iga-is-challenging-youre-not-alone/</loc>
		<lastmod>2026-04-10T12:48:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/IGA-challenging-scaled-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/secrets-out-why-workload-identity-is-essential-for-ai-agent-security/</loc>
		<lastmod>2026-04-10T12:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/workload-identity-AI-agent-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/securing-ai-agents-privileged-machine-identities-at-unprecedented-scale/</loc>
		<lastmod>2026-04-10T12:48:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/securing-ai-agents-privileged-machine-identities.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-invisible-threat-machine-identity-sprawl-and-expired-certificates/</loc>
		<lastmod>2026-04-10T12:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/Firefly_Abstract-digital-network-with-interconnected-nodes.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/why-secret-sprawl-may-be-your-biggest-security-threat-and-how-to-help-fix-it/</loc>
		<lastmod>2026-04-10T12:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/secret-sprawl.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/modern-application-control-done-right-with-least-privilege/</loc>
		<lastmod>2026-04-10T12:48:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/modern-application-control-least-privilege.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/why-implementing-identity-security-doesnt-have-to-be-complicated/</loc>
		<lastmod>2026-04-10T12:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/identity-security-simplicity-scaled-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/skeleton-keys-and-local-admin-passwords-a-cautionary-tale/</loc>
		<lastmod>2026-04-10T12:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/skeleton-keys-local-admin-passwords.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/the-importance-of-identity-security-in-zero-trust-endpoint-defense/</loc>
		<lastmod>2026-04-10T12:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/identity_security_endpoint_zero_trust.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.paloaltonetworks.com/blog/identity-security/why-no-user-should-have-local-admin-rights/</loc>
		<lastmod>2026-04-10T12:49:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.paloaltonetworks.com/blog/wp-content/uploads/2026/04/Remove-Local-Admin-Rights-1.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->
<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced (Page is front page) 

Served from: www.paloaltonetworks.com @ 2026-04-10 08:15:17 by W3 Total Cache
-->