<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.scrut.io</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/security-training-and-device-monitoring</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/startup</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/growth</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/enterprise</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/audit-center</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/access-reviews</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/scrut-platform</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/company/newsroom</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/all-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/custom-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/partners/program-overview</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/partners/partner-directory</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/trust-center</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/soc2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/integrations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/scrut-teammates</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/travel</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/education</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/solutions/enterprise-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/company/scrut-ai-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/compliance-compass</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/general</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/company/careers</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/asset-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/dpa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/why-scrut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/company/about-us</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/company/security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/product-tour</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/compliance-compass-tool</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/faqs/ccpa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/scrut-badges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/schedule-a-demo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/event/gff2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/platform/dast</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc-hub</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/landing-page1/soc2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you-page</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/authors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/landing-page/superai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/access-reviews</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/asset-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/cloud-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/compliance-essentials</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/compliance-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/grc-trends</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/others</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/product-updates</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/scrut-milestones</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/scrut-updates</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/surface</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/trust-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/vendor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/vendor-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/blog-sub-categories/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/4-steps-for-a-unified-effective-and-continuous-compliance-program</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/5-best-practices-for-a-successful-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/5-ways-automated-compliance-checks-help-cisos-manage-their-workload</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/7-compliance-trends-of-2022</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/7-compliance-trends-to-look-out-for-in-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/9-easy-steps-to-review-a-vendors-soc-2-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/a-complete-guide-to-managing-operational-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/a-guide-on-vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/a-guide-to-onboarding-and-offboarding-employees-for-risk-prevention</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/access-reviews</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/achieving-compliance-excellence-with-trusted-it-service-providers</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/advantages-of-information-security-for-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-and-compliance-for-the-mid-market</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-for-continuous-compliance-in-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-grc-and-data-privacy-in-g2s-state-of-software-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-hallucinations-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-management-system</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ai-use-cases-in-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/anecdotes-alternative-competitor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/applying-the-nist-artificial-intelligence-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/aquasec-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/attack-surface-management-importance-types-and-solution</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/attack-surface-visibility-cam</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/audit-evidence-documentation-reporting</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/audit-risk-model</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/auditboard-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/automate-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/automate-vendor-risk-management-with-scrut-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/automated-controls-testing</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/aws-security-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-cloud-security-monitoring-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-gdpr-compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-isms-software-top-10-platforms-ranked-by-features</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-practices-for-compliance-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-practices-to-follow-to-avoid-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/best-risk-calculation-method</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/biden-national-cybersecurity-strategy-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/breeze-through-security-questionnaires-with-kai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/business-continuity-disaster-recovery-plan</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/business-impact-analysis-what-it-is-and-how-to-do-it</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/buyers-guide-cloud-security-vendors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/caasm-an-emerging-need-for-organizations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/caasm-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/calculate-rpn-in-fmea</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/calculating-your-actual-pci-compliance-cost-expert-guide-for-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ccpa-compliance-tools-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ciso-decision-matrix-which-compliance-standards-deliver-the-best-roi-for-continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cisos-share-top-security-predictions-for-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cloud-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cloud-security-monitoring-best-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cloud-security-platforms-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cloud-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cloud-security-with-continuous-vapt</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cmmc-automation-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/common-compliance-mistakes</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/communicate-importance-compliance-programs-trust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/communicating-your-security-posture</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-audit-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-automation-integrations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-monitoring</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-reporting</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-strategy-framework-finder</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/compliance-vs-information-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/continuous-risk-management-for-ai-advancements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/coppa-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cpra-regulations-introduction</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cracking-the-cyber-code-with-evolving-perspectives-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/critical-high-risk-vendors-difference</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cspm-and-cwpp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cspm-the-ultimate-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/customer-trust-accelerate-sales</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cyber-asset-management-challenges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cyber-hygiene</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cyber-risk-reduce-management-questions-for-vendors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cyber-security-culture-csc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-and-data-privacy-using-the-secure-controls-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-architecture-and-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-asset-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-governance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-governance-strategies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-trends-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/cybersecurity-vs-information-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-governance-metrics-kpi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-privacy-regulation-terminology</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-privacy-regulations-best-practices-for-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-security-standards</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-security-standards-list-for-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/data-spill-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/debunking-myths-about-risk-quantification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/deciphering-the-digital-personal-data-protection-act-dpdpa-2023-in-india-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/defining-cyber-and-compliance-risk-for-mid-market-businesses</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/difference-between-phi-vs-pii</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/different-privacy-frameworks-embed</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/digital-personal-data-protection-bill-2023-in-india</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/distinguish-between-scrm-tprm-and-vrm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/dora-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/dpdp-rules</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/draft-digital-personal-data-protection-bill-2022</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/drata-alternatives-competitors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/education-records-ferpa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/effective-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/effective-vendor-management-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/enterprise-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ep-15-keep-your-friends-close-but-your-insiders-closer</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ep-16-all-about-compliance-commoditization-grc-4-0-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/esas-announcement</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/esg-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/eu-artificial-intelligence-ai-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/eu-compliance-regulations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/evaluate-security-posture-of-company</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/everything-you-need-to-know-about-nis-2-directive</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/fedramp-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/fedramp-rev-5-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/financial-services-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/fintech-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/fintech-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/from-point-in-time-to-continuous-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/g2-state-of-software-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/g2s-state-of-software-report-scrut-in-3rd-place-for-grc-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/gartner-digital-market-badges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/gdpr-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/gdpr-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/genai-is-reshaping-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/generative-ai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/generative-ai-streamline-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/getting-started-with-cyber-risk-quantification-key-concepts</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/give-to-gain-how-women-in-cybersecurity-are-rewriting-the-rules-of-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-for-ai-roi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-for-building-customer-trust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-management-benefits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-meaning-and-importance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-platforms</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-solutions</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/grc-trends</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/guide-common-types-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/guide-to-an-fmea-analysis</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/guide-to-cyber-risk-integration</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/guide-to-risk-control-matrix</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/harnessing-automation-for-evidence-management-with-scrut-monitor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/healthcare-cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/hipaa-violations-prevention-best-practices-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/hipaa-vs-hitrust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/hitrust-certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-automated-evidence-collection-works</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-can-fintech-startups-create-an-enterprise-friendly-infosec-posture</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-can-saas-startups-create-an-enterprise-friendly-security-posture</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-cisos-can-leverage-ai-for-third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-governance-aces-compliance-and-risk-management-in-the-grc-program</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-much-engineering-time-does-soc-2-compliance-cost</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-scrut-helps-with-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-scrut-makes-multi-entity-trust-simpler-and-smarter</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-security-leaders-are-rethinking-data-privacy-at-scale</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-automate-vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-automate-your-infosec-program-with-scrut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-choose-a-caasm-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-choose-a-cspm-tool</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-choose-grc-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-choose-the-right-risk-management-software-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-comply-with-nydfs-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-create-a-risk-register</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-create-strong-roi-for-multi-cloud-solutions-using-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-establish-a-company-wide-infosec-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-perform-a-swot-analysis-for-cyber-risk-quantification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-prevent-cyberattacks-by-balancing-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-prevent-third-party-vendor-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-prioritize-compliance-tasks-with-scrut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-select-the-right-cyber-risk-quantification-method</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-switch-compliance-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/how-to-turn-soc-2-compliance-into-a-growth-strategy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/human-element-compliance-scrut-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/human-element-defending-against-risks-in-incident-response</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/hyperproof-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iam-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/illusion-of-security-clean-pen-test-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/importance-of-context-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/importance-of-quantifying-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/improve-operating-effectiveness-compliance-program</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/incident-response</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/increase-customer-trust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/information-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/information-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/infosec-compliance-myths</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/infosec-compliance-questions-large-to-ask-potential-saas-vendors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/infosec-compliance-saas-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/infosec-compliance-vs-it-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/inherent-risk-vs-residual-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/internal-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/internal-penetration-testing-ai-powered-threats</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-kai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-scrut-dast</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-scrut-teammates-ai-powered-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-the-new-nist-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/introducing-trust-vault</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-13485</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-27001-2022-update</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-27001-certification-everything-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-27001-change-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-27701</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-42001-ai-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-42001-vs-nist-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-42005</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/iso-standards</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-and-cyber-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-grc-best-practices-cisos-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-grc-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-risk-management-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/it-risk-management-software-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/jupiterone-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/keeping-up-with-cybersecurity-must-know-statistics-and-trends</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/key-data-privacy-and-compliance-trends-in-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/lanes-in-the-road-how-small-and-medium-businesses-can-allocate-cybersecurity-responsibility</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/large-language-models-and-third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/loud-security-with-continuous-vapt</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/managing-sub-processor-risk-to-comply-with-global-privacy-regulations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/mas-trm-implementation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/master-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/mastering-quantitative-risk-assessment-a-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/mastering-risk-how-to-score-external-and-internal-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/mastering-the-art-of-cybersecurity-policy-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/missing-piece-in-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/multi-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/multi-factor-authentication-mfa-importance-organizations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/new-iso-iec-27701-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/new-mfa-guidelines</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/new-scrut-interface</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/new-scrut-website</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nis-2-tasks-to-meet-directive-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-800-53-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-800-automation-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-ai-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-disaster-recovery-template</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-recommendations-software-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nist-sp-800-171</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/noetic-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/nurturing-the-security-mindset</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/open-source-cspm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/optimizing-compliance-through-continuous-automation-and-integration</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/overlap-between-soc-2-iso-27001-and-gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/penetration-tests-vs-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/prepare-for-the-nhs-mfa-multi-factor-authentication-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/proactive-third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/product-updates-november-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/pros-and-cons-of-a-boutique-auditing-firm-versus-big-4</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/pros-and-cons-of-preparing-for-a-soc-2-audit-in-house</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/quick-guide-for-infosec-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ranked-9-in-g2s-2026-best-software-awards-for-grc-products</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/rbi-framework-for-responsible-and-ethical-enablement-of-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/rebranding-announcement</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/reduce-compliance-costs-with-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/regulatory-compliance-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/regusense-compliance-for-fintech</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/reinforce-ai-trust-with-responsibleai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/reinforce-your-risk-posture-with-scruts-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/remote-soc-2-audits-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/revolutionizing-tprm-ai-powered-quantitative-risk-assessment-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-avoidance-vs-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-based-vulnerability-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-a-scoop-of-risk-squishy-not-crunchy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ai-with-a-pinch-of-responsibility</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-are-you-yafing-bud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-back-to-basics-a-crash-course-for-experts</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-collaborative-kitchen-for-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-de-romanticizing-the-cybersecurity-complexity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-do-auditors-have-horns</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-doing-the-little-things-right</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ep-17</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ep-18-bridging-the-security-dev-divide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ep-19</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ep-20-the-security-poverty-line</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-ep-22-the-real-cost-of-cyber-leadership</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-fancy-some-acronym-soup-mate</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-security-building-a-business-within-a-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-security-on-a-shoestring-budget</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-the-art-of-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-the-perks-of-automating-audits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-the-process-of-setting-up-a-process-to-set-up-a-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-grustlers-the-upshot-of-uncontinuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-management-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-management-techniques</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-mangement-strategy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-register-how-to-create-maintain</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-scoring-tips-to-improve-predictive-analytics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/risk-tolerance-vs-risk-appetite</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/roi-from-grc-platform</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/role-of-ai-in-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/role-of-information-security-in-the-changing-indian-fintech-landscape</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/role-of-integrated-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/saas-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-achieve-compliance-dora-adherence</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-achieves-iso-42001-certification-a-new-chapter-in-responsible-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-advanced-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-and-airmdr-partner</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-awarded-distinction-by-software-advice-in-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-featured-in-hitrust-products-and-services-directory</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-featured-inc-best-in-business-2024</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-featured-on-the-fortune-cyber-60-list</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-has-raised-10-million-in-growth-capital</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-is-a-linkedin-top-20-startup-2024</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-automation-is-now-certified-as-a-great-place-to-work</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-bags-177-badges-in-the-g2-summer-2023-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-compliance-badges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-dazzles-with-5-momentum-leader-awards-and-152-badges-in-g2s-spring-2024-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-earns-3-leader-awards-and-124-badges-in-the-g2-spring-2023-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-g2-best-software-award-winner</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-april-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-august-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-december-2024-snapshots</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-december-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-february-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-february-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-january-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-january-2026-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-july-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-june-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-march-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-march-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-october-2025-snapshot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-innovations-september-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-is-now-crest-accredited</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-may-update</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-named-a-2025-inc-power-partner-award-winner</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-receives-badges-in-the-g2-2022-awards</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-rises-to-the-top-in-g2s-fall-2024-report-with-10-momentum-leader-awards</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-setup-wizard</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-shines-in-the-g2-winter-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-shines-once-again-with-6-momentum-leader-awards-and-179-badges-in-g2s-summer-2024-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-stands-victorious-in-g2s-winter-2024-report-with-134-badges-2-momentum-leader-awards-and-4-leader-badges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-triumphs-in-g2s-fall-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scrut-user-access-review</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/scruts-performance-in-g2s-fall-2025-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/sec-new-guidelines-cybersecurity-management-incident-disclosure</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/secureframe-vs-vanta</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/securitea-time-ep-1-strategies-to-master-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/securitea-time-ep-2-cracking-the-cyber-code</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/securitea-time-ep-3-compliance-beyond-the-checkbox</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/securitea-time-ep-4-cyber-roulette-playing-with-digital-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-as-a-revenue-enabler</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-compliance-how-to-secure-your-business-meet-regulations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-control-types</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-controls-types-functions-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-framework-for-b2b-sales</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-frameworks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/security-questionnaires</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/smoother-security-reviews</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-and-your-security-posture-a-cisos-perspective</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-audit-setup</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-compliance-policies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-control-list</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-criteria-for-beginners-how-to-satisfy-them</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/soc-2-readiness-assessments</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/software-advice-names-scrut-best-hipaa-compliance-software-of-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ssae-18-the-ultimate-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/step-by-step-guide-to-apply-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/streamline-compliance-scrut-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/streamline-compliance-with-dashboards-and-reports</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/streamline-compliance-with-generative-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/synergizing-compliance-controls-exploring-ucfs-advantages</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/systematically-measure-and-manage-vendor-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/tekpon-names-scrut-automation-a-top-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-at-and-t-breach-lessons-for-the-mid-market</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-compliance-teams-backup-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-eu-ai-act-and-smb-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-expectations-of-bidens-national-cybersecurity-strategy-from-the-private-sector</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-fundamentals-of-a-risk-management-plan</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-necessity-of-a-risk-based-approach-in-modern-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/the-ultimate-nis-directive-handbook</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/third-party-incident-response-management-plan</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/third-party-vendor-risk-management-solution</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/time-to-compliance-how-cisos-accelerate-audits-and-roi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-7-compliance-management-software-for-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-9-drata-alternatives-competitors-for-compliance-automation-in-2026</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-caasm-vendors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-compliance-challenges-faced-by-fast-growing-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-compliance-management-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-cspm-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/top-cybersecurity-metrics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/tugboat-logic-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/turning-endpoint-security-into-proof-of-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/types-of-audit-evidence</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ultimate-guide-to-iso-42001-2023</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ultimate-guide-to-residue-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/understanding-comprehensive-compliance-cost-economics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/understanding-the-best-risk-calculation-method</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/unified-compliance-framework-vs-the-secure-controls-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/update-nist-csf-2-0-vs-1-1-whats-new-and-why-it-matters-for-your-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vanta-alternatives-competitors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-management-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-risk-assessment-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-risk-assessment-tips</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-risk-management-best-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-risk-management-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vendor-risk-management-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/vulnerability-management-vs-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/ways-to-shift-your-organization-to-a-security-first-mindset</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/what-is-caasm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/what-is-nydfs</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/what-is-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/what-to-ask-your-compliance-platform-about-audit-quality</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/who-needs-ccpa-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/who-needs-pci-dss-compliance-heres-how-to-find-out</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/why-are-internal-controls-critical-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/why-is-compliance-more-than-just-a-tick-box-for-indian-fintech-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/why-scrut-is-the-best-grc-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/why-security-trumps-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/why-we-started-scrut-and-our-goals</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/wiz-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/world-password-day</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/zengrc-alternatives</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/zengrc-vs-rsa-archer-vs-scrut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/post/zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/aayush-ghosh-choudhury</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/abinaya-ramakrishnan</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/amrita-agnihotri</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/barasha-medhi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/gautam-bhat</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/grace-arundhati</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/ishani-sircar</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/kush-kaushik</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/megha-thakkar</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/pratik-zingade</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/shanmugeshwari-muthiah</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/shraddha-chaturvedi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/susmita-joseph</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/author/team-scrut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/a-scoop-of-risk-squishy-not-crunchy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/ai-agents-for-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/ai-with-a-pinch-of-responsibility-embed</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/all-about-compliance-commoditization-grc-4-0-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/are-you-yafing-bud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/back-to-basics-a-crash-course-for-experts</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/bridging-the-dev-security-divide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/collaborative-kitchen-for-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/compliance-beyond-the-checkbox-a-fresh-perspective-on-auditors-and-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/cracking-the-cyber-code-with-evolving-perspectives-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/cyber-roulette-playing-with-digital-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/deromanticizing-the-cybersecurity-complexity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/do-auditors-have-horns</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/doing-the-little-things-right</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/fancy-some-acronym-soup-mate</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/keep-your-friends-close-and-your-insiders-closer</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/securing-agentic-ai-ecosystems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/securing-the-future-strategies-to-master-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/security-building-a-business-within-a-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/security-on-a-shoestring-budget</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-art-of-breaking-into-the-security-space</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-perks-of-automating-audits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-process-of-setting-up-a-process-to-set-up-a-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-security-poverty-line</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-upshot-of-uncontinous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/podcasts/the-weight-of-cyber-leadership</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/newsroom-category/scrut-awards</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/newsroom-category/scrut-news</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/newsroom-category/scruts-industry-takes</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/airpay</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/allcloud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/athenium</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/balboa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/bookandlink</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/bright</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/bureau</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/cargofl</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/cashfree-payments</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/choozle</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/cloudfiles</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/cogniquest</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/consark</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/cortico</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/diesta</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/disprz</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/e6data</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/freight-tiger</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/gomboc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/gomobi</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/imocha</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/increff</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/insightly</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/keka</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/kissht</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/mc-aero</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/monthio</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/nextbillion-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/nintex</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/orca</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/pando</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/pluto</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/prozo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/qapita</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/quickwork</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/splitmetrics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/toddle</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/tracex</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/treebo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/turbohire</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/typesense</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/uneecops</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/uptimeai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/uxarmy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/xeno</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/case-study/zipstack</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/ai-governance-operationalizing-trust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/building-security-programs-fast</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/decoding-indias-data-protection-bill-for-your-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/fast-track-compliance-audits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/from-compliance-chaos-to-collaboration-the-tech-stack-reveal</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/next-era-of-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/regulators-got-smarter</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/respond-fast-respond-right-introducing-kai-your-control-co-pilot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/responsibleai-beyond-innovation-into-accountability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/risk-assessment-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/webinars/the-rise-of-agentic-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/3-trends-cisos-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/5-steps-for-creating-secure-and-transparent-ai-systems-with-iso-42001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/8-simple-steps-for-acing-your-nist-ai-rmf-implementation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/a-beginners-guide-to-cyber-asset-attack-surface-management-caasm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/a-cfos-guide-to-governance-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/ai-in-the-trenches-insights-and-guidance-from-top-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/becoming-best-in-class-in-cloud-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/best-practices-for-automating-gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/boosting-efficiency-with-security-questionnaire-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/caasm-a-must-for-a-cisos-tech-stack</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/cloud-security-101-challenges-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/creating-a-devsecops-culture-for-your-company</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/cybersecurity-checklist-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/demystifying-the-jargons-a-cisos-guide-to-cybersecurity-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/discover-the-top-grc-trends-in-2024</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/dora-steps-a-comprehensive-guide-to-the-digital-operational-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/effective-vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/enterprise-rfp-security-questionnaire</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/evaluating-compliance-automation-platforms-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/for-cisos-the-crucial-role-of-a-security-first-approach-in-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/forrester-the-governance-risk-and-compliance-platforms-landscape-q4-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/grc-automation-playbook-for-engineering-teams-from-audit-fire-drills-to-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/grc-roi-guide-how-to-turn-compliance-into-revenue-growth</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/hipaa-security-rule-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/how-engineering-teams-swap-grc-tools-without-breaking-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/how-smart-founders-turn-compliance-into-a-growth-signal-before-their-investors-ask</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/implementing-dpdpa-a-step-by-step-guide-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/iso-iec-42001-readiness-checklist-for-compliance-managers-the-5-quickest-steps-to-certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/key-attack-surface-challenges-cloud-native-companies-are-facing-today</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/navigating-indias-digital-personal-data-protection-bill-2023-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/navigating-pci-dss-compliance-a-comprehensive-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/navigating-the-ai-boom-unlocking-roi-with-responsible-ai-and-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/navigating-the-ai-compliance-landscape</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/saas-platform-security-done-right</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/scrut-automations-soc-2-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/security-best-practices-for-startup</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/security-on-a-budget-building-cyber-resilience-for-resource-constrained-teams</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/seven-focus-areas-to-navigate-the-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/strengthening-the-chain-a-guide-to-mitigating-third-party-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/tco-analysis-when-is-it-time-to-switch-your-grc-platform</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-complete-guide-to-risk-quantification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-crucial-role-of-a-security-first-approach-in-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-great-ai-regulation-road-trip-through-iso-42001-nist-ai-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-impact-of-ai-and-ml-on-modern-grc-solutions</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-role-of-the-cfo-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-state-of-compliance-quality</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-ultimate-guide-to-mastering-risk-management-for-fintech-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/the-ultimate-soc-2-guide-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/top-10-grc-and-ai-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/ebooks/unlocking-the-power-of-enterprise-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/accountability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/accountability-and-transparency-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/adversarial-example</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/adversarial-robustness</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-accountability-framework</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-code-of-conduct</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-ethics-committee-governance-board</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-governance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-impact-assessment-aiia</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-impact-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-management-system-aims</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-risk-profile</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ai-transparency-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/aicpa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/algorithmic-impact-assessment-aia</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/annex-a-controls</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/approved-scanning-vendor-asv</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/artificial-intelligence-ai-system</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/attestation-of-compliance-aoc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/audit-trail-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/california-consumer-privacy-act-ccpa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cardholder-data-chd</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cardholder-data-environment-cde</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ce-marking-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/change-management-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cmmc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/compliance-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/conformity-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/contextualization-of-ai-risk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/continuous-improvement-aims</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/continuous-monitoring-and-improvement-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cost-of-compliance-ownership</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cross-framework-alignment-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cspm-cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cwpp-cloud-workload-protection-platform</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/data-governance-for-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/deployer</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/distributor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ethical-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/explainability-and-interpretability-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/explainability-xai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/fairness-and-bias-mitigation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/fairness-and-bias-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/fedramp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/foundation-model-fm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/general-data-protection-regulation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/generative-ai-genai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/glossary-iso-27001-security-standard</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/glossary-iso-27001-stage-1-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/govern-function-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/health-information-technology-for-economic-and-clinical-health-act-hitech</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-breach</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-business-associates</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-covered-entities</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-employee-training</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules-breach-notification-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules-enforcement-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules-omnibus-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules-privacy-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-rules-security-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/hipaa-sanctions-i</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/human-ai-configuration</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/human-oversight</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/importer</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/incident-management-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/information-security-management-system-isms</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/internal-security-assessor-isa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/isms-governing-body</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-internal-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-key-performance-indicators-kpis</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-management-review</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-non-conformities</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-risk-treatment-plan</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/iso-27001-stage-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/it-security-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/limited-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/manage-function-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/map-function-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/measure-function-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/merchant</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/minimal-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/model-documentation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/model-drift</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/notified-body</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/payment-card-industry-data-security-standard-pci-dss</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/performance-evaluation-iso-42001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/post-market-monitoring</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/privacy-enhanced-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/privacy-preserving-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/protected-health-information</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/provider</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/qualified-security-assessor-qsa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/rag-retrieval-augmented-generation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/report-on-compliance-roc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/risk-assessment-ai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/risk-tolerance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/safety-and-security</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/self-assessment-questionnaire-saq</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/serious-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/service-provider</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-1</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-2-type-1-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-2-type-2-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-3</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-auditor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/soc-reports</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ssae-16</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/ssae-18</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/statement-of-applicability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/substantial-modification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/third-party-ai-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/time-to-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/traceability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/transparency</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/trust-services-criteria</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/trustworthiness-characteristics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/unacceptable-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/user</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/validity-and-reliability-nist-ai-rmf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/vendor-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/vendor-management-policy</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/vendor-review</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/glossary/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/15five</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/active-campaign</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/adp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/adyen</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/aircall</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/airtable</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/amazon-web-services</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/amplitude</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/anthropic-claude</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/apollo-io</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/appdirect</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/asana</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/auth0</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/azure-devops</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/azure-devops-pm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/bamboohr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/basecamp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/bitbucket</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/box</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/breezyhr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/brevo-sendinblue</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/cal-com</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/calendly</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/campaign-monitor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/canny</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/certn</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/charliehr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/checkr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/clickup</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/close-crm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/cloudflare</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/collibra</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/confluence</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/contentful</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/copper</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/cyberark</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/databricks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/datadog</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/deel</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/dialpad</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/digitalocean</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/docusign</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/drip</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/dropbox</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/ec-council</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/employmenthero</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/endpoint-central</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/eventbrite</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/facebook-ads</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/figma</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/fireflies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/fivetran</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/fleet</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/freeagent</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/freshbooks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/freshdesk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/freshservice</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/freshteam</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/front</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/gainsight-px</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/getresponse</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/github</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/gitlab</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/gong</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/google-analytics</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/google-big-query</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/google-cloud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/greythr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/harvest</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/helpscout</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/heroku</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/hexnode</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/hibob</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/hive</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/hubspot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/hunter</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/insightly</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/ironclad</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/jamf-pro</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/jibble</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/jira</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/jumpcloud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/jumpcloud-sso</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/kandji</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/keka</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/kitecyber</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/klaviyo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/knowbe4</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/kolide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/less-annoying-crm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/lever</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/linear</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/mailgun</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/microsoft-azure</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/microsoft-azure-gov-cloud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/microsoft-defender-endpoint</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/microsoft-entra-azure-active-directory</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/miro</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/monday-com</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/mongodb</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/ms-intune</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/netsuite</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/new-relic</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/ninjaone</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/notion</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/okta-idp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/okta-sso</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/onelogin</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/openai</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/oracle-cloud-hcm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/oracle-sales-fusion-service</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/pandadoc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/paycom</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/paylocity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/personio</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/phished</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/pingone</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/qualys</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/rippling</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sagehr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/salesforce</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sap-successfactors</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sendgrid</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sentry</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/servicedesk-plus</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sharepoint</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/shortcut</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/slack</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/snowflake</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/snyk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sonarcloud</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sophos-central</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/springverify</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/stripe</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/sumo-logic</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/tableau</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/tenable</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/threatcop</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/trello</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/ukgpro</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/vercel</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/workday</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/xero</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/zendesk</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/zenefits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/zoho</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/integrations/zoom</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/accelerate-the-soc-2-audit-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/audit-scope</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/basics-of-a-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/beginners-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/buyers-guide-soc-2-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/cost-of-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/how-soc-2-audit-process-works</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/infosec-guide-for-beginners</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/misconceptions-about-soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/pick-the-right-soc-2-auditor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/prepare-for-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/pros-and-cons-of-soc-2-compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/review-vendor-soc-2-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-1-vs-soc-2-vs-soc-3</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-audit-exceptions</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-audit-keys-to-success</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-bridge-letter</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-common-criteria</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-compliance-challenges</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-compliance-documentation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-compliance-timeline</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-controls</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-readiness-assessment-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-training</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-trust-service-criteria</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-type-1-vs-soc-2-type-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-type-2-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-vs-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-2-vs-soc-3</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/soc-vs-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/the-soc-2-audit-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/tips-for-faster-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/what-is-a-soc-2-report</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/what-is-soc-2-automation-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/what-is-soc-2-type-2-benefits-audit-process-compliance-and-certification-in-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/who-can-perform-soc-2-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/who-needs-soc-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/soc-2/why-does-your-company-need-soc-reports</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/how-to-map-hipaa-to-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-2013</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-audit-and-process</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-certifcation-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-certification-cost</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-consultants</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-controls</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-documentation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-gap-analysis</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-implementation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-internal-audit-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-mandatory-documents</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-statement-of-applicability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-surveillance-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-timeline</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-vs-iso-27002</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-27001-vs-nist-csf</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/iso-42001-vs-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/policy-requirement</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/iso-27001/who-needs-iso-27001-certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-compliance-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-compliance-for-small-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-4</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-4-0-1-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-compliance-cost</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-compliance-levels</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-fines</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-level-1</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-network-segmentation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-penetration-testing-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-requirements-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-dss-violations</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/pci-saq</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/pci-dss/what-to-expect-in-the-new-pci-dss-4</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/gdpr-vs-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-audit-trail-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-compliance-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-covered-entities</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-covered-entity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-exceptions-exemptions</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/hipaa-guide-for-social-media</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/how-to-conduct-successful-hipaa-risk-assesssment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/soc-2-and-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/soc-2-vs-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/which-entities-are-covered-under-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/hipaa/who-enforces-hipaa</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/ccpa-vs-gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/complete-gdpr-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/comply-with-gdpr</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/facts-about-gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-auditor</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-brings-global-privacy-paradigm-shift</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-certification-cost</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-101</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-for-us-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-goes-beyond-a-ciso</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-compliance-strategies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-consulting</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-cookie-consent-requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-data-classification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-data-mapping</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-fines-penalties-us-eu-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-for-marketers</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/gdpr-risk-assesment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/seven-gdpr-principles</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/top-5-gdpr-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/gdpr/who-needs-gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/3-trends-cisos-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/5-steps-for-creating-secure-and-transparent-ai-systems-with-iso-42001</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/8-simple-steps-for-acing-your-nist-ai-rmf-implementation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/a-beginners-guide-to-cyber-asset-attack-surface-management-caasm</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/a-cfos-guide-to-governance-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/a-practical-guide-for-early-stage-ctos-navigating-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/ai-governance-operationalizing-trust</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/ai-in-the-trenches-insights-and-guidance-from-top-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/becoming-best-in-class-in-cloud-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/best-practices-for-automating-gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/boosting-efficiency-with-security-questionnaire-automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/building-security-programs-fast</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/caasm-a-must-for-a-cisos-tech-stack</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/cloud-security-101-challenges-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/creating-a-devsecops-culture-for-your-company</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/cybersecurity-checklist-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/decoding-indias-data-protection-bill-for-your-business</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/demystifying-the-jargons-a-cisos-guide-to-cybersecurity-tools</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/discover-the-top-grc-trends-in-2024</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/dora-steps-a-comprehensive-guide-to-the-digital-operational-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/effective-vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/enterprise-rfp-security-questionnaire</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/evaluating-compliance-automation-platforms-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/fast-track-compliance-audits</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/for-cisos-the-crucial-role-of-a-security-first-approach-in-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/forrester-the-governance-risk-and-compliance-platforms-landscape-q4-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/from-compliance-chaos-to-collaboration-the-tech-stack-reveal</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/grc-automation-playbook-for-engineering-teams-from-audit-fire-drills-to-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/grc-roi-guide-how-to-turn-compliance-into-revenue-growth</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/hipaa-security-rule-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/how-engineering-teams-swap-grc-tools-without-breaking-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/how-smart-founders-turn-compliance-into-a-growth-signal-before-their-investors-ask</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/implementing-dpdpa-a-step-by-step-guide-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/iso-iec-42001-readiness-checklist-for-compliance-managers-the-5-quickest-steps-to-certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/key-attack-surface-challenges-cloud-native-companies-are-facing-today</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/navigating-indias-digital-personal-data-protection-bill-2023-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/navigating-pci-dss-compliance-a-comprehensive-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/navigating-the-ai-boom-unlocking-roi-with-responsible-ai-and-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/navigating-the-ai-compliance-landscape</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/next-era-of-audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/on-demand-demo</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/respond-fast-respond-right-introducing-kai-your-control-co-pilot</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/responsibleai-beyond-innovation-into-accountability</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/risk-assessment-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/saas-platform-security-done-right</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/scrut-automations-soc-2-checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/security-best-practices-for-startup</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/security-on-a-budget-building-cyber-resilience-for-resource-constrained-teams</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/seven-focus-areas-to-navigate-the-eu-ai-act</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/soc-2-control-list</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/strengthening-the-chain-a-guide-to-mitigating-third-party-risks</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/tco-analysis-when-is-it-time-to-switch-your-grc-platform</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-complete-guide-to-risk-quantification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-crucial-role-of-a-security-first-approach-in-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-great-ai-regulation-road-trip-through-iso-42001-nist-ai-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-impact-of-ai-and-ml-on-modern-grc-solutions</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-rise-of-agentic-grc</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-role-of-the-cfo-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-state-of-compliance-quality</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-ultimate-guide-to-mastering-risk-management-for-fintech-companies</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/the-ultimate-soc-2-guide-for-startups</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/top-10-grc-and-ai-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/thank-you/unlocking-the-power-of-enterprise-risk-management</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/assessment</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/audit</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/automation</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/c3pao</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/certification</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/certification-cost</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/checklist</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/cmmc-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/cmmc-documents</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/cmmc-guide</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/cmmc-vs-nist-sp-800-171</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/controls</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/final-rule</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/importance</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/level-1</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/level-1-vs-level-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/level-2</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/level-3</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/levels</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/nist-sp-800-171</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/requirements</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/timelines</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/training</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/vs-fedramp</loc>
    </url>
    <url>
        <loc>https://www.scrut.io/hub/cmmc/who-needs-cmmc</loc>
    </url>
</urlset>