<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.geordie.ai</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/styles/components</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/product</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/why-us</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/how-it-works</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/about</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/staging/podcasts</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/legals/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/legals/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/agentic-ai-governance-why-mcp-gateways-fall-short</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/ai-agent-risk-what-executives-need-to-know-to-innovate-safely-and-confidently</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/ai-governance-best-practices</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/building-ai-agents-heres-what-developers-want-leaders-to-know</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/cisos-guide-agentic-security-governance</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/claude-desktop-extensions-rce-vulnerability-a-technical-analysis-of-configuration-risk-and-agentic-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/enterprise-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/from-connectivity-to-collaboration-apis-mcps-and-a2a-in-agentic-plans</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/geordie-ai-introduces-beam-the-first-ai-agent-remediation-suite-with-context-engineering</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/geordie-ai-named-most-innovative-startup-at-rsac-2026-innovation-sandbox</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/geordie-ai-rsac-2026-innovation-sandbox-finalist</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/geordie-wins-black-hat-europe-2025-startup-spotlight</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/how-to-actually-patch-cve-2025-68145-cve-2025-68144-and-cve-2025-68143-in-mcp-server-git</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/making-ai-accountable-how-explainability-and-observability-meet-regulation-and-trust</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/model-context-protocol-security-next-mcp-release</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/moving-beyond-static-prompts-to-living-playbooks-what-ace-means-for-enterprise-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/openclaw-and-the-emergence-of-personal-ai-autonomy-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/prompt-injection-isnt-the-main-problem-in-ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/rethinking-security-the-limits-of-endpoint-controls-in-an-ai-agent-world</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/security-advisory-remote-shell-backdoor-in-mcp-package-lanyer640-mcp-runcommand-server</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/seeing-the-risks-clearly-how-leaders-can-evaluate-ai-investments-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-claude-desktop-extensions-tool-chaining-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-eight-new-n8n-cves-since-january---updated-remediation-guidance</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-figma-mcp-server-remote-code-execution-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-langchain-serialization-injection-enables-secret-extraction</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-multiple-vulnerabilities-in-cursor-ai-code-editor</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-n8n---multiple-vulnerabilities---march-2026</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-n8n---unauthenticated-remote-code-execution-ni8mare</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-n8n-python-sandbox-escape-enables-arbitrary-command-execution</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-n8n-remote-code-execution-via-arbitrary-file-write</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-n8n-remote-code-execution-via-expression-injection</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-serverless-framework-mcp-server-command-injection</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/technical-advisory-teampcp-supply-chain-campaign</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/the-new-attack-surface-why-ai-agents-need-taint-analysis</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/top-10-ai-agent-governance-best-practices</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/understanding-recent-n8n-vulnerabilities-exposure-risk-and-remediation</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/unlocking-safe-innovation-why-ai-agents-must-be-transparent</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/where-to-find-geordie-ai-at-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/why-universal-guardrails-for-ai-agents-sound-appealing-but-rarely-work-in-practice</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/resources/why-were-building-geordie</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/podcasts/apt-and-cybersecurity-with-hanah</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/podcasts/cyber-sidekicks-with-hanah</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/podcasts/cyberbytes-with-henry-and-hanah</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/podcasts/help-net-security-with-hanah</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/podcasts/the-security-space-podcast-with-hanah</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/dinner-events/join-geordie-at-aerlume-in-seattle-on-june-2-2026</loc>
    </url>
    <url>
        <loc>https://www.geordie.ai/dinner-events/may-28-2026-ciso-dinner-at-dishoom</loc>
    </url>
</urlset>