<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://www.tresal.eu/</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/about</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/careers</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/cookies</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/industries</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/login</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/pricing</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/privacy</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/register</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/terms</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/use-cases</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/5-red-flags-that-your-attack-surface-is-out-of-control</loc>
        <lastmod>2025-04-05</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/a-simple-checklist-for-securing-your-cloud-environment</loc>
        <lastmod>2025-04-17</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/attack-surface-management-5-strategies-to-proactively-reduce-exposure</loc>
        <lastmod>2025-03-12</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/how-often-teams-check-their-external-footprint</loc>
        <lastmod>2025-05-21</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/how-to-build-a-continuous-security-monitoring-program-from-scratch</loc>
        <lastmod>2025-07-12</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/how-to-explain-external-risk-to-your-ceo-or-board</loc>
        <lastmod>2025-06-02</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/how-to-know-if-your-company-has-shadow-it</loc>
        <lastmod>2025-04-25</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/how-to-map-your-external-attack-surface-in-under-5-minutes</loc>
        <lastmod>2025-06-05</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/shadow-it-is-your-biggest-risk-in-2025-here&apos;s-how-to-spot-it-early</loc>
        <lastmod>2025-03-03</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/step-by-step-guide-to-gdpr-compliant-vulnerability-management</loc>
        <lastmod>2025-08-06</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/the-complete-guide-to-cloud-security-posture-management-for-multi-cloud-environments</loc>
        <lastmod>2025-07-17</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/the-comprehensive-guide-to-unified-attack-surface-and-posture-management</loc>
        <lastmod>2025-06-16</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/top-5-cloud-misconfigurations-attackers-exploit</loc>
        <lastmod>2025-04-21</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/what-attackers-see-first-and-how-to-see-it-before-they-do</loc>
        <lastmod>2025-02-18</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/what-is-your-attack-surface-and-why-its-growing</loc>
        <lastmod>2025-05-01</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/what-we-discovered-when-scanning-50%2B-companies&apos;-attack-surfaces</loc>
        <lastmod>2025-04-22</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/why-asm-alone-isnt-enough-combining-attack-surface-management-and-cloud-security-posture-management</loc>
        <lastmod>2025-05-28</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/why-cloud-misconfigurations-still-happen-and-how-to-catch-them-before-attackers-do</loc>
        <lastmod>2025-05-15</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/blog/why-european-companies-are-moving-away-from-us-cybersecurity-software</loc>
        <lastmod>2024-12-05</lastmod>
    </url>
    <url>
        <loc>https://www.tresal.eu/careers/business-development-representative</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/careers/customer-success-support</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/careers/marketing-specialist</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/cloud-integrations</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/compliance-scanning</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/multi-workspace</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/reporting</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/scheduled-scanning</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/features/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/product/breach-detection</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/product/cspm</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/product/scanning</loc>
    </url>
    <url>
        <loc>https://www.tresal.eu/product/vulnerability-management</loc>
    </url>
</urlset>
<!-- XML Sitemap generated by @nuxtjs/sitemap v7.2.10 at 2026-04-03T21:30:52.422Z -->