<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securedbyaigos.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securedbyaigos.com/securing-agentic-ai-the-2026-enterprise-blueprint-for-autonomous-agent-security/</loc>
		<lastmod>2026-05-09T15:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-9-logging-mechanisms-the-foundation-of-performance-security-and-compliance-visibility/</loc>
		<lastmod>2026-05-09T15:25:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-8-multimodal-guardrail-implementation-defence-beyond-text/</loc>
		<lastmod>2026-05-09T15:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-7-post-retrieval-filtering-and-re-ranking-safety-compliance-and-relevance-optimisation/</loc>
		<lastmod>2026-05-09T15:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-6-pre-retrieval-filters-and-query-transformation-security-and-relevance-before-search/</loc>
		<lastmod>2026-05-09T15:26:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-5-the-chunking-decision-why-content-structure-determines-retrieval-quality/</loc>
		<lastmod>2026-05-09T15:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-4-building-a-reliable-data-pipeline-ingestion-transformation-and-lineage/</loc>
		<lastmod>2026-05-09T15:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-3-vector-database-selection-search-algorithms-security-and-scalability/</loc>
		<lastmod>2026-05-09T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-2-choosing-the-right-model-performance-precision-and-legal-considerations/</loc>
		<lastmod>2026-05-09T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/rag-in-production-section-1-api-model-access-vs-self-hosted-the-decision-that-defines-your-security-posture/</loc>
		<lastmod>2026-05-09T15:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/advanced-production-rag-the-complete-enterprise-blueprint-for-performance-and-security/</loc>
		<lastmod>2026-05-09T15:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/securing-multimodal-vision-language-models-the-enterprise-blueprint-for-a-new-attack-surface/</loc>
		<lastmod>2026-05-09T15:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securedbyaigos.com/ai-audit-2023-a-blueprint-for-accountable-enterprise-ai-security-ethics-and-governance/</loc>
		<lastmod>2026-05-09T15:31:11+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->