<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://edera.dev</loc>
    </url>
    <url>
        <loc>https://edera.dev/contact</loc>
    </url>
    <url>
        <loc>https://edera.dev/press-events</loc>
    </url>
    <url>
        <loc>https://edera.dev/love</loc>
    </url>
    <url>
        <loc>https://edera.dev/edera-friends</loc>
    </url>
    <url>
        <loc>https://edera.dev/about</loc>
    </url>
    <url>
        <loc>https://edera.dev/careers</loc>
    </url>
    <url>
        <loc>https://edera.dev/privacy-policy</loc>
    </url>
    <url>
        <loc>https://edera.dev/software-license-agreement</loc>
    </url>
    <url>
        <loc>https://edera.dev/terms-of-service</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories</loc>
    </url>
    <url>
        <loc>https://edera.dev/gpus</loc>
    </url>
    <url>
        <loc>https://edera.dev/containers</loc>
    </url>
    <url>
        <loc>https://edera.dev/blog/what-is-that</loc>
    </url>
    <url>
        <loc>https://edera.dev/blog/confidential-computing-explained</loc>
    </url>
    <url>
        <loc>https://edera.dev/events</loc>
    </url>
    <url>
        <loc>https://edera.dev/edera-vs-kata</loc>
    </url>
    <url>
        <loc>https://edera.dev/edera-vs-gvisor</loc>
    </url>
    <url>
        <loc>https://edera.dev/edera-vs-firecracker</loc>
    </url>
    <url>
        <loc>https://edera.dev/use-case/multi-tenant-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/use-case/untrusted-code-execution</loc>
    </url>
    <url>
        <loc>https://edera.dev/use-case/ai-agent-sandboxing</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/120-seconds-with-joe-beda</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/120-seconds-with-kim-scott</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/120-seconds-with-new-edera-board-advisor-rob-gil</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/120-seconds-with-stephen-augustus</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/2024-vulnerability-exploitation-trends-moving-beyond-whack-a-mole-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/7-critical-nvidia-gpu-vulnerabilities-expose-ai-systems-protect-your-infrastructure-now</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/ai-security-starts-with-infrastructure-not-tools</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/announcing-edera-protect-1-0-now-generally-available</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/apple-just-validated-hypervisor-isolated-containers-heres-what-that-means</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/apples-private-cloud-compute-vs-confidential-computing</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/beyond-namespaces-real-isolation-for-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/containers-that-actually-contain-a-new-era-in-kubernetes-trust-boundaries</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/context-changes-everything-how-edera-transforms-container-security-alerts-from-panic-to-precision</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/crackarmor-when-linux-armor-quietly-cracked</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/critical-nvidia-container-toolkit-vulnerability-highlights-the-need-for-strong-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/cve-2026-24834-when-trusting-the-guest-goes-wrong</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/cybersecurity-awareness-month-start-secure-and-stay-secure-with-edera</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/cybersecurity-industrys-vulnerability-why-psychological-safety-matters</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/defining-container-isolation-for-the-multi-tenant-cloud-era</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/demystifying-confidential-computing</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-and-confidential-computing-stronger-together</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-at-kubecon-cloudnativecon-north-america-2025</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-at-the-edge-running-untrusted-workloads-on-kernels-you-cannot-fix</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-brings-production-grade-workload-isolation-to-federal-market</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-falco-for-cloud-native-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-joins-cncf-linux-foundation-and-heads-to-kubecon-cloudnativecon-london</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-makes-running-privileged-containers-safe-and-secure-by-default</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-makes-the-cisa-secure-by-design-pledge</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-raises-5m-seed-round</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-reduces-the-hypervisor-attack-surface-with-rust-and-xen</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-restores-security-benefits-for-linux-application-memory-safety-with-openpax</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/edera-supports-ebpf</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/escaping-the-container-status-quo</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/faster-than-runc-benchmarking-edera-on-amazon-eks</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/finally-a-container-runtime-built-for-highly-regulated-systems</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/finding-xen-in-the-chaos-ederas-isolation-makes-chaotic-deputy-irrelevant</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/future-proofing-ai-infrastructure-lessons-from-past-mistakes</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/gpu-runtime-security-why-ai-clouds-are-flying-blind</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/hardened-runtime-standard-for-ai-and-app-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/hardened-runtime-the-new-security-perimeter-for-ai-cloud</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/have-your-cake-and-eat-it-strong-isolation-while-reducing-cloud-spend</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/how-edera-eliminates-cve-2025-23266-container-escapes</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/i-looked-at-the-gpu-stack-at-kubecon-and-now-i-cant-sleep</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/icymi-edera-seed-funding-for-the-worlds-only-secure-by-design-kubernetes-and-ai-solution</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/introducing-edera-for-gpus-and-the-era-of-continuous-compute-delivery</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/kata-vs-firecracker-vs-gvisor-isolation-compared</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/kubecon-north-america-2025-a-decade-in-its-time-to-rebuild-the-foundations</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/kubernetes-dirty-secret-why-youre-burning-cash-on-containers</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/kvm-support-is-coming-to-edera</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/mcp-security-risks-why-ai-infrastructure-needs-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/mcp-vulnerability-exposes-ai-dev-security-gaps</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/mind-the-gap-how-edera-accelerates-confidential-computing</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/minimal-is-no-longer-enough-why-ai-scale-vulnerability-discovery-changes-container-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/new-container-security-tool-tells-devops-and-platform-engineers-if-theyre-protected-against-escapes</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/new-functionality-comes-to-ederas-open-source-sandboxing-tool-styrolite</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/open-standards-and-zero-trust-on-commodity-hardware</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/pawsitivity-daisy</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/pawsitivity-pal-cedar-sunbeam</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/performant-isolation-for-secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/product-update-now-on-azure-linux-plus-bare-metal-ai-performance-and-deeper-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/remote-attestation-in-confidential-computing-explained</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/rendering-oci-images-the-right-way-introducing-ocirender</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/rethinking-ai-hypervisors-for-modern-ml-workloads-lessons-from-the-guillotine-paper</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/runtime-security-beyond-hardened-containers</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/rust-or-bust-our-rewrite-of-the-xen-control-plane</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/sandboxchanged-errors-when-systemd-and-container-runtimes-fight-over-kubernetes-pods</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/securing-agentic-ai-systems-with-hardened-runtime-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/security-built-into-our-dna-how-edera-achieves-enterprise-grade-protection</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/security-without-sacrifice-edera-performance-benchmarking</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/series-a</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/showing-up-matters-reflections-on-pride-allyship-and-community</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/sovereign-ai-how-workload-identity-solves-data-sovereignty-challenges</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/spring-cleaning-what-community-gardening-has-taught-me-about-open-source-maintainership</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/sprout-the-rust-powered-open-source-bootloader-for-the-cloud-native-era</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/styrolite</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/tarmageddon</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-ai-grid-is-coming-to-cell-sites-so-are-the-attackers</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-end-of-detection-based-security-why-prevention-wins</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-openclaw-pair-approve-vulnerability-explained</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-price-of-a-zero-day-vulnerability-is-an-api-call</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-principle-of-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-problems-of-legacy-code</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-rce-cipe-for-platform-security-isolation-without-compromise</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/the-shared-kernel-is-the-real-problem-in-container-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/two-years-building-the-sandbox-everyone-suddenly-needs-for-ai</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/two-years-of-edera</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/user-namespaces-are-not-a-security-boundary</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/we-have-always-been-here-celebrating-lgbtq-icons-from-tech-history</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/were-isolating-kubernetes</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-ai-agent-sandboxing-means-for-production-infrastructure</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-every-cloud-native-engineer-needs-to-know-about-kernel-memory</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-is-an-ai-agent-from-chatbots-to-autonomous-systems</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-is-an-ai-agent-sandbox</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-is-confidential-computing</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-the-f-ck-is-a-hardened-runtime-the-future-of-container-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-the-f-ck-is-a-zone-secure-container-isolation-with-edera</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-the-f-ck-is-container-isolation-security-in-kubernetes-beyond</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-the-f-ck-is-multitenancy-secure-efficient-containers-explained</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-the-f-ck-is-paravirtualization</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/what-we-wish-we-knew-about-container-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/when-attackers-blend-in-why-visibility-isnt-containment</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/when-virtual-doesnt-mean-secure-the-false-promise-of-namespace-based-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/who-gives-a-soc-2-the-truth-about-soc-2-security-theater</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/why-cloud-data-warehouses-must-run-untrusted-code-in-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/why-container-isolation-isnt-optional-lessons-from-redishell</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/why-edera-built-on-xen-a-secure-container-foundation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/why-gpus-are-the-weak-link-in-ai-security</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/why-hybrid-clouds-are-making-a-comeback-with-ai-infrastructure</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/xen-vs-kvm-why-xen-offers-superior-security-in-virtualization</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/yolo-mode-for-ai-agents-without-the-yolo-running-claude-code-with-kernel-isolation</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/your-laptop-is-not-a-build-system</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/your-monitoring-stack-just-became-a-rce-vector-a-deep-dive-into-the-kubernetes-nodes-proxy-rce</loc>
    </url>
    <url>
        <loc>https://edera.dev/stories/your-pods-kernel-has-better-metrics-than-your-monitoring-stack</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/alex-zenla</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/alexander-merritt</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/ann-wallace</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/ariadne-conill</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/dan-fernandez</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/edera-team</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/emily-long</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/james-petersen</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/jed-salazar</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/kavi-daula</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/kaylin-trychon</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/lewis-denham-parry</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/marina-moore</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/steven-noonan</loc>
    </url>
    <url>
        <loc>https://edera.dev/authors/theo-pavlich</loc>
    </url>
</urlset>