<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/downloads/design-secure-software-first-line-code/</loc>
		<lastmod>2018-05-22T00:12:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Design-Secure-Software-from-First-Line-of-Code-WhiteHat.png</image:loc>
			<image:title><![CDATA[Design Secure Software from First Line of Code - WhiteHat]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Design-Secure-Software-from-First-Line-of-Code-WhiteHat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/securing-sdl-dummies/</loc>
		<lastmod>2018-06-11T18:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Securing-the-SDLC-for-Dummies-WhiteHat-Security.png</image:loc>
			<image:title><![CDATA[Securing the SDLC for Dummies - WhiteHat Security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Securing-the-SDLC-for-Dummies-WhiteHat-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/art-application-security/</loc>
		<lastmod>2018-06-11T19:29:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/The-Art-of-Application-Security-WhiteHat-Security.png</image:loc>
			<image:title><![CDATA[The Art of Application Security - WhiteHat Security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/The-Art-of-Application-Security-WhiteHat-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/2017-application-security-statistics-report/</loc>
		<lastmod>2018-06-11T19:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/2017-Application-Security-Statistics-Report-WhiteHat-Security.png</image:loc>
			<image:title><![CDATA[2017 Application Security Statistics Report - WhiteHat Security]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/2017-Application-Security-Statistics-Report-WhiteHat-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/developers-guide-devsecops-galaxy/</loc>
		<lastmod>2018-06-11T19:47:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/DeveloperGuide1.jpg</image:loc>
			<image:title><![CDATA[DeveloperGuide1]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/developerguidecover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/5-principles-securing-devops/</loc>
		<lastmod>2018-06-11T19:57:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/veracode5.png</image:loc>
			<image:title><![CDATA[veracode5]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/veracode4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/gartner-devsecops-seamlessly-integrate-security-devops/</loc>
		<lastmod>2018-06-11T20:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Capture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/15-tips-run-time-container-security-strategy/</loc>
		<lastmod>2018-06-12T15:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/RunTimeContainerSecurityGuide.jpg</image:loc>
			<image:title><![CDATA[RunTimeContainerSecurityGuide]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/RunTimeContainerSecurityGuide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/securely-configure-linux-host-run-containers/</loc>
		<lastmod>2018-06-13T22:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/HowToSecurelyConfigure.jpg</image:loc>
			<image:title><![CDATA[HowToSecurelyConfigure]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/HowToSecurelyConfigure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/dont-let-security-put-brakes-devops/</loc>
		<lastmod>2018-06-14T00:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Brakes.jpg</image:loc>
			<image:title><![CDATA[Brakes]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/halocover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/devsecops-approach-securing-code-cloud/</loc>
		<lastmod>2018-06-14T00:46:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/DevSecOps.jpg</image:loc>
			<image:title><![CDATA[DevSecOps]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/sanscover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/new-approach-securing-devops-environments-cloud/</loc>
		<lastmod>2018-06-14T00:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/NewApproach.jpg</image:loc>
			<image:title><![CDATA[NewApproach]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/newapproachcover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/achieve-continuous-container-security/</loc>
		<lastmod>2018-06-14T01:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/08/HowToAchieveContinuous.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/2018-year-ahead/</loc>
		<lastmod>2018-07-05T13:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Screen-Shot-2018-02-22-at-10.27.08-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-state-of-security-rsa-special-report/</loc>
		<lastmod>2018-07-10T16:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/StateOfSecurity.jpg</image:loc>
			<image:title><![CDATA[StateOfSecurity]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/StateOfSecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/mastering-hybrid-cloud-security/</loc>
		<lastmod>2018-07-10T16:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/MasteringHybridCloud.jpg</image:loc>
			<image:title><![CDATA[MasteringHybridCloud]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/MasteringHybridCloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-four-current-threats-enterprises-cant-ignore/</loc>
		<lastmod>2018-07-16T22:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/The-Four-Current-Threats-Enterprises-Can%E2%80%99t-Ignore.png</image:loc>
			<image:title><![CDATA[The Four Current Threats Enterprises Can’t Ignore]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/The-Four-Current-Threats-Enterprises-Can%E2%80%99t-Ignore.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/mastering-machine-learning-for-security-professionals/</loc>
		<lastmod>2018-07-27T17:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Mastering-Machine-Learning-for-Security-Professionals.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-complete-guide-on-open-source-security/</loc>
		<lastmod>2018-08-07T16:52:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/OpenSourceSecurity.jpg</image:loc>
			<image:title><![CDATA[OpenSourceSecurity]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/OpenSourceSecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/main-application-security-technologies-adopt-2018/</loc>
		<lastmod>2018-08-07T16:57:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/MainAppSecurityTech.jpg</image:loc>
			<image:title><![CDATA[MainAppSecurityTech]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/MainAppSecurityTech.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/7-facts-every-ciso-needs-to-know-about-open-source-security/</loc>
		<lastmod>2018-08-07T16:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/7factsbig.jpg</image:loc>
			<image:title><![CDATA[7factsbig]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/7factsbig-200x266.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/forresters-report-the-state-of-application-security-2018-beyond/</loc>
		<lastmod>2018-08-07T17:07:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/forrestercover.jpg</image:loc>
			<image:title><![CDATA[forrestercover]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/forrestercover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/a-hindsight-look-at-the-equifax-breach/</loc>
		<lastmod>2018-08-20T12:08:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/LessonsLearned-1.jpg</image:loc>
			<image:title><![CDATA[LessonsLearned-1]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/LessonsLearned-1-266x266.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/ciso-security-vendor-relationship-primer/</loc>
		<lastmod>2018-09-04T20:31:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/CISO-Security-vendor-primer--e1536083142952.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/buyers-guide-to-evaluating-fraud-detection-tools/</loc>
		<lastmod>2018-10-04T17:21:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Capture.jpg</image:loc>
			<image:title><![CDATA[Capture]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Capture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/securing-the-code-devops-security-and-appsec/</loc>
		<lastmod>2018-10-04T17:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ebook-securing-the-code.png</image:loc>
			<image:caption><![CDATA[Securing the Code: DevOps Security and AppSec]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/mobile-to-mainframe-the-definitive-guide-to-achieving-compliance/</loc>
		<lastmod>2018-10-25T17:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Screen-Shot-2018-10-25-at-12.53.23-PM.png</image:loc>
			<image:caption><![CDATA[Mobile-to-Mainframe: The Definitive Guide to Achieving Compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/seeing-red-understanding-red-team-security/</loc>
		<lastmod>2018-10-25T17:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Screen-Shot-2018-10-25-at-11.31.29-AM.png</image:loc>
			<image:caption><![CDATA[Seeing Red: Understanding Red Team Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/451-research-securing-open-source/</loc>
		<lastmod>2018-11-12T13:16:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Screen-Shot-2018-10-09-at-3.37.35-PM.png</image:loc>
			<image:caption><![CDATA[451 Research: Securing Open Source]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/cloud-security-from-start-point-to-end-point/</loc>
		<lastmod>2019-01-10T18:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Screen-Shot-2018-11-28-at-11.32.39-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/next-generation-cybersecurity/</loc>
		<lastmod>2019-02-07T13:51:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Screen-Shot-2019-01-28-at-9.36.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/7-reasons-why-cisos-should-care-about-devsecops/</loc>
		<lastmod>2019-02-07T15:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/CISO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/container-security-securing-from-within/</loc>
		<lastmod>2019-04-01T14:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Screen-Shot-2019-03-31-at-10.00.28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/q1-2019-report-email-fraud-identity-deception-trends/</loc>
		<lastmod>2019-04-01T15:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Q12019_Hubspot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/forrester-the-state-of-application-security-2019/</loc>
		<lastmod>2019-04-15T00:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/The-State-Of-Application-Security-2019-Forrester_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-devops-roadmap-for-security/</loc>
		<lastmod>2019-04-18T01:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/SigSci-DevOps_Roadmap_For_Security_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/modern-applications-and-architectures-demand-a-new-web-application-firewall/</loc>
		<lastmod>2019-04-18T01:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/signal-sciences-whitepaper-modern-applications-architectures-waf_Page_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/speed-and-scale-how-machine-identity-protection-is-crucial-for-digital-transformation-and-devops/</loc>
		<lastmod>2019-04-24T16:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Venafi-WP-DevOps-1904-Final_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/doing-identity-access-right/</loc>
		<lastmod>2019-05-07T18:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Core-Security-Doing-Identity-Access-Right_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/guide-to-successful-penetration-testing/</loc>
		<lastmod>2019-05-08T02:25:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Untitled-2-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-second-wave-of-it-security/</loc>
		<lastmod>2019-05-14T14:19:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/0519_ITSecurityLeaders_SB_F_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-state-of-devsecops/</loc>
		<lastmod>2019-06-24T17:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/State-of-DevSecOps_Page_01.jpg</image:loc>
			<image:title><![CDATA[State of DevSecOps_Page_01]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/State-of-DevSecOps_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/how-to-identify-compromised-devices-with-certainty/</loc>
		<lastmod>2019-07-10T15:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/How-to-Identify_Page_01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/how-to-manage-sap-user-accounts/</loc>
		<lastmod>2019-07-10T15:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/how-to-manage-sap-user-accounts-and-access-rights-with-identity-manager-white-paper-27079_Page_01.jpg</image:loc>
			<image:title><![CDATA[how-to-manage-sap-user-accounts-and-access-rights-with-identity-manager-white-paper-27079_Page_01]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/how-to-manage-sap-user-accounts-and-access-rights-with-identity-manager-white-paper-27079_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/sap-customer-stories/</loc>
		<lastmod>2019-07-10T15:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/sap-customer-ebook-ebook.png</image:loc>
			<image:title><![CDATA[sap-customer-ebook-ebook]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/sap-customer-ebook-ebook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/security-challenges-in-the-cloud/</loc>
		<lastmod>2019-07-26T16:31:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Security-Challenges-in-the-Cloud.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Cloud-Pic-Infographic-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/container-security-101/</loc>
		<lastmod>2019-07-26T16:44:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Container-Security-101-Ebook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Pic-Infographic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-next-generation-of-application-security/</loc>
		<lastmod>2019-09-24T13:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/0919_AppSecurity_SB_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/what-are-the-most-secure-programming-languages/</loc>
		<lastmod>2019-09-25T17:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/What-are-the-most-secure-programming-languages_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-forrester-wave-software-composition-analysis-2019/</loc>
		<lastmod>2019-09-25T17:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/The-Forrester-Wave-Software-Composition-2019_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/open-source-security/</loc>
		<lastmod>2019-10-18T14:37:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/1019_SB_OpenSourceSecurity_v2_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/sans-2019-threat-hunting-survey/</loc>
		<lastmod>2019-11-13T15:53:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/CTA-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/open-and-dark-web-research/</loc>
		<lastmod>2019-11-14T15:10:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/Intel-Booklet-20191029_FINAL_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/overcoming-my-mistakes-in-the-hunt-for-threat-intelligence/</loc>
		<lastmod>2019-12-04T20:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/OvercomingMyMistakes-20191030_FINAL_Page_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/cloud-security-keeping-serverless-data-safe/</loc>
		<lastmod>2019-12-10T15:18:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/1219_SB_CloudSecurityServerlessDataSafe_v2_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/deploying-devsecops-with-scalability-in-mind/</loc>
		<lastmod>2019-12-26T03:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/12/1219_SB_DevSecOpsScalability_v2_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/how-your-vendor-access-management-tools-are-putting-your-company-at-risk/</loc>
		<lastmod>2020-02-11T22:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/SecureLink-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/7-must-read-ebooks-for-security-professionals/</loc>
		<lastmod>2020-02-14T22:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Must-Read-Cybersecurity-eBooks-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-bot-problem/</loc>
		<lastmod>2020-02-20T19:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/signal-sciences-the-bot-problem-ebook_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/identifying-web-attack-indicators/</loc>
		<lastmod>2020-02-26T19:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/SigSci-Identifying-Web-Attack-Cover-v6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/build-a-world-class-security-champion-program/</loc>
		<lastmod>2020-03-02T18:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/NextLevelDevSecOps_RSA_digital_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-2020-state-of-compliance-and-security-testing-report/</loc>
		<lastmod>2020-03-06T17:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/SYNACK-2020_state_compliance_security_report_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/trust-at-scale-2019-trust-report-in-practice/</loc>
		<lastmod>2020-03-06T17:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/SYNACK-trust_report_in_practice_v2_Page_01-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/augmenting-security-the-right-way-with-dominos/</loc>
		<lastmod>2020-03-07T22:58:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-dangers-of-open-source-software/</loc>
		<lastmod>2020-03-23T16:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/0320_SB_OpenSourceDangers_v1_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/software-composition-analysis-how-to-choose-the-right-solution/</loc>
		<lastmod>2020-04-02T22:03:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/Software-Composition-Analysis_-How-to-Choose-the-Right-Solution-7_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-forrester-new-wave-bot-management-q1-2020/</loc>
		<lastmod>2020-06-17T19:03:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/The-Forrester-New-Wave%E2%84%A2_-Bot-Management-Q1-2020_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/live-magecart-attack-demo/</loc>
		<lastmod>2020-06-22T15:24:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Magecart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/vulnerability-prioritization-through-the-eyes-of-hackers/</loc>
		<lastmod>2020-06-25T02:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Vulnerability-Prioritization-Through-the-Eyes-of-Hackers_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/essential-elements-of-a-penetration-test/</loc>
		<lastmod>2020-06-26T05:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Essential-Elements-of-a-Penetration-Test_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/rain-financial-case-study/</loc>
		<lastmod>2020-07-01T13:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Rain-Financial-Case-Study_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/synack-ciso-podcast-series-action-in-unprecedented-times/</loc>
		<lastmod>2020-07-01T16:29:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Synack-CISO-Podcast-Series_Action-in-Unprecedented-Times_cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-state-of-cloud-native-security-2020/</loc>
		<lastmod>2020-07-08T17:53:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/State-of-Cloud-Native-Security-2020_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-continuum-of-cloud-native-topologies/</loc>
		<lastmod>2020-07-08T17:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/continuum-cloud-native-topologies_Page_1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/container-security-101-2/</loc>
		<lastmod>2020-07-08T17:57:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/prisma-container-security101-1_Page_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-business-case-for-cloud-threat-defense/</loc>
		<lastmod>2020-07-08T17:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/business-case-for-cloud-threat-defense_Page_1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/unit-42-cloud-threat-report-spring-2020/</loc>
		<lastmod>2020-07-08T17:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/cloud-threat-report-spring-2020_Page_01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/why-zero-trust-should-be-at-the-forefront-of-your-iam-strategy/</loc>
		<lastmod>2020-07-14T14:45:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Zero-Trust-at-the-forefront-of-IAM_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/key-steps-in-satisfying-your-ccpa-and-other-privacy-obligations-2/</loc>
		<lastmod>2020-07-31T15:26:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Key-Steps-in-Satisfying-Your-CCPA-and-Other-Privacy-Obligations_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-buyers-guide-to-penetration-testing-vendor-checklist/</loc>
		<lastmod>2020-08-08T07:46:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/The-Buyers-Guide-to-Penetration-Testing-Checklist_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-buyers-guide-to-penetration-testing/</loc>
		<lastmod>2020-08-11T02:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/The-Buyers-Guide-to-Penetration-Testing_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/multi-cloud-data-security/</loc>
		<lastmod>2020-08-11T06:17:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Multi-Cloud-Data-Security_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/everything-you-need-to-know-about-cyber-threats/</loc>
		<lastmod>2020-08-19T04:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Everything-You-Need-to-Know-About-Cyber-Threats_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/threat-attack-surface-intelligence-asi/</loc>
		<lastmod>2020-08-19T04:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Threat-and-ASI-White-Paper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/enough-with-the-data-already/</loc>
		<lastmod>2020-08-19T05:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Enough-With-the-Data-Already_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/what-makes-intelligence-actionable-and-worth-your-time/</loc>
		<lastmod>2020-08-19T05:44:14+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/What-Makes-Intelligence-Actionable-and-Worth-Your-Time_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/threat-attack-surface-intelligence-asi-resolution-brief/</loc>
		<lastmod>2020-08-19T06:09:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Threat-and-ASI-Resolution-Brief_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/a-comprehensive-guide-to-building-a-pentest-program/</loc>
		<lastmod>2020-08-27T20:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Guide-to-Building-a-Pentest-Program_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/pentest-as-a-service-impact-report-2020/</loc>
		<lastmod>2020-08-27T21:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/PTaaS-Impact-Report-2020_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/tackling-the-3-biggest-api-security-challenges-in-real-world-deployments/</loc>
		<lastmod>2020-08-28T14:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/Tackling-the-3-Biggest-API-Security-Challenges_cover.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/from-monolithic-to-modern-the-imperative-for-flexible-web-app-and-api-protection-everywhere/</loc>
		<lastmod>2020-09-09T21:10:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/From-Monolithic-to-Modern_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/candid-cliff-notes-how-to-select-the-right-pentest/</loc>
		<lastmod>2020-09-16T15:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Covers-06-3.png</image:loc>
			<image:caption><![CDATA[How to Select the Right Pentest]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/managing-the-appsec-toolstack/</loc>
		<lastmod>2020-09-21T16:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/Managing-the-AppSec-ToolStack_cover-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/how-the-new-covid-19-normal-will-accelerate-the-shift-from-tokens-to-digital-certificates/</loc>
		<lastmod>2020-10-05T16:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Covers-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/enterprise-ssl-solutions-a-buyers-guide/</loc>
		<lastmod>2020-10-05T16:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Covers-07-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/cisco-tetration-securing-all-phases-of-the-hybrid-cloud-journey/</loc>
		<lastmod>2020-10-13T05:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/Cisco-Tetration_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/the-cloud-has-evolved-are-your-security-tools-keeping-pace/</loc>
		<lastmod>2020-11-11T21:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/Cloud-Has-Evolved_cover.jpg</image:loc>
			<image:title><![CDATA[Cloud Has Evolved_cover]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/Cloud-Has-Evolved_cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/downloads/top-ways-your-cloud-security-approach-is-burning-cash/</loc>
		<lastmod>2020-11-11T21:44:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/Top-Ways-Your-Cloud-Security-Approach-is-Burning-Cash-01.png</image:loc>
			<image:title><![CDATA[Top Ways Your Cloud Security Approach is Burning Cash-01]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/Top-Ways-Your-Cloud-Security-Approach-is-Burning-Cash-01.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->