<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/sbn/</loc>
		<lastmod>2020-12-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/taking-down-gooligan-part-1-overview/</loc>
		<lastmod>2018-03-10T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/taking-down-gooligan-part-2-inner-workings/</loc>
		<lastmod>2018-03-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/taking-down-gooligan-part-3-monetization-and-clean-up/</loc>
		<lastmod>2018-03-25T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/08/has-storage-and-server-encryption-kept-pace-with-modern-it-to-adequately-reduce-risk/</loc>
		<lastmod>2017-08-01T17:36:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/09/aqua-security-raises-25-million-drive-expansion-container-security-platform/</loc>
		<lastmod>2017-09-19T15:57:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/10/digital-defense-inc-tag-cyber-launch-new-tool-measure-maturity-organizations-vulnerability-management-programs/</loc>
		<lastmod>2017-10-04T15:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/12/swiftstack-6-delivers-industrys-first-multi-cloud-data-management-solution-universal-access-single-namespace/</loc>
		<lastmod>2017-12-06T04:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/cybersecurity-past-and-future-whats-come-this-year-and-what-is-coming/</loc>
		<lastmod>2018-01-03T06:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/how-financial-services-firms-can-protect-against-ddos-attacks/</loc>
		<lastmod>2018-01-04T14:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/prevalent-threats-targeting-cuckoo-sandbox-detection-and-our-mitigation/</loc>
		<lastmod>2018-01-04T14:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/addressing-three-major-pain-points-of-the-cybersecurity-skills-gap/</loc>
		<lastmod>2018-01-04T14:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/batten-down-the-hatches-semafonepredicts-new-onslaught-of-cyber-attacks-in-2018/</loc>
		<lastmod>2018-01-04T16:17:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/a-security-fabric-for-digital-age-healthcare-a-preview-of-himss-2018/</loc>
		<lastmod>2018-01-05T22:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/fortinet-advisory-on-new-spectre-and-meltdown-vulnerabilities/</loc>
		<lastmod>2018-01-05T22:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/bankless-times-features-semafones-2018-predictions/</loc>
		<lastmod>2018-01-08T20:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/contact-management-on-semafones-prediction-of-increase-in-cyberattacks-in-2018/</loc>
		<lastmod>2018-01-08T21:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/fortinet-security-fabric-earns-nss-recommendation-for-breach-prevention/</loc>
		<lastmod>2018-01-09T03:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/executive-insights-viewing-gdpr-as-an-opportunity-to-drive-competitive-advantage-and-create-digital-trust/</loc>
		<lastmod>2018-01-09T03:33:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/mitigating-vulnerabilities-in-your-customers-security-protocol-with-a-cyber-threat-assessment/</loc>
		<lastmod>2018-01-10T17:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/executive-insights-connected-cars-a-view-into-securing-converged-networks/</loc>
		<lastmod>2018-01-10T17:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/do-you-want-an-sd-wan-with-basic-security-or-robust-secure-sd-wan/</loc>
		<lastmod>2018-01-12T04:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/score-an-a-in-cybersecurity-using-a-5-point-checklist/</loc>
		<lastmod>2018-01-13T12:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/an-analysis-of-the-openssl-ssl-handshake-error-state-security-bypass-cve-2017-3737/</loc>
		<lastmod>2018-01-13T12:51:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/dr-strangepatch-or-how-i-learned-to-stop-worrying-about-meltdown-and-spectre-and-love-security-advisory-adv180002/</loc>
		<lastmod>2018-01-13T12:51:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/are-you-ready-for-the-evolution-of-ransomware/</loc>
		<lastmod>2018-01-16T13:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/growth-opportunities-for-partners-at-accelerate-2018/</loc>
		<lastmod>2018-01-16T13:02:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/into-the-implementation-of-spectre/</loc>
		<lastmod>2018-01-17T22:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/prioritizing-your-security-where-do-you-begin/</loc>
		<lastmod>2018-01-17T22:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/shipserv-uses-fortinet-security-tools-to-assist-its-move-to-the-cloud/</loc>
		<lastmod>2018-01-17T22:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/fortinet-certified-by-icsa-for-advanced-threat-defense/</loc>
		<lastmod>2018-01-17T22:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/executive-insights-if-it-is-not-seamless-it-is-not-secure/</loc>
		<lastmod>2018-01-19T07:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/security-research-news-in-brief-november-2017-edition/</loc>
		<lastmod>2018-01-19T07:39:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/why-securing-fintech-is-necessary-for-financial-startups-and-industry-leaders/</loc>
		<lastmod>2018-01-20T18:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/5-steps-to-enable-you-to-stare-back-in-the-face-of-inevitable-compromise/</loc>
		<lastmod>2018-01-23T09:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/spritecoin-another-new-cryptocurrencyor-not/</loc>
		<lastmod>2018-01-23T09:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/align-your-customers-business-needs-with-security-functionality/</loc>
		<lastmod>2018-01-24T22:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/raising-the-bar-on-cybersecurity-awareness-at-mobile-world-congress/</loc>
		<lastmod>2018-01-24T22:44:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/fortinet-takes-insurance-giant-icare-to-the-cloud/</loc>
		<lastmod>2018-01-24T22:44:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/iot-botnet-more-targets-in-okirus-cross-hairs/</loc>
		<lastmod>2018-01-26T08:44:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/a-deep-dive-analysis-of-microsofts-kernel-virtual-address-shadow-feature/</loc>
		<lastmod>2018-01-26T08:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/unified-threat-management-for-higher-education/</loc>
		<lastmod>2018-01-26T08:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/considerations-for-securing-medical-research-in-the-cloud/</loc>
		<lastmod>2018-01-27T17:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/fortiguard-labs-discovers-vulnerability-in-asus-router/</loc>
		<lastmod>2018-01-30T20:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/meltdown-spectre-update/</loc>
		<lastmod>2018-01-30T20:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/why-the-fortinet-security-fabric-is-the-secret-sauce-for-managed-security-services-providers/</loc>
		<lastmod>2018-01-30T20:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/preparing-for-mandatory-notifiable-data-breach-legislation-part-1/</loc>
		<lastmod>2018-01-30T20:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/for-a-moonshot-you-need-more-than-just-the-moon/</loc>
		<lastmod>2018-01-30T20:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/nine-top-priority-cybersecurity-threats-active-in-the-education-sector-today-and-why-everyone-should-care/</loc>
		<lastmod>2018-02-01T12:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/satori-adds-known-exploit-chain-to-enslave-wireless-ip-cameras/</loc>
		<lastmod>2018-02-02T21:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-risks-of-shadow-it-at-financial-services-firms/</loc>
		<lastmod>2018-02-02T21:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fortinet-security-on-the-google-cloud-platform-the-future-is-multi-cloud/</loc>
		<lastmod>2018-02-05T20:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/innovation-insights-the-industrys-fastest-100-gbps-next-generation-firewall-appliance/</loc>
		<lastmod>2018-02-05T20:15:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/security-against-the-invisible-enemy-preparing-for-the-mandatory-notifiable-data-breach-scheme-part-2/</loc>
		<lastmod>2018-02-05T20:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fostering-collaboration-and-intelligence-sharing-at-accelerate-2018/</loc>
		<lastmod>2018-02-07T03:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/multi-risks-in-the-multi-cloud-an-industry-perspective/</loc>
		<lastmod>2018-02-08T11:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-growing-trend-of-coin-miner-javascript-infection/</loc>
		<lastmod>2018-02-08T11:27:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fortinet-highlights-agile-security-at-mobile-world-congress/</loc>
		<lastmod>2018-02-08T11:27:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-automation-and-ai-improve-healthcare-cybersecurity/</loc>
		<lastmod>2018-02-09T18:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/unsecured-at-any-speed-the-cyber-risks-of-the-connected-car/</loc>
		<lastmod>2018-02-09T18:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/executive-insights-patchwork-security-makes-us-all-less-safe/</loc>
		<lastmod>2018-02-12T17:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fortinet-covers-industrial-operation-technology-and-internets-of-things-security-at-mobile-world-congress/</loc>
		<lastmod>2018-02-12T17:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/on-the-road-with-the-microsoft-tech-summit-in-europe/</loc>
		<lastmod>2018-02-14T01:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/executive-insights-securing-the-next-generation-of-digital-transformation/</loc>
		<lastmod>2018-02-14T01:32:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fortinet-named-a-2018-gartner-peer-insights-customers-choice-for-enterprise-network-firewall/</loc>
		<lastmod>2018-02-14T01:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cybersecurity-for-the-fourth-industrial-revolution/</loc>
		<lastmod>2018-02-14T01:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/using-mssps-to-secure-sd-wan/</loc>
		<lastmod>2018-02-15T09:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/just-behave-already-property-testing/</loc>
		<lastmod>2018-02-16T18:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/new-jrat-adwind-variant-being-spread-with-package-delivery-scam/</loc>
		<lastmod>2018-02-17T00:57:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/securing-sd-wan-in-distributed-healthcare-environments/</loc>
		<lastmod>2018-02-17T00:57:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/effectiveness-performance-and-value-the-role-of-third-party-security-testing/</loc>
		<lastmod>2018-02-17T00:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/executive-insights-winning-the-digital-transformation-cyberwar/</loc>
		<lastmod>2018-02-17T00:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/executive-insights-surviving-your-digital-transformation/</loc>
		<lastmod>2018-02-20T00:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fortinet-doubles-down-on-mobile-core-security-and-managed-security-services-at-mobile-world-congress/</loc>
		<lastmod>2018-02-20T00:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/steganography-combatting-threats-hiding-in-plain-sight/</loc>
		<lastmod>2018-02-21T16:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-connected-campus-digital-transformation-in-education/</loc>
		<lastmod>2018-02-21T16:15:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/swarming-iot-attacks-cryptojacking-and-ransomware-drive-dramatic-spike-in-malware/</loc>
		<lastmod>2018-02-21T16:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/securing-the-network-what-three-key-verticals-require/</loc>
		<lastmod>2018-02-23T04:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/omg-mirai-based-bot-turns-iot-devices-into-proxy-servers/</loc>
		<lastmod>2018-02-23T04:27:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/rise-of-the-hivenet-botnets-that-think-for-themselves/</loc>
		<lastmod>2018-02-23T04:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/ndc-security-2018-erlend-oftedals-beyond-the-owasp-top-10-modern-web-application-bugs/</loc>
		<lastmod>2018-02-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/avzhan-ddos-bot-dropped-by-chinese-drive-by-attack/</loc>
		<lastmod>2018-02-23T19:27:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/sha-1-versus-sha-2-performance-tests/</loc>
		<lastmod>2018-02-23T19:37:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/avien-resource-page-updates-23rd-february-2018/</loc>
		<lastmod>2018-02-23T19:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/vmware-intends-to-buy-cloudvelox/</loc>
		<lastmod>2018-02-23T21:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/secure-enclaves-now-on-aws-marketplace/</loc>
		<lastmod>2018-02-23T21:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/xkcd-the-simpsons/</loc>
		<lastmod>2018-02-23T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cloud-security-this-week-february-23-2018/</loc>
		<lastmod>2018-02-23T22:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/friday-squid-blogging-the-symbiotic-relationship-between-the-bobtail-squid-and-a-particular-microbe/</loc>
		<lastmod>2018-02-23T22:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-make-pci-compliance-a-little-easier-for-everyone/</loc>
		<lastmod>2018-02-23T22:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/opensnitch-the-gnu-linux-port-of-application-firewall-little-snitch/</loc>
		<lastmod>2018-02-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/long-now-foundations-clock-of-the-long-now-installation-begins/</loc>
		<lastmod>2018-02-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/jeff-koterbas-the-torch-of-truth/</loc>
		<lastmod>2018-02-24T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/anatomy-of-a-russian-information-warfare-campaign/</loc>
		<lastmod>2018-02-25T12:18:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/what-me-worry-car-data-where-does-it-go/</loc>
		<lastmod>2018-02-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bsides-leeds-2018-phill-kimptons-soldier-to-cyber/</loc>
		<lastmod>2018-02-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/steve-sacks-russian-troll/</loc>
		<lastmod>2018-02-25T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/three-years-of-the-right-to-be-forgotten/</loc>
		<lastmod>2018-02-26T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/insider-enterprise-threats-user-activity-monitoring/</loc>
		<lastmod>2018-02-26T04:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/new-report-offers-better-cybersecurity-definitions/</loc>
		<lastmod>2018-02-26T04:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/my-take-a-closer-look-at-why-carpet-bombing-of-phishing-email-endures/</loc>
		<lastmod>2018-02-26T07:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/avast-smart-life-protects-the-growing-number-of-iot-devices-in-your-home/</loc>
		<lastmod>2018-02-26T08:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-dirty-dozen-vendors-deluging-your-vulnerability-management-team/</loc>
		<lastmod>2018-02-26T08:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fake-steam-desktop-authenticator-steals-account-details/</loc>
		<lastmod>2018-02-26T08:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/insights-about-the-first-three-years-of-the-right-to-be-forgotten-requests-at-google/</loc>
		<lastmod>2018-02-26T09:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/internet-explorer-is-dead-long-live-internet-explorer/</loc>
		<lastmod>2018-02-26T11:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/document-sanitization-avoid-making-your-business-look-foolish/</loc>
		<lastmod>2018-02-26T11:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/examining-malware-redirects-with-networkminer-professional/</loc>
		<lastmod>2018-02-26T11:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/sunday-times-recognises-semafone-for-fast-growing-international-sales-data-security-and-compliance-specialist-ranked-in-lloyds-sme-export-track-list/</loc>
		<lastmod>2018-02-26T11:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/securing-serverless-blog-series-episode-0x04-the-six-most-common-reactions-to-the-words-serverless-security/</loc>
		<lastmod>2018-02-26T12:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/visit-acunetix-at-rsa-conference-2018/</loc>
		<lastmod>2018-02-26T12:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/raas-keeps-victims-guessing-by-not-using-special-file-extension/</loc>
		<lastmod>2018-02-26T12:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/fileless-malware-what-it-is-and-how-to-stop-it/</loc>
		<lastmod>2018-02-26T12:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/office-365-ransomware/</loc>
		<lastmod>2018-02-26T13:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bridging-the-gap-of-grief-with-business-driven-security/</loc>
		<lastmod>2018-02-26T13:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/intel-facing-32-lawsuits-over-spectre-and-meltdown-fiasco/</loc>
		<lastmod>2018-02-26T14:07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/form-w-2-data-thefts-are-rocketing-warns-fbi/</loc>
		<lastmod>2018-02-26T14:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bob-and-alice-meet-the-ultimate-firewall/</loc>
		<lastmod>2018-02-26T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/weekly-cyber-risk-roundup-w-2-theft-bec-scams-and-sec-guidance/</loc>
		<lastmod>2018-02-26T15:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/will-subscribers-pay-for-security/</loc>
		<lastmod>2018-02-26T15:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/a-deep-dive-into-database-attacks-part-ii-delivery-and-execution-of-malicious-executables-through-sql-commands-sql-server/</loc>
		<lastmod>2018-02-26T17:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-state-of-malicious-cryptomining/</loc>
		<lastmod>2018-02-26T17:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/report-the-state-of-cybersecurity-in-florida/</loc>
		<lastmod>2018-02-26T18:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/tpm-enables-secure-over-the-air-software-updates-for-vehicles-its-here/</loc>
		<lastmod>2018-02-26T18:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/top-5-ways-to-get-developer-application-security-buy-in-video/</loc>
		<lastmod>2018-02-26T18:23:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/a-week-in-security-february-19-february-25/</loc>
		<lastmod>2018-02-26T18:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bsides-leeds-mark-carneys-pentesting-hardware-and-iot/</loc>
		<lastmod>2018-02-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/usps-finally-starts-notifying-you-by-mail-if-someone-is-scanning-your-snail-mail-online/</loc>
		<lastmod>2018-02-26T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/new-guide-on-how-to-clean-a-hacked-website/</loc>
		<lastmod>2018-02-26T19:38:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/from-my-gartner-blog-its-not-only-that-the-basics-are-hard/</loc>
		<lastmod>2018-02-26T19:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/tech-support-scam-alarms-chrome-users/</loc>
		<lastmod>2018-02-26T21:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/e-mail-leaves-an-evidence-trail/</loc>
		<lastmod>2018-02-26T21:39:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-joy-of-tech-homepod-embroglio/</loc>
		<lastmod>2018-02-26T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-operating-system-forensics/</loc>
		<lastmod>2018-02-26T22:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/dnswatch-blocking-popular-websites/</loc>
		<lastmod>2018-02-26T23:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-use-security-incident-event-management-siem-for-early-threat-detection/</loc>
		<lastmod>2018-02-26T23:16:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-memory-forensics/</loc>
		<lastmod>2018-02-26T23:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cellebrite-the-iphone-and-android/</loc>
		<lastmod>2018-02-26T23:44:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-ftk-forensic-toolkit-overview/</loc>
		<lastmod>2018-02-26T23:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/pwned-passwords/</loc>
		<lastmod>2018-02-27T03:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/all-grown-up-bsides-charm-turns-4-and-is-better-than-ever/</loc>
		<lastmod>2018-02-27T04:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/hybrid-cloud-security-5-key-considerations/</loc>
		<lastmod>2018-02-27T04:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/mobile-security-and-new-data-on-the-risk-of-banking-trojans/</loc>
		<lastmod>2018-02-27T08:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/netsparker-will-be-exhibiting-at-the-rsa-conference-2018-in-san-francisco/</loc>
		<lastmod>2018-02-27T08:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/marketers-secure-your-landing-pages/</loc>
		<lastmod>2018-02-27T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/establishing-trust-in-mobile-payments/</loc>
		<lastmod>2018-02-27T10:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-five-attributes-needed-to-succeed-at-devsecops/</loc>
		<lastmod>2018-02-27T10:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cloud-computing-basics/</loc>
		<lastmod>2018-02-27T11:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/israeli-forensics-firm-claims-it-can-unlock-any-iphone-on-ios-5-to-ios-11/</loc>
		<lastmod>2018-02-27T12:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/securely-moving-workloads-to-the-cloud/</loc>
		<lastmod>2018-02-27T12:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/whats-it-take-to-be-tomorrows-ciso/</loc>
		<lastmod>2018-02-27T12:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/42-of-organizations-experienced-burst-attacks-the-rest-were-unaware-they-were-attacked/</loc>
		<lastmod>2018-02-27T12:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/find-plugins-faster-introducing-a-more-powerful-plugins-search/</loc>
		<lastmod>2018-02-27T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/a-dozen-connecticut-state-agencies-targeted-by-wannacry-ransomware/</loc>
		<lastmod>2018-02-27T13:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/what-executives-will-get-out-of-our-devsecops-virtual-summit/</loc>
		<lastmod>2018-02-27T14:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/printer-vectored-network-attacks-gives-new-meaning-to-paper-jams/</loc>
		<lastmod>2018-02-27T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/top-10-articles-every-sap-basis-admin-must-read/</loc>
		<lastmod>2018-02-27T15:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/coinbase-releases-data-of-13000-customers-to-irs/</loc>
		<lastmod>2018-02-27T15:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/qadars-modular-features-that-make-this-a-true-threat/</loc>
		<lastmod>2018-02-27T15:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/shift-left-or-die-baking-security-into-the-software-development-lifecycle-is-more-critical-than-ever/</loc>
		<lastmod>2018-02-27T17:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/apple-emergency-calls-no-ifs-or-butts/</loc>
		<lastmod>2018-02-27T18:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-protect-your-computer-from-malicious-cryptomining/</loc>
		<lastmod>2018-02-27T18:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bsides-leeds-david-lodges-all-you-need-is-pi/</loc>
		<lastmod>2018-02-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bot-roundup-avalanche-kronos-nanocore/</loc>
		<lastmod>2018-02-27T19:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/comodo-ca-achieves-record-45-percent-year-year-revenue-growth-fueled-30-new-global-partners/</loc>
		<lastmod>2018-02-27T19:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-prevent-data-breaches-caused-by-employees/</loc>
		<lastmod>2018-02-27T19:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/beginning-gdpr-compliance/</loc>
		<lastmod>2018-02-27T19:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/human-factor-podcast-jenny-radcliffe-and-chris-boyd/</loc>
		<lastmod>2018-02-27T19:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/february-27th-2018-resources-updates/</loc>
		<lastmod>2018-02-27T20:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/memcached-udp-reflection-attacks/</loc>
		<lastmod>2018-02-27T20:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/threat-hunting-malware-angler-ek-analysis-with-security-onion-goofus-and-gallant/</loc>
		<lastmod>2018-02-27T21:23:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/key-takeaways-retail-threat-briefing-webinar-with-r-cisc/</loc>
		<lastmod>2018-02-27T21:54:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/xkcd-code-golf/</loc>
		<lastmod>2018-02-27T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/more-free-open-source-computer-forensics-tools/</loc>
		<lastmod>2018-02-27T22:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-tenth-annual-disaster-recovery-breakfast-are-you-fing-kidding-me/</loc>
		<lastmod>2018-02-27T22:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-the-computer-hacking-forensics-investigator-chfi-certification/</loc>
		<lastmod>2018-02-27T23:10:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-create-an-effective-incident-response-plan/</loc>
		<lastmod>2018-02-27T23:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-user-awareness-landscape/</loc>
		<lastmod>2018-02-28T01:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/business-email-compromise-the-secret-billion-dollar-threat/</loc>
		<lastmod>2018-02-28T04:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/a-guide-to-pci-dss-merchant-levels-and-penetration-testing/</loc>
		<lastmod>2018-02-28T04:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/nxp-integrates-layerscape-family-of-arm-based-processors-with-microsoft-azure-iot-for-secure-edge-computing/</loc>
		<lastmod>2018-02-28T05:58:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/grade-changes-to-the-ssl-server-test-coming-march-2018/</loc>
		<lastmod>2018-02-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cybercrime-dominates-business-fraud-losses/</loc>
		<lastmod>2018-02-28T10:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/appleid-phish-and-how-to-recognize-phish-messages/</loc>
		<lastmod>2018-02-28T11:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bitdefender-europol-romanian-police-diicot-team-up-for-gandcrab-removal-tool/</loc>
		<lastmod>2018-02-28T11:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/apple-to-store-encryption-keys-in-china/</loc>
		<lastmod>2018-02-28T12:19:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/understanding-the-role-of-threat-modeling-in-risk-management/</loc>
		<lastmod>2018-02-28T13:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/expert-interview-security-it-risk-management-best-practices/</loc>
		<lastmod>2018-02-28T13:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/science-direct-on-the-danger-of-contact-centre-agents/</loc>
		<lastmod>2018-02-28T13:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/reddrop-malware-records-audio-and-exfiltrates-it-to-cloud-storage-services/</loc>
		<lastmod>2018-02-28T13:26:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/uk-at-growing-risk-of-major-cyber-incidents-terrorist-attacks-research-suggests/</loc>
		<lastmod>2018-02-28T14:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-fight-mobile-number-port-out-scams/</loc>
		<lastmod>2018-02-28T14:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/gdpr-article-32-security-of-data-processing/</loc>
		<lastmod>2018-02-28T14:51:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/saml-flaws-discovered-with-sso-implications/</loc>
		<lastmod>2018-02-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/it-can-be-a-creepy-clown-five-things-that-keep-me-up-at-night/</loc>
		<lastmod>2018-02-28T15:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-do-i-know-if-im-secure/</loc>
		<lastmod>2018-02-28T15:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/survey-says-so-long-grey-skies-telecoms-2018-outlook/</loc>
		<lastmod>2018-02-28T15:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/unlocking-ithings/</loc>
		<lastmod>2018-02-28T15:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/february-28th-2018-resources-updates/</loc>
		<lastmod>2018-02-28T16:26:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/webinar-announcement-microlearning-for-macro-results/</loc>
		<lastmod>2018-02-28T16:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/500-off-online-training-special-march-only/</loc>
		<lastmod>2018-02-28T16:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/4-steps-to-monitor-and-audit-privileged-users-of-data-stores/</loc>
		<lastmod>2018-02-28T17:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bens-book-of-the-month-review-of-securing-devops-safe-services-in-the-cloud/</loc>
		<lastmod>2018-02-28T17:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-educational-institutions-are-failing-to-adequately-protect-student-data/</loc>
		<lastmod>2018-02-28T17:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/new-rig-malvertising-campaign-uses-cryptocurrency-theme-as-decoy/</loc>
		<lastmod>2018-02-28T17:08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/encryption-101-shione-ransomware-case-study/</loc>
		<lastmod>2018-02-28T17:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/casp-certification-overview-and-career-path/</loc>
		<lastmod>2018-02-28T17:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/report-on-bsides-tampa-2018/</loc>
		<lastmod>2018-02-28T18:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/countdown-to-gdpr-4-impact-on-customer-communication-and-experience/</loc>
		<lastmod>2018-02-28T18:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/metoo-prompts-employers-to-review-their-anti-harassment-policies/</loc>
		<lastmod>2018-02-28T18:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/deserialization-attacks-for-crypto-mining/</loc>
		<lastmod>2018-02-28T18:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/bsides-leeds-victoria-walbergs-diversity-in-infosec-not-that-sort-rockstars-vs-plumbers/</loc>
		<lastmod>2018-02-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/77-facts-about-cyber-crime/</loc>
		<lastmod>2018-02-28T19:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-impacts-of-zero-day-attacks/</loc>
		<lastmod>2018-02-28T19:14:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/zico-2-1-ctf-walkthrough/</loc>
		<lastmod>2018-02-28T19:15:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-components-of-a-successful-security-awareness-program/</loc>
		<lastmod>2018-02-28T19:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-become-casp-certified-certification-requirements/</loc>
		<lastmod>2018-02-28T19:32:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-earn-casp-ceu-credits/</loc>
		<lastmod>2018-02-28T19:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/maintaining-your-casp-certification-renewal-requirements/</loc>
		<lastmod>2018-02-28T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/casp-resources/</loc>
		<lastmod>2018-02-28T20:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/top-cyber-security-challenges-in-smart-cities/</loc>
		<lastmod>2018-02-28T20:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-to-determine-if-you-need-a-soc-team-csirt-team-or-both/</loc>
		<lastmod>2018-02-28T20:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/android-cryptocurrency-scams/</loc>
		<lastmod>2018-02-28T20:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/casp-exam-details-process/</loc>
		<lastmod>2018-02-28T20:45:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/9-tips-for-improving-your-incident-response-strategy/</loc>
		<lastmod>2018-02-28T21:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/casp-overview-of-domains/</loc>
		<lastmod>2018-02-28T21:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/common-casp-job-titles/</loc>
		<lastmod>2018-02-28T21:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/breach-notification-requirements-for-healthcare-providers/</loc>
		<lastmod>2018-02-28T21:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-best-worst-practices-of-incident-response/</loc>
		<lastmod>2018-02-28T21:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/casp-frequently-asked-questions-faq/</loc>
		<lastmod>2018-02-28T21:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/the-joy-of-tech-rage-becuase-of-the-machine/</loc>
		<lastmod>2018-02-28T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/improve-response-times-with-incident-response-network-forensics-training/</loc>
		<lastmod>2018-02-28T22:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/risk-management-tools-and-tech/</loc>
		<lastmod>2018-02-28T22:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-hybrid-and-emerging-technologies/</loc>
		<lastmod>2018-02-28T22:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-introduction-to-cloud-forensics/</loc>
		<lastmod>2018-02-28T22:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-introduction-to-social-network-forensics/</loc>
		<lastmod>2018-02-28T23:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-big-data-forensics/</loc>
		<lastmod>2018-02-28T23:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-ics-scada-forensics/</loc>
		<lastmod>2018-02-28T23:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/computer-forensics-online-gaming-and-vr-forensics/</loc>
		<lastmod>2018-02-28T23:53:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/book-highlights-hit-refresh-by-satya-nadella/</loc>
		<lastmod>2018-03-01T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/data-integrity-the-next-big-challenge/</loc>
		<lastmod>2018-03-01T04:32:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/why-cyber-security-is-the-new-health-and-safety/</loc>
		<lastmod>2018-03-01T04:32:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/askrob-does-tor-let-government-peek-at-vuln-info/</loc>
		<lastmod>2018-03-01T06:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securing-containers-for-gdpr-compliance/</loc>
		<lastmod>2018-03-01T08:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/1-in-50-publicly-readable-amazon-buckets-are-also-writable-and-thats-a-data-disaster-waiting-to-happen/</loc>
		<lastmod>2018-03-01T09:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tripwire-patch-priority-index-for-february-2018/</loc>
		<lastmod>2018-03-01T09:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/germany-blames-russian-black-hat-hackers-for-breach-of-federal-agencies/</loc>
		<lastmod>2018-03-01T12:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/russians-hacked-the-olympics/</loc>
		<lastmod>2018-03-01T12:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/philips-warns-clinicians-of-remote-access-vulnerabilities-in-its-imaging-software/</loc>
		<lastmod>2018-03-01T12:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2fa-is-outdated-us-carriers-want-next-gen-mobile-authentication/</loc>
		<lastmod>2018-03-01T14:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/iot-primes-identity-management-for-continued-investment-growth/</loc>
		<lastmod>2018-03-01T14:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-study-shows-20-of-public-aws-s3-buckets-are-writable/</loc>
		<lastmod>2018-03-01T14:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ad-network-concealing-monero-mining-software-in-ads/</loc>
		<lastmod>2018-03-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cybercrime-operations-where-will-fraudsters-go-next/</loc>
		<lastmod>2018-03-01T15:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cyber-security-roundup-for-february-2018/</loc>
		<lastmod>2018-03-01T15:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-new-isc%c2%b2-cissp-cbk-2018/</loc>
		<lastmod>2018-03-01T15:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/android-apps-infected-with-windows-malware-reemerge/</loc>
		<lastmod>2018-03-01T15:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/detecting-and-preventing-data-loss-using-semantic-code-property-graphs-and-security-profiles/</loc>
		<lastmod>2018-03-01T16:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/proof-that-cyber-attackers-care-about-roi-just-as-much-as-you-do/</loc>
		<lastmod>2018-03-01T16:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/10-ways-to-protect-your-identity-and-prevent-identity-theft/</loc>
		<lastmod>2018-03-01T16:34:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-1st-2018-resources-update/</loc>
		<lastmod>2018-03-01T16:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amazons-about-face-on-govcloud-physical-location-has-no-bearing/</loc>
		<lastmod>2018-03-01T16:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-quick-history-of-iot-botnets/</loc>
		<lastmod>2018-03-01T16:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-10-second-sla-for-rapid-ddos-mitigation/</loc>
		<lastmod>2018-03-01T17:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/monthly-blog-round-up-february-2018/</loc>
		<lastmod>2018-03-01T17:19:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/blast-from-the-past-stowaway-virut-delivered-with-chinese-ddos-bot/</loc>
		<lastmod>2018-03-01T17:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-5-android-hacking-tools-for-penetration-testers/</loc>
		<lastmod>2018-03-01T18:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-tom-hudsons-passive-ish-recon-techniques/</loc>
		<lastmod>2018-03-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/financial-cyber-threat-sharing-group-phished/</loc>
		<lastmod>2018-03-01T19:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/inside-a-new-ddos-amplification-attack-vector-via-memcached-servers/</loc>
		<lastmod>2018-03-01T19:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/data-breach-at-us-marine-forces-reserve-impacts-over-21000-soldiers-civilians/</loc>
		<lastmod>2018-03-01T19:50:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/avast-scores-100-in-windows-antivirus-endpoint-protection-test/</loc>
		<lastmod>2018-03-01T21:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/complying-with-nist-guidelines-for-stolen-passwords/</loc>
		<lastmod>2018-03-01T21:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-interaction/</loc>
		<lastmod>2018-03-01T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-top-7-popular-gartner-blog-posts-for-feburary-2018/</loc>
		<lastmod>2018-03-01T22:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/financial-services-how-remote-browser-isolation-gives-anti-fraud-aml-teams-a-leg-up-on-the-web/</loc>
		<lastmod>2018-03-02T00:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-a-soc-is-crucial-for-effective-cloud-security/</loc>
		<lastmod>2018-03-02T01:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cloud-security-this-week-march-2-2018/</loc>
		<lastmod>2018-03-02T04:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cellebrite-unlocks-iphones-for-the-us-government/</loc>
		<lastmod>2018-03-02T08:57:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/most-it-professionals-believe-state-sponsored-attacks-might-lead-to-cyber-war/</loc>
		<lastmod>2018-03-02T10:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/apple-issues-advice-on-how-to-spot-app-store-and-itunes-phishing-scams/</loc>
		<lastmod>2018-03-02T12:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/malware-from-space/</loc>
		<lastmod>2018-03-02T12:13:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/another-ransomware-variant-strikes-colorado-dot-days-after-initial-attack/</loc>
		<lastmod>2018-03-02T12:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-6-iphone-hacking-tools-for-mobile-penetration-testers/</loc>
		<lastmod>2018-03-02T13:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/6-tips-for-securing-privileged-accounts-in-the-enterprise/</loc>
		<lastmod>2018-03-02T14:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/global-cost-of-cybercrime-on-the-rise/</loc>
		<lastmod>2018-03-02T14:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/phishing-phish-unicode-style/</loc>
		<lastmod>2018-03-02T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/phishlabs-launches-future-of-cybersecurity-scholarship-program/</loc>
		<lastmod>2018-03-02T15:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/more-people-dying-in-a-fire-petroleum-based-skin-products-to-blame/</loc>
		<lastmod>2018-03-02T15:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/explained-sql-injection/</loc>
		<lastmod>2018-03-02T18:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-andy-gills-hacker-of-all-trades-master-of-none/</loc>
		<lastmod>2018-03-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/social-engineering-the-quick-facts/</loc>
		<lastmod>2018-03-02T19:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/laws-stopped-cousin-marriage-not-mobility/</loc>
		<lastmod>2018-03-02T19:50:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/massive-ddos-attack-washes-over-github/</loc>
		<lastmod>2018-03-02T20:08:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/phishing-the-app-store-again/</loc>
		<lastmod>2018-03-02T20:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-2nd-2018-resources-update/</loc>
		<lastmod>2018-03-02T20:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/devcentrals-featured-member-for-march-hannes-rapp/</loc>
		<lastmod>2018-03-02T20:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tearing-your-hair-out-at-hacker-hoaxes/</loc>
		<lastmod>2018-03-02T20:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-state-and-local-governments-need-to-know-about-risks-in-g-suite-and-office-365/</loc>
		<lastmod>2018-03-02T20:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/memcached-now-with-extortion/</loc>
		<lastmod>2018-03-02T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/introducing-unminify/</loc>
		<lastmod>2018-03-02T21:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-separation-anxiety/</loc>
		<lastmod>2018-03-02T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/friday-squid-blogging-searching-for-humboldt-squid-with-electronic-bait/</loc>
		<lastmod>2018-03-02T22:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/threat-hunting-best-practices-be-ready-to-hunt-when-cyber-criminals-strike/</loc>
		<lastmod>2018-03-02T22:38:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/powerful-new-ddos-method-adds-extortion/</loc>
		<lastmod>2018-03-02T22:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/comparing-2017-maine-lobster-landings-to-historical-landings/</loc>
		<lastmod>2018-03-02T23:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/breaches-borders-and-barcelona-the-week-in-security-news/</loc>
		<lastmod>2018-03-03T03:51:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-3rd-2018-resources-update/</loc>
		<lastmod>2018-03-03T13:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/simple-concise-on-target/</loc>
		<lastmod>2018-03-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securing-healthcare-data-and-applications/</loc>
		<lastmod>2018-03-03T18:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-jay-harris-prototyping-and-reverse-engineering-with-frida/</loc>
		<lastmod>2018-03-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bruce-plantes-russian-cyberwarfare/</loc>
		<lastmod>2018-03-03T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/news-wrap-up-crypto-miners-tap-hacked-websites-achieve-monetization-breakthrough/</loc>
		<lastmod>2018-03-04T02:56:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/lost-history-of-american-bourbon-knob-creek/</loc>
		<lastmod>2018-03-04T05:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bevx-conference-challenge/</loc>
		<lastmod>2018-03-04T07:27:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/memcachedddos-rdos-ddos-for-bitcoin/</loc>
		<lastmod>2018-03-04T12:56:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ipv6-the-ddosing/</loc>
		<lastmod>2018-03-04T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-rory-mccunes-night-of-the-living-dead-pentest/</loc>
		<lastmod>2018-03-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-generations/</loc>
		<lastmod>2018-03-04T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/evolving-to-security-decision-support-laying-the-foundation/</loc>
		<lastmod>2018-03-04T22:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-was-it-like-enabling-google-advanced-protection/</loc>
		<lastmod>2018-03-04T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/redos-vulnerability-in-aws-lambda-multipart-parser-node-package/</loc>
		<lastmod>2018-03-04T23:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-pci-dss-compliance-can-protect-your-systems-against-new-ransomware-threats/</loc>
		<lastmod>2018-03-05T04:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/insider-enterprise-threats-focusing-on-the-technology/</loc>
		<lastmod>2018-03-05T04:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-shared-security-weekly-blaze-facebook-face-recognition-private-web-browsing-credit-card-fraud/</loc>
		<lastmod>2018-03-05T05:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-take-necurs-vs-mirai-what-classic-and-iot-botnets-reveal-about-evolving-cyber-threats/</loc>
		<lastmod>2018-03-05T07:42:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-prepare-for-the-future-of-healthcare-digital-security/</loc>
		<lastmod>2018-03-05T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/debunking-software-defined-data-center-myths/</loc>
		<lastmod>2018-03-05T09:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/oh-hello-access-certification-reviews-back-again-so-soon/</loc>
		<lastmod>2018-03-05T10:20:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/point-of-sale-breach-confirmed-at-some-applebees-locations/</loc>
		<lastmod>2018-03-05T12:44:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/test-your-cloud-knowledge-with-these-ccsp-sample-questions/</loc>
		<lastmod>2018-03-05T13:37:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-7-web-application-penetration-testing-tools/</loc>
		<lastmod>2018-03-05T13:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/an-overview-of-the-ccsp-domains/</loc>
		<lastmod>2018-03-05T14:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-ultimate-guide-to-ccsp-certification/</loc>
		<lastmod>2018-03-05T14:41:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/annabelle-ransomware-decryption-tool/</loc>
		<lastmod>2018-03-05T14:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/stunning-stupidity-to-start-the-week-selling-your-dna-via-a-blockchain-controlled-marketplace/</loc>
		<lastmod>2018-03-05T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-5th-2018-resources-update/</loc>
		<lastmod>2018-03-05T15:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hunting-for-insider-threats-using-activity-modeling-to-detect-suspicious-database-commands-and-access-patterns/</loc>
		<lastmod>2018-03-05T16:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/intimate-partner-threat/</loc>
		<lastmod>2018-03-05T17:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/week-in-security-february-26-march-4/</loc>
		<lastmod>2018-03-05T17:32:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/connections-magazine-on-why-your-agents-may-be-putting-customer-data-at-risk/</loc>
		<lastmod>2018-03-05T17:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-updates-on-frameworks-standards/</loc>
		<lastmod>2018-03-05T18:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-top-five-soc-2-compliance-questions-answered/</loc>
		<lastmod>2018-03-05T18:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mobile-menace-monday-olympics-app-has-more-ads-than-games/</loc>
		<lastmod>2018-03-05T18:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/weekly-cyber-risk-roundup-record-setting-ddos-attacks-data-breach-costs/</loc>
		<lastmod>2018-03-05T19:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-andrew-tierneys-bypassing-crp-on-microcontrollers/</loc>
		<lastmod>2018-03-05T19:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/addressing-diversity-at-rsa-conference-and-in-the-cybersecurity-industry/</loc>
		<lastmod>2018-03-05T19:38:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/this-is-the-one-way-your-home-security-could-be-tax-deductible/</loc>
		<lastmod>2018-03-05T20:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-3-ways-to-prevent-spectre-and-meltdown/</loc>
		<lastmod>2018-03-05T21:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-a-counterfeit-bezos/</loc>
		<lastmod>2018-03-05T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/trusted-computing-group-winbond-at-embedded-world-2018/</loc>
		<lastmod>2018-03-05T23:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/trusted-computing-group-wibu-at-embedded-world-2018/</loc>
		<lastmod>2018-03-05T23:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/all-security-is-cybersecurity/</loc>
		<lastmod>2018-03-05T23:38:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/post-webinar-recap-compliance-in-the-cloud-in-2018/</loc>
		<lastmod>2018-03-05T23:53:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-best-starting-technology-for-detection/</loc>
		<lastmod>2018-03-06T01:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/implicit-identity-based-device-attestation/</loc>
		<lastmod>2018-03-06T02:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bt-wholesale-chooses-semafone-to-offer-secure-payments-solution-to-uk-resellers/</loc>
		<lastmod>2018-03-06T03:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/general-services-administration-gsa-pointing-to-new-it-security-rules-for-contractors/</loc>
		<lastmod>2018-03-06T04:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2018-tax-season-phishing-scams/</loc>
		<lastmod>2018-03-06T06:21:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2018-global-data-regulations-compliance-heat-up-are-you-ready/</loc>
		<lastmod>2018-03-06T10:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/adapting-hashcat-for-sap-half-hashes/</loc>
		<lastmod>2018-03-06T10:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/podcast-everything-you-wanted-to-know-about-cryptocurrency-but-were-afraid-to-ask/</loc>
		<lastmod>2018-03-06T11:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/it-security-pros-neglect-obvious-source-of-tips-on-fighting-future-threats-the-past/</loc>
		<lastmod>2018-03-06T11:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/big-bitcoin-heist-thieves-in-iceland-steal-bitcoin-mining-equipment-worth-an-estimated-2-million/</loc>
		<lastmod>2018-03-06T11:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-vulnerabilities-in-smart-contracts/</loc>
		<lastmod>2018-03-06T12:18:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/video-game-developer-gave-customers-5-voucher-after-data-breach/</loc>
		<lastmod>2018-03-06T13:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/uber-sued-by-penn-attorney-general-for-delayed-data-breach-notification/</loc>
		<lastmod>2018-03-06T14:08:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/appsec-buyers-insights-binary-vs-source-code-scanning/</loc>
		<lastmod>2018-03-06T14:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/adopting-a-more-secure-approach-to-containers/</loc>
		<lastmod>2018-03-06T14:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/4g-gone-wild/</loc>
		<lastmod>2018-03-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/world-record-broken-again-ddos-attack-exceeds-1-7-terabits-per-second/</loc>
		<lastmod>2018-03-06T15:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/marrying-the-business-need-with-technology-drive-part-4-use-tools-to-save-some-time-they-do-exist/</loc>
		<lastmod>2018-03-06T15:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-install-and-configure-the-netsparker-cloud-scan-teamcity-plugin/</loc>
		<lastmod>2018-03-06T15:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-integrate-netsparker-into-your-existing-sdlc/</loc>
		<lastmod>2018-03-06T15:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/untangle-sweeps-four-categories-in-2018-global-excellence-awards/</loc>
		<lastmod>2018-03-06T16:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-era-of-crypto-jacking/</loc>
		<lastmod>2018-03-06T16:47:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/embedded-insiders-episode-35-what-to-expect-at-embedded-world-2018/</loc>
		<lastmod>2018-03-06T16:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/pragmatic-security-20-signs-you-are-boiling-the-ocean/</loc>
		<lastmod>2018-03-06T16:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/private-browsing-online-privacy-avast-essential-guide/</loc>
		<lastmod>2018-03-06T17:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/powershell-language-modes-part-2/</loc>
		<lastmod>2018-03-06T17:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/understanding-google-chromes-upcoming-https-changes/</loc>
		<lastmod>2018-03-06T17:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/alert-logic-full-stack-security-protecting-your-development-platform/</loc>
		<lastmod>2018-03-06T18:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/android-root-detection-bypass-by-reverse-engineering-apk/</loc>
		<lastmod>2018-03-06T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-chris-ratcliffs-working-with-risk/</loc>
		<lastmod>2018-03-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-assessment-of-a-digital-signage-solution/</loc>
		<lastmod>2018-03-06T19:17:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/intro-to-securing-an-online-store-part-2/</loc>
		<lastmod>2018-03-06T19:26:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/warning-https-domains-are-now-being-used-by-cybercriminals/</loc>
		<lastmod>2018-03-06T19:46:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/encryption-101-how-to-break-encryption/</loc>
		<lastmod>2018-03-06T19:56:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-not-paranoid-enough-android/</loc>
		<lastmod>2018-03-06T19:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/android-security-update-march-2018/</loc>
		<lastmod>2018-03-06T19:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-is-your-banks-security-banking-on/</loc>
		<lastmod>2018-03-06T21:24:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-namespace-land-rush/</loc>
		<lastmod>2018-03-06T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/computer-forensics-forensic-issues-with-virtual-systems/</loc>
		<lastmod>2018-03-06T22:53:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/lock-picking-at-security-conferences/</loc>
		<lastmod>2018-03-07T00:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/intent-vs-reality-obstacles-keeping-the-sec-out-of-devops/</loc>
		<lastmod>2018-03-07T04:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/entrust-datacard-at-rsa-conference-2018/</loc>
		<lastmod>2018-03-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/iso-27001-risk-assessments-the-problem-with-using-spreadsheets/</loc>
		<lastmod>2018-03-07T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/public-sector-explores-how-artificial-intelligence-might-help-with-enhancing-cyber-security-efforts/</loc>
		<lastmod>2018-03-07T09:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/gdpr-prompts-companies-worldwide-to-plan-for-stronger-security-study-shows/</loc>
		<lastmod>2018-03-07T11:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/when-identity-governance-gets-tough-the-tough-get-help/</loc>
		<lastmod>2018-03-07T11:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/february-2018-netsparker-cloud-update/</loc>
		<lastmod>2018-03-07T12:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/uk-government-reveals-aim-to-shift-consumer-iot-security-burden-to-industry/</loc>
		<lastmod>2018-03-07T12:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/create-a-team-for-audit-analytics-part-1/</loc>
		<lastmod>2018-03-07T12:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-makes-a-good-serverless-security-solution/</loc>
		<lastmod>2018-03-07T12:56:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/can-you-name-10-ways-to-close-that-security-sale/</loc>
		<lastmod>2018-03-07T13:02:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/make-way-for-https-starting-july-2018-google-chrome-will-mark-all-http-sites-as-not-secure/</loc>
		<lastmod>2018-03-07T13:25:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/7-common-penetration-testing-mistakes/</loc>
		<lastmod>2018-03-07T13:39:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/aqua-3-0-introduces-native-kubernetes-security-controls-automation/</loc>
		<lastmod>2018-03-07T14:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/aqua-3-0-delivers-runtime-security-aws-fargate-azure-container-instances/</loc>
		<lastmod>2018-03-07T14:13:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tech-city-uk-chooses-semafone-to-join-2018-future-fifty/</loc>
		<lastmod>2018-03-07T14:33:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cryptominer-versus-cryptominer/</loc>
		<lastmod>2018-03-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2018-cyberthreat-defense-report-where-it-security-is-going/</loc>
		<lastmod>2018-03-07T15:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/avast-android-app-report-reveals-these-apps-drain-your-monthly-data-and-your-androids-storage/</loc>
		<lastmod>2018-03-07T15:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cloud-vs-ddos-the-seven-layers-of-complexity/</loc>
		<lastmod>2018-03-07T15:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/meitnerium/</loc>
		<lastmod>2018-03-07T15:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/open-s3-buckets-from-bad-to-worse/</loc>
		<lastmod>2018-03-07T15:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/400000-servers-at-risk-if-open-source-exim-remote-attack-bug-is-left-unpatched/</loc>
		<lastmod>2018-03-07T16:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/from-my-gartner-blog-the-virtual-patch-analyst/</loc>
		<lastmod>2018-03-07T16:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-lovable-defector-and-the-double-edged-sword-of-technology/</loc>
		<lastmod>2018-03-07T17:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/building-an-incident-response-program-creating-the-framework/</loc>
		<lastmod>2018-03-07T17:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-lewis-arderns-performing-javascript-static-analysis/</loc>
		<lastmod>2018-03-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sans-tips-on-using-social-media/</loc>
		<lastmod>2018-03-07T20:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/handling-semantic-version-strings-like-a-boss-with-the-semver-package/</loc>
		<lastmod>2018-03-07T20:18:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mobile-malware-report-from-kaspersky/</loc>
		<lastmod>2018-03-07T20:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/enhanced-chrome-protection-for-macos-users/</loc>
		<lastmod>2018-03-07T20:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/unlocking-the-iphone-again/</loc>
		<lastmod>2018-03-07T20:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/learn-linux-the-best-method-for-your-needs/</loc>
		<lastmod>2018-03-07T21:38:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-spatial-orientation/</loc>
		<lastmod>2018-03-07T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-configure-use-suricata-for-threat-detection/</loc>
		<lastmod>2018-03-07T22:09:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/silo-browser-beats-google-chrome-georgetown-study-finds/</loc>
		<lastmod>2018-03-07T23:21:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/exim-buffer-overflow-rce-vulnerability-cve-2018-6789-what-you-need-to-know/</loc>
		<lastmod>2018-03-07T23:23:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/evident-io-custom-signature-provides-protection-in-new-wave-of-ddos-attacks/</loc>
		<lastmod>2018-03-08T01:23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/key-trends-from-mobile-world-congress-2018-avast/</loc>
		<lastmod>2018-03-08T01:55:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-considerations-for-cloud-migration/</loc>
		<lastmod>2018-03-08T04:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/guest-essay-surveillance-cam-hack-shows-potential-for-ransomware-collateral-damage/</loc>
		<lastmod>2018-03-08T07:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/kmip-the-cure-for-the-common-key-management-headache/</loc>
		<lastmod>2018-03-08T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sec-updates-guidance-on-disclosing-breaches-warns-against-insider-trading-based-on-cyber-risk/</loc>
		<lastmod>2018-03-08T08:32:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/celebrating-women-in-tech-for-international-womens-day/</loc>
		<lastmod>2018-03-08T11:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/some-notes-on-memcached-ddos/</loc>
		<lastmod>2018-03-08T11:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/history-of-the-us-army-security-agency/</loc>
		<lastmod>2018-03-08T12:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2017-in-review/</loc>
		<lastmod>2018-03-08T12:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cryptocurrency-exchange-says-phishing-campaign-behind-abnormal-trading-activity/</loc>
		<lastmod>2018-03-08T13:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/netsparker-and-brinqa-to-partner-on-web-application-security-webinar/</loc>
		<lastmod>2018-03-08T13:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-land-your-first-penetration-testing-job/</loc>
		<lastmod>2018-03-08T13:38:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/android-p-promises-new-security-and-privacy-features/</loc>
		<lastmod>2018-03-08T14:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/us-homeland-security-systems-run-on-outdated-unpatched-software-audit-finds/</loc>
		<lastmod>2018-03-08T14:57:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/synthetics/</loc>
		<lastmod>2018-03-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-the-next-era-of-cloud-computing-means-for-appsec-the-sdlc/</loc>
		<lastmod>2018-03-08T16:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/entering-into-the-1tbps-era/</loc>
		<lastmod>2018-03-08T16:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/virginia-commonwealth-university-enrolls-whitehat-security-and-its-application-security-platform-to-be-the-foundation-of-its-application-vulnerability-management-program/</loc>
		<lastmod>2018-03-08T16:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/look-alike-domains-and-visual-confusion/</loc>
		<lastmod>2018-03-08T16:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-ddos-reflection-attack-variant/</loc>
		<lastmod>2018-03-08T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/extracting-secrets-from-machine-learning-systems/</loc>
		<lastmod>2018-03-08T16:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/using-machine-learning-and-dns-in-the-cat-mouse-game-of-fighting-bot-malware/</loc>
		<lastmod>2018-03-08T17:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-state-of-mac-malware/</loc>
		<lastmod>2018-03-08T17:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-investigations-into-the-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities/</loc>
		<lastmod>2018-03-08T17:48:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/social-engineer-newsletter-vol-08-issue-102/</loc>
		<lastmod>2018-03-08T18:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/threat-hunting-command-and-control-center-office-work/</loc>
		<lastmod>2018-03-08T18:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/rediswannamine-unveiled-new-cryptojacking-attack-powered-by-redis-and-nsa-exploits/</loc>
		<lastmod>2018-03-08T18:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/5-ways-to-make-a-smooth-transition-to-office-365-for-enterprise/</loc>
		<lastmod>2018-03-08T18:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-ian-thornton-trumps-stories-from-the-cybercrime-battlefield/</loc>
		<lastmod>2018-03-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-prevent-a-breach-from-spring-break/</loc>
		<lastmod>2018-03-08T19:08:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-10-reasons-why-pen-testing-is-important-to-help-meet-compliance/</loc>
		<lastmod>2018-03-08T19:30:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-prepared-is-your-business-for-the-gdpr/</loc>
		<lastmod>2018-03-08T19:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mail-from-the-boss-a-classic-example-of-a-_post-mailer-stealing-cc-data/</loc>
		<lastmod>2018-03-08T20:20:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/8th-march-2018-resources-updates/</loc>
		<lastmod>2018-03-08T21:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/memcrashed-the-dangerous-trend-behind-the-biggest-ever-ddos-attack/</loc>
		<lastmod>2018-03-08T21:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/international-womens-day-women-in-tech-share-their-stories/</loc>
		<lastmod>2018-03-08T22:09:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/nextgen-siem-isnt-siem/</loc>
		<lastmod>2018-03-08T22:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/robert-e-lee-and-jeff-hass-little-bobby-comics/</loc>
		<lastmod>2018-03-08T22:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-concerns-and-risks-related-to-bitcoin/</loc>
		<lastmod>2018-03-09T04:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/windows-10-flaw-allowed-attackers-to-open-malicious-websites-even-if-your-pc-was-locked/</loc>
		<lastmod>2018-03-09T08:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-is-cryptojacking/</loc>
		<lastmod>2018-03-09T08:44:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/chrome-will-show-not-secure-for-all-http-sites-starting-july-2018/</loc>
		<lastmod>2018-03-09T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ssl-review-february-2018/</loc>
		<lastmod>2018-03-09T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/oursa-conference/</loc>
		<lastmod>2018-03-09T12:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/one-in-five-healthcare-employees-would-be-willing-to-sell-sensitive-data-reveals-survey/</loc>
		<lastmod>2018-03-09T12:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-6-mobile-application-penetration-testing-tools/</loc>
		<lastmod>2018-03-09T13:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/lte-flaw-o-rama/</loc>
		<lastmod>2018-03-09T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/authorities-are-demanding-data-from-facebook-more-than-ever-before/</loc>
		<lastmod>2018-03-09T15:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/yahoo-agrees-to-80-million-settlement-over-data-breaches/</loc>
		<lastmod>2018-03-09T15:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/applied-machine-learning-for-identity-and-access-management-workshop-at-black-hat-2018/</loc>
		<lastmod>2018-03-09T15:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/only-half-of-organizations-that-pay-ransomware-operators-get-their-data-back/</loc>
		<lastmod>2018-03-09T16:14:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/qa-series-with-rsac-ambassador-mark-nunnikhoven/</loc>
		<lastmod>2018-03-09T17:08:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sentinelone-and-my-new-role/</loc>
		<lastmod>2018-03-09T17:20:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity/</loc>
		<lastmod>2018-03-09T17:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/echidna-a-smart-fuzzer-for-ethereum/</loc>
		<lastmod>2018-03-09T18:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/inner-circle-podcast-episode-004/</loc>
		<lastmod>2018-03-09T18:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-jonathon-brookfield-and-fraser-winterborns-security-oauth-2-0/</loc>
		<lastmod>2018-03-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bulldog-1-ctf-walkthrough/</loc>
		<lastmod>2018-03-09T19:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-make-alexa-your-office-assistant/</loc>
		<lastmod>2018-03-09T21:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cyber-insurance-policies-are-you-asking-the-right-questions/</loc>
		<lastmod>2018-03-09T21:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-my-eyes/</loc>
		<lastmod>2018-03-09T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/south-dakota-msp-simplifies-security-with-managed-workplace-avast-business/</loc>
		<lastmod>2018-03-09T22:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/friday-squid-blogging-interesting-interview/</loc>
		<lastmod>2018-03-09T22:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cloud-security-this-week-march-9-2018/</loc>
		<lastmod>2018-03-09T22:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/time-to-tighten-up-device-security-avast/</loc>
		<lastmod>2018-03-09T23:03:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tech-support-scammers-geekshelp-caught-again-two-years-later/</loc>
		<lastmod>2018-03-10T06:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/international-association-for-cryptologic-researchs-ches-2018-call-for-tutorials-posters-papers/</loc>
		<lastmod>2018-03-10T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-galid-yeduhais-clustering-of-web-attacks-a-walk-outside-the-lab/</loc>
		<lastmod>2018-03-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-yet/</loc>
		<lastmod>2018-03-10T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/weekly-cyber-risk-roundup-payment-card-breaches-encryption-debate-and-breach-notification-laws/</loc>
		<lastmod>2018-03-10T22:37:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/vk-messenger-vkontakte-vk-uri-handler-commands-execution/</loc>
		<lastmod>2018-03-11T10:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/moviepass-screws-the-pooch/</loc>
		<lastmod>2018-03-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-leeds-jessica-barker-and-freakyclowns-fk-you-fud/</loc>
		<lastmod>2018-03-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/pci-compliance-how-to-redact-credit-card-info-from-inbound-emails/</loc>
		<lastmod>2018-03-11T18:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/checked-your-credit-since-the-equifax-hack/</loc>
		<lastmod>2018-03-11T18:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-cracked/</loc>
		<lastmod>2018-03-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/creating-long-term-ssl-certificates/</loc>
		<lastmod>2018-03-11T22:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/insider-enterprise-threats-human-behavior/</loc>
		<lastmod>2018-03-12T03:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-foundational-prevention-fills-in-the-gaps-of-threat-detection/</loc>
		<lastmod>2018-03-12T03:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-shared-security-weekly-blaze-malicious-healthcare-workers-new-attacks-on-mobile-networks-facebook-messenger-for-kids/</loc>
		<lastmod>2018-03-12T04:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ep-103-how-to-be-a-good-parent-with-michael-bazzell/</loc>
		<lastmod>2018-03-12T04:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/shifting-gears-to-cloud-centric-cybersecurity/</loc>
		<lastmod>2018-03-12T07:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-take-why-google-is-labeling-websites-unsafe-what-publishers-need-to-do-about-it/</loc>
		<lastmod>2018-03-12T07:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-john-oliver-gets-wrong-about-bitcoin/</loc>
		<lastmod>2018-03-12T09:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-green-sheet-on-semafones-secure-pci-compliant-solution-for-call-centers/</loc>
		<lastmod>2018-03-12T10:25:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/managing-smb-endpoint-protection-without-an-it-department-avast-business/</loc>
		<lastmod>2018-03-12T10:49:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/two-new-papers-on-the-encryption-debate/</loc>
		<lastmod>2018-03-12T11:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/crypto-exchange-offers-250k-bounty-for-info-on-hacking-attack/</loc>
		<lastmod>2018-03-12T11:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-green-sheet-on-payments-new-tools-digital-diversified-dynamic/</loc>
		<lastmod>2018-03-12T12:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/six-years-the-lurker/</loc>
		<lastmod>2018-03-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/are-you-being-vigilant-against-a-dumpster-diving-attack/</loc>
		<lastmod>2018-03-12T14:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/kerberos-at-the-company-party/</loc>
		<lastmod>2018-03-12T15:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/turkish-egyptian-isps-help-local-government-conduct-massive-spyware-operation/</loc>
		<lastmod>2018-03-12T15:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/12th-march-2018-resources-updates/</loc>
		<lastmod>2018-03-12T15:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-digital-entropy-of-death-what-happens-to-your-online-accounts-when-you-die/</loc>
		<lastmod>2018-03-12T15:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/steel-ing-a-makeover-from-tariffic-post/</loc>
		<lastmod>2018-03-12T16:06:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/measure-security-performance-not-policy-compliance/</loc>
		<lastmod>2018-03-12T16:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bssides-pdx-portland-101/</loc>
		<lastmod>2018-03-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-week-in-security-march-05-march-11/</loc>
		<lastmod>2018-03-12T18:20:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/rdaas-security-how-to-apply-database-audit-and-monitoring-controls/</loc>
		<lastmod>2018-03-12T18:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/greyshift-sells-phone-unlocking-services/</loc>
		<lastmod>2018-03-12T19:27:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/aws-security-tech-tips-programmatic-onboarding-of-aws-accounts-to-esp-using-cloudformation-and-python/</loc>
		<lastmod>2018-03-12T19:52:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/2018-pmp-exam-change/</loc>
		<lastmod>2018-03-12T20:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/semafone-announces-webinar-on-how-people-processes-impact-pci-dss-compliance-for-contact-centers/</loc>
		<lastmod>2018-03-12T20:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-whats-really-going-on-with-those-laughing-amazon-devices/</loc>
		<lastmod>2018-03-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/building-cybersecurity-understanding-whats-at-risk/</loc>
		<lastmod>2018-03-12T23:35:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/elk-cloner-to-coldroot-and-beyond/</loc>
		<lastmod>2018-03-13T00:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/whats-at-stake-with-nist-800-171-and-how-to-ensure-youre-compliant/</loc>
		<lastmod>2018-03-13T03:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-current-state-of-connected-cars-can-we-be-secure/</loc>
		<lastmod>2018-03-13T03:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/united-states-k9-veterans-day-march-13th-2018/</loc>
		<lastmod>2018-03-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/know-who-hacked-the-binance-cryptocurrency-exchange-earn-250000/</loc>
		<lastmod>2018-03-13T08:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/steps-to-become-a-cissp-certified-information-systems-security-professional/</loc>
		<lastmod>2018-03-13T10:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/if-you-havent-filed-your-taxes-you-may-want-to-get-them-filed-today/</loc>
		<lastmod>2018-03-13T11:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/e-mailing-private-https-keys/</loc>
		<lastmod>2018-03-13T11:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hacking-attack-might-have-breached-135k-patients-records-at-ny-outpatient-center/</loc>
		<lastmod>2018-03-13T12:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/create-a-team-for-audit-analytics-part-2/</loc>
		<lastmod>2018-03-13T12:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/is-all-encryption-equal/</loc>
		<lastmod>2018-03-13T13:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cryptocurrency-versus-rationale-thought/</loc>
		<lastmod>2018-03-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-create-a-development-champion/</loc>
		<lastmod>2018-03-13T14:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/some-organizations-pulling-workloads-back-from-the-cloud-because-of-security-data-management-concerns/</loc>
		<lastmod>2018-03-13T14:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sap-cyber-threat-intelligence-report-march-2018/</loc>
		<lastmod>2018-03-13T14:39:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/operational-visibility-for-load-balanced-traffic-in-sddc/</loc>
		<lastmod>2018-03-13T15:14:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-deep-dive-into-database-attacks-part-iii-why-scarlett-johanssons-picture-got-my-postgre-database-to-start-mining-monero/</loc>
		<lastmod>2018-03-13T16:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hancitor-fileless-attack-with-a-kernel-trick/</loc>
		<lastmod>2018-03-13T16:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/greedy-cybercriminals-host-malware-on-github/</loc>
		<lastmod>2018-03-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sap-security-notes-mar-18-the-risks-of-open-source/</loc>
		<lastmod>2018-03-13T17:11:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cybersecurity-evolution-and-its-importance-in-the-digital-age/</loc>
		<lastmod>2018-03-13T17:18:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-variant-of-bankbot-banking-trojan-ups-ante-cashes-out-on-android-users/</loc>
		<lastmod>2018-03-13T17:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/from-public-key-to-exploitation-how-we-exploited-the-authentication-in-ms-rdp/</loc>
		<lastmod>2018-03-13T17:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-advisory-critical-vulnerability-in-credssp-allows-remote-code-execution-on-servers-through-ms-rdp-video/</loc>
		<lastmod>2018-03-13T17:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-topher-timzens-the-trials-and-tribulations-of-building-your-own-ctf-and-shooting-gallery/</loc>
		<lastmod>2018-03-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/march-patch-tuesday-75-microsoft-vulnerabilities-7-for-adobe/</loc>
		<lastmod>2018-03-13T18:39:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/understanding-the-cloak-dagger-attack-overview-tutorial/</loc>
		<lastmod>2018-03-13T19:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/flash-windows-users-its-time-to-patch/</loc>
		<lastmod>2018-03-13T19:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/13th-march-2018-resources-updates/</loc>
		<lastmod>2018-03-13T20:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/steps-to-keep-your-site-clean-access-points/</loc>
		<lastmod>2018-03-13T20:38:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-background-apps/</loc>
		<lastmod>2018-03-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/vert-threat-alert-march-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-03-13T21:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-cisos-series-of-unfortunate-events/</loc>
		<lastmod>2018-03-13T23:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/5-pki-trends-to-expect-in-the-next-year/</loc>
		<lastmod>2018-03-14T03:44:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/siem-implementation-strategies/</loc>
		<lastmod>2018-03-14T03:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-take-why-the-secs-reporting-guidance-yahoos-80m-payout-will-shake-up-board-rooms/</loc>
		<lastmod>2018-03-14T07:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-expands-the-cloud-including-swiss-datacenters/</loc>
		<lastmod>2018-03-14T08:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-fbis-10-most-wanted-black-hat-hackers-10/</loc>
		<lastmod>2018-03-14T10:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/smart-dns-resolution-for-a-better-safer-internet/</loc>
		<lastmod>2018-03-14T11:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-600-companies-paypal-shares-your-data-with/</loc>
		<lastmod>2018-03-14T11:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/malware-code-testing-russian-developer-pleads-guilty-to-conspiracy-and-computer-intrusion/</loc>
		<lastmod>2018-03-14T12:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/jumpstart-incident-response/</loc>
		<lastmod>2018-03-14T12:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/is-your-smart-home-a-secure-home-avast/</loc>
		<lastmod>2018-03-14T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-hack-android-devices-using-the-stagefright-vulnerability/</loc>
		<lastmod>2018-03-14T13:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/kerfuffle-of-ryzen/</loc>
		<lastmod>2018-03-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/with-spoofed-calls-on-the-rise-fcc-seeks-new-id-authentication-program/</loc>
		<lastmod>2018-03-14T14:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/changes-to-data-breach-notifications-in-the-air/</loc>
		<lastmod>2018-03-14T15:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/choosing-the-right-ddos-solution-part-i-on-prem-appliance/</loc>
		<lastmod>2018-03-14T15:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mac-developer-slides-in-crypto-miner-in-exchange-for-premium-features-apple-doesnt-mind/</loc>
		<lastmod>2018-03-14T15:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/qa-series-with-rsac-ambassador-chester-wisniewski/</loc>
		<lastmod>2018-03-14T16:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bssides-pdx-jack-rhysiders-weird-and-radical-security-policies-that-work/</loc>
		<lastmod>2018-03-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/context-is-crucial-when-it-comes-to-cloud-security/</loc>
		<lastmod>2018-03-14T18:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ssd-advisory-appweb-authentication-bypass-digest-basic-and-forms/</loc>
		<lastmod>2018-03-14T19:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day/</loc>
		<lastmod>2018-03-14T19:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/more-leaks-from-equifax-breach/</loc>
		<lastmod>2018-03-14T20:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/joining-forces-with-palo-alto-networks/</loc>
		<lastmod>2018-03-14T20:15:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-arrrrrr/</loc>
		<lastmod>2018-03-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/key-takeaways-using-a-blacklist-of-stolen-passwords-webinar/</loc>
		<lastmod>2018-03-14T21:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/advance-persistent-threat-lateral-movement-detection-in-windows-infrastructure-part-i/</loc>
		<lastmod>2018-03-14T22:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/top-10-things-to-look-for-or-avoid-when-choosing-a-pen-testing-vendor/</loc>
		<lastmod>2018-03-14T22:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/babys-first-threat-assessment/</loc>
		<lastmod>2018-03-14T22:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/broadpwn-wi-fi-vulnerability-how-to-detect-mitigate/</loc>
		<lastmod>2018-03-14T23:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/principle-software-development-engineer-microsoft-research/</loc>
		<lastmod>2018-03-14T23:44:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/basic-principles-of-ensuring-ios-apps-security/</loc>
		<lastmod>2018-03-15T00:10:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/survey-majority-of-americans-unconcerned-by-travel-cybersecurity-risks/</loc>
		<lastmod>2018-03-15T03:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/zero-exposure-team-advisory-micro-focus-operations-orchestration-remote-denial-of-service-dos-vulnerability/</loc>
		<lastmod>2018-03-15T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/nearly-all-cybersecurity-workers-on-the-job-hunt/</loc>
		<lastmod>2018-03-15T10:38:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/acunetix-receives-software-informer-editors-pick-award/</loc>
		<lastmod>2018-03-15T11:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/artificial-intelligence-and-the-attack-defense-balance/</loc>
		<lastmod>2018-03-15T11:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/unique-data-exfiltration-method-makes-pinkkite-pos-malware-stand-out/</loc>
		<lastmod>2018-03-15T11:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/introducing-ca-veracode-verified/</loc>
		<lastmod>2018-03-15T11:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-monero-mining-malware-discovered-in-google-play/</loc>
		<lastmod>2018-03-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/comparing-mobile-web-application-penetration-testing/</loc>
		<lastmod>2018-03-15T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securityiq-awareness-training-library-grows-to-1200-resources/</loc>
		<lastmod>2018-03-15T12:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-secure-permissioned-blockchains/</loc>
		<lastmod>2018-03-15T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/extracting-secrets/</loc>
		<lastmod>2018-03-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/when-training-does-not-equal-security/</loc>
		<lastmod>2018-03-15T14:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/enterprise-security-weekly-81/</loc>
		<lastmod>2018-03-15T14:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/poisoned-bittorrent-client-kickstarted-malware-outbreak-that-tried-to-infect-400000-pcs/</loc>
		<lastmod>2018-03-15T14:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/captcha-limitations-of-bot-mitigation/</loc>
		<lastmod>2018-03-15T15:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/nist-cybersecurity-framework-getting-a-facelift-looking-to-make-adoption-easier/</loc>
		<lastmod>2018-03-15T16:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/see-you-at-rsa-2018-where-the-world-talks-security/</loc>
		<lastmod>2018-03-15T16:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amd-flaws-technical-summary/</loc>
		<lastmod>2018-03-15T17:58:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-adam-cecchettis-security-is-a-snapshot-in-time-so-how-do-we-keep-up/</loc>
		<lastmod>2018-03-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hackers-continue-to-exploit-hijacked-mailchimp-accounts-in-cybercrime-campaigns/</loc>
		<lastmod>2018-03-15T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-gdpr-vs-australian-data-privacy-regulations/</loc>
		<lastmod>2018-03-15T20:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-six-types-of-cyberattacks/</loc>
		<lastmod>2018-03-15T20:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/us-power-company-fined-2-7m-for-failing-to-comply-with-energy-industry-cyber-standards/</loc>
		<lastmod>2018-03-15T20:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/manny-franciscos-rip-stephen-hawking/</loc>
		<lastmod>2018-03-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/github-hosts-infostealer/</loc>
		<lastmod>2018-03-15T23:20:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-test-for-a-dns-leak-with-legitimate-results/</loc>
		<lastmod>2018-03-16T04:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/interesting-article-on-marcus-hutchins/</loc>
		<lastmod>2018-03-16T11:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/for-the-first-time-dhs-and-fbi-accuse-russia-of-hacking-u-s-energy-organizations/</loc>
		<lastmod>2018-03-16T11:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/</loc>
		<lastmod>2018-03-16T11:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/these-arent-the-password-guidelines-youre-looking-for/</loc>
		<lastmod>2018-03-16T13:14:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/who-is-afraid-of-more-spams-and-scams/</loc>
		<lastmod>2018-03-16T13:55:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/one-of-many/</loc>
		<lastmod>2018-03-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/students-to-demonstrate-cybersecurity-skills-in-annual-hacker-contest/</loc>
		<lastmod>2018-03-16T14:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/russia-behind-attacks-on-us-critical-industries/</loc>
		<lastmod>2018-03-16T15:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/unlocking-the-iphone-weve-been-here-before/</loc>
		<lastmod>2018-03-16T15:09:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bens-book-of-the-month-review-of-the-eu-general-data-protection-regulation-gdpr-a-practical-guide/</loc>
		<lastmod>2018-03-16T16:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-robert-sells-exploits-in-wetware-defcon-se-ctf-experience/</loc>
		<lastmod>2018-03-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/16th-march-2018-resources-updates/</loc>
		<lastmod>2018-03-16T20:20:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/7-questions-to-ask-about-your-devsecops-program/</loc>
		<lastmod>2018-03-16T20:44:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-elon-musk-q-a/</loc>
		<lastmod>2018-03-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/9-cyber-security-tips-smbs-can-implement-now/</loc>
		<lastmod>2018-03-16T21:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/friday-squid-blogging-new-squid-species-discovered-in-australia/</loc>
		<lastmod>2018-03-16T21:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-cost-of-gdpr-non-compliance/</loc>
		<lastmod>2018-03-16T21:20:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/casp-domain-1-enterprise-security/</loc>
		<lastmod>2018-03-16T21:38:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/casp-domain-2-risk-management-and-incident-response/</loc>
		<lastmod>2018-03-16T22:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/casp-domain-3-research-and-analysis/</loc>
		<lastmod>2018-03-16T22:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cloud-security-this-week-march-16-2018/</loc>
		<lastmod>2018-03-16T22:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-cure-for-the-common-cold-call-freeze-them-out/</loc>
		<lastmod>2018-03-16T23:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hunting-down-gooligan-retrospective-analysis/</loc>
		<lastmod>2018-03-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-whois-enfeeblement/</loc>
		<lastmod>2018-03-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-karl-fosaaens-speaking-to-a-city-of-amazon-echoes/</loc>
		<lastmod>2018-03-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/android-antics-and-macos-malware/</loc>
		<lastmod>2018-03-17T19:14:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/17th-march-2018-resources-and-article-updates/</loc>
		<lastmod>2018-03-17T20:40:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-advantage/</loc>
		<lastmod>2018-03-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/weekly-cyber-risk-roundup-russia-sanctions-mossack-fonseca-shutdown-equifax-insider-trading/</loc>
		<lastmod>2018-03-17T21:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mind-the-shells-windows-powershell-credential-social-engineering-two-step/</loc>
		<lastmod>2018-03-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/employees-are-biggest-threat-to-healthcare-data-security/</loc>
		<lastmod>2018-03-18T14:06:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tax-phishing-scams-are-back-here-are-3-to-watch-out-for/</loc>
		<lastmod>2018-03-18T14:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-joe-grands-hacking-a-tooth-tunes-toothbrush-for-a-positive-dental-outlook/</loc>
		<lastmod>2018-03-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hawking-oliver-schooled/</loc>
		<lastmod>2018-03-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cryptocurrencies-last-week-tonight-with-john-oliver/</loc>
		<lastmod>2018-03-18T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/avast-named-a-crn-coolest-endpoint-security-provider-avast-business/</loc>
		<lastmod>2018-03-19T02:40:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/five-endpoint-threats-affecting-small-businesses-avast-business/</loc>
		<lastmod>2018-03-19T02:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securing-your-sme-in-an-online-world/</loc>
		<lastmod>2018-03-19T03:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-evidence-is-in-the-numbers-we-need-more-cyber-security-professionals/</loc>
		<lastmod>2018-03-19T03:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/adrian-lamo-homeless-hacker-who-turned-in-chelsea-manning-dead-at-37/</loc>
		<lastmod>2018-03-19T03:53:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-shared-security-weekly-blaze-the-insecure-internet-of-things-spectre-patch-updates-android-malware/</loc>
		<lastmod>2018-03-19T04:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/uk-c-suite-actively-flaunting-infosec-rules-bitdefender-small-gains-big-wins-study-reveals/</loc>
		<lastmod>2018-03-19T08:50:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/clearswift-wins-gold-and-silver-at-2018-info-security-products-guide-global-excellence-awards/</loc>
		<lastmod>2018-03-19T10:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-launches-limited-time-bug-bounty-program-for-bugs-like-spectre-and-meltdown/</loc>
		<lastmod>2018-03-19T11:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/eurononsense-hitchhikers-guide-to-the-end-of-planet-whois/</loc>
		<lastmod>2018-03-19T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebook-caught-up-in-political-data-scandal-denies-data-breach/</loc>
		<lastmod>2018-03-19T14:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/using-machine-learning-to-find-fake-myetherwallet-apps/</loc>
		<lastmod>2018-03-19T14:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/misti-phish-are-king-but-what-comes-next/</loc>
		<lastmod>2018-03-19T14:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/firestarter-auditors-assessors-and-cloud-oh-my/</loc>
		<lastmod>2018-03-19T15:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/alleged-north-korean-threat-actor-targets-select-victims-with-another-critical-zero-day-vulnerability-attack/</loc>
		<lastmod>2018-03-19T16:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/self-driving-uber-murders-pedestrian/</loc>
		<lastmod>2018-03-19T16:55:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/site-transfer/</loc>
		<lastmod>2018-03-19T17:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/do-it-pros-consider-security-when-purchasing-software/</loc>
		<lastmod>2018-03-19T17:05:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/audit-ready-compliance-is-a-team-sport/</loc>
		<lastmod>2018-03-19T17:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/investors-concerned-about-smartphone-addiction-apple-responds-with-new-webpage/</loc>
		<lastmod>2018-03-19T17:56:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-week-in-security-march-12-march-18/</loc>
		<lastmod>2018-03-19T17:56:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-beths-including-kate-libby/</loc>
		<lastmod>2018-03-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/data-security-solutions-for-gdpr-compliance/</loc>
		<lastmod>2018-03-19T18:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/inside-gdpr-what-does-it-mean-for-u-s-based-companies/</loc>
		<lastmod>2018-03-19T20:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-smart-home-security/</loc>
		<lastmod>2018-03-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/when-information-leaks-avast/</loc>
		<lastmod>2018-03-19T22:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cybercriminals-use-bitcoin-as-one-method-of-laundering-money-part-1/</loc>
		<lastmod>2018-03-19T22:24:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-take-why-crypto-jacking-is-spreading-faster-than-ransomware-and-may-be-more-insidious/</loc>
		<lastmod>2018-03-19T22:53:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-your-organization-needs-to-measure-risks/</loc>
		<lastmod>2018-03-19T22:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/preventing-azure-storage-breaches/</loc>
		<lastmod>2018-03-20T03:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-use-nists-cybersecurity-framework-to-protect-against-integrity-themed-threats/</loc>
		<lastmod>2018-03-20T03:39:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-next-generation-of-id-card-printing-small-font-printing/</loc>
		<lastmod>2018-03-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-it-shouldnt-just-be-the-jewel-in-your-crown-but-your-partners-and-suppliers-too/</loc>
		<lastmod>2018-03-20T08:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/puresec-announces-ran-nahmias-as-vp-business-development-sales/</loc>
		<lastmod>2018-03-20T09:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/microsoft-security-intelligence-report-v23-available/</loc>
		<lastmod>2018-03-20T09:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/next-gen-firewalls/</loc>
		<lastmod>2018-03-20T10:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/dan-geer-on-the-dangers-of-computer-only-systems/</loc>
		<lastmod>2018-03-20T11:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-i-encrypted-your-ebs-application-password/</loc>
		<lastmod>2018-03-20T12:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/frost-bank-detects-unauthorized-access-that-could-have-exposed-check-images/</loc>
		<lastmod>2018-03-20T12:26:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/create-a-team-for-audit-analytics-part-3/</loc>
		<lastmod>2018-03-20T12:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/omnichannel-fraud-prevention-managing-risk-in-a-digital-age/</loc>
		<lastmod>2018-03-20T13:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-20-penetration-tests-and-red-team-exercises/</loc>
		<lastmod>2018-03-20T13:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ca-veracode-named-a-leader-in-the-gartner-magic-quadrant-for-application-security-for-the-fifth-report-in-a-row/</loc>
		<lastmod>2018-03-20T13:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-fifty-million-of-cambridge-analytica/</loc>
		<lastmod>2018-03-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-role-of-mobile-during-authentication/</loc>
		<lastmod>2018-03-20T14:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/infosec-institute-partners-with-issa-international/</loc>
		<lastmod>2018-03-20T14:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/1-cyber-security-threat-protecting-your-organization-against-email-based-attacks/</loc>
		<lastmod>2018-03-20T14:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/speeding-up-and-cleaning-your-mac-avast-essential-guide/</loc>
		<lastmod>2018-03-20T14:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-evolution-of-a-threat-intelligence-feed/</loc>
		<lastmod>2018-03-20T14:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/laundering-via-in-game-currency-and-goods-is-on-the-rise-part-2/</loc>
		<lastmod>2018-03-20T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-digital-entropy-of-death-link-rot/</loc>
		<lastmod>2018-03-20T15:27:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bomb-hoax-targeting-schools/</loc>
		<lastmod>2018-03-20T16:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/five-security-problems-you-dont-know-you-should-be-worried-about-and-what-you-can-do-about-them/</loc>
		<lastmod>2018-03-20T16:03:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/critical-security-controls-v7-released/</loc>
		<lastmod>2018-03-20T17:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/15-year-old-finds-flaw-in-ledger-crypto-wallet/</loc>
		<lastmod>2018-03-20T17:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/fakebank-android-variant-warning-while-safari-swipes-supercookies/</loc>
		<lastmod>2018-03-20T17:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-don-jones-unconscious-bias-how-do-you-start-to-break-habits-you-didnt-know-you-had/</loc>
		<lastmod>2018-03-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-survey-75-of-middle-east-oil-gas-companies-have-suffered-a-security-compromise/</loc>
		<lastmod>2018-03-20T19:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/quadrooter-attack-overview-vulnerabilities-methods-mitigations/</loc>
		<lastmod>2018-03-20T19:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/qa-how-crypto-jackers-drain-computing-power-from-business-networks/</loc>
		<lastmod>2018-03-20T20:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-robot-future/</loc>
		<lastmod>2018-03-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-ransomware-threat-to-ics-security/</loc>
		<lastmod>2018-03-21T03:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/semafone-identifies-five-insider-threats-to-the-contact-centre/</loc>
		<lastmod>2018-03-21T10:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/enterprise-cloud-security-and-all-that-jazz/</loc>
		<lastmod>2018-03-21T10:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/israeli-security-attacks-amd-by-publishing-zero-day-exploits/</loc>
		<lastmod>2018-03-21T11:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tripwire-patch-priority-index-for-march-2018/</loc>
		<lastmod>2018-03-21T11:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hijacking-computers-for-cryptocurrency-mining/</loc>
		<lastmod>2018-03-21T11:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-19-incident-response-and-management/</loc>
		<lastmod>2018-03-21T12:23:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/web-conference-report-deploying-containers-in-the-age-of-gdpr/</loc>
		<lastmod>2018-03-21T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/zero-trust-and-the-slowly-boiled-frog/</loc>
		<lastmod>2018-03-21T13:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securing-serverless-blog-series-episode-0x05-when-developers-close-a-door-they-always-open-a-window/</loc>
		<lastmod>2018-03-21T13:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/confidence-in-canadian-business-data-safeguards-erodes-as-identity-theft-concerns-rise/</loc>
		<lastmod>2018-03-21T13:32:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sql-security-chronicles/</loc>
		<lastmod>2018-03-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/putinstresser-eu-a-simple-and-powerful-booter-and-stresser-service/</loc>
		<lastmod>2018-03-21T14:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/paymnts-on-semafones-dos-donts-of-the-voice-challenge-with-amazon-alexa/</loc>
		<lastmod>2018-03-21T14:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/your-app-is-leaking-data-its-just-a-question-of-how-badly/</loc>
		<lastmod>2018-03-21T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securing-netsparker-cloud-by-restricting-ip-addresses/</loc>
		<lastmod>2018-03-21T15:09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amd-downplays-cpu-flaw-discovery-says-hackers-would-need-admin-rights-anyway/</loc>
		<lastmod>2018-03-21T15:45:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amd-has-confirmed-flaws-will-be-patched-no-performance-hit/</loc>
		<lastmod>2018-03-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/qa-series-with-rsac-ambassador-james-lyne/</loc>
		<lastmod>2018-03-21T16:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-use-alientvault-siem-for-threat-detection-incident-response/</loc>
		<lastmod>2018-03-21T16:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/professionally-evil-support-educating-your-family-on-the-basics/</loc>
		<lastmod>2018-03-21T17:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-micah-scotts-saturday-keynote-scanlime/</loc>
		<lastmod>2018-03-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/expert-interview-leveraging-threat-intelligence-for-better-incident-response/</loc>
		<lastmod>2018-03-21T18:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-unpatched-systems-are-a-security-risk/</loc>
		<lastmod>2018-03-21T18:26:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/expert-tips-on-incident-response-planning-communication/</loc>
		<lastmod>2018-03-21T18:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-complete-a-vulnerability-assessment-with-nessus/</loc>
		<lastmod>2018-03-21T18:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/podcast-appsecs-effect-on-the-bottom-line/</loc>
		<lastmod>2018-03-21T18:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/5-new-threats-every-organization-should-be-prepared-for-in-2018/</loc>
		<lastmod>2018-03-21T18:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-digital-payment-systems-like-paypal-are-used-for-money-laundering-part-3/</loc>
		<lastmod>2018-03-21T18:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/penetration-testing-methodology-for-mobile-applications-5-key-steps/</loc>
		<lastmod>2018-03-21T19:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cyberbyte-steals-malwarebytes-intellectual-property/</loc>
		<lastmod>2018-03-21T19:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/crisc-domain-2-it-risk-assessment/</loc>
		<lastmod>2018-03-21T19:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-the-trailblazer-community-survey-helped-the-salesforceohana-at-snowforce/</loc>
		<lastmod>2018-03-21T19:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/10-steps-to-detect-lateral-movement-in-a-data-breach/</loc>
		<lastmod>2018-03-21T19:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/computer-forensic-report-writing-and-presentation/</loc>
		<lastmod>2018-03-21T20:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/navy-ngen-r-new-network-usual-suspects/</loc>
		<lastmod>2018-03-21T20:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-not-available/</loc>
		<lastmod>2018-03-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/free-lunch/</loc>
		<lastmod>2018-03-21T21:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-guide-to-preventing-common-security-misconfigurations/</loc>
		<lastmod>2018-03-21T21:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/wireshark-an-open-source-forensic-tool/</loc>
		<lastmod>2018-03-21T21:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/consumers-can-lead-the-way-in-pressuring-tech-companies-to-respect-security-and-democracy-avast/</loc>
		<lastmod>2018-03-21T21:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/amd-flaws-acknowledged/</loc>
		<lastmod>2018-03-21T21:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/predicting-the-future-of-ransomware-and-crypto-mining-in-the-cloud/</loc>
		<lastmod>2018-03-21T22:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/casp-domain-4-integration-of-computing-communications-and-business-disciplines/</loc>
		<lastmod>2018-03-21T22:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/convenience-vs-privacy-the-facebook-situation-avast/</loc>
		<lastmod>2018-03-21T23:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/incidents-happen-but-are-some-of-them-avoidable/</loc>
		<lastmod>2018-03-22T00:21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/github-hosts-infostealers-part-2-cryptominers-and-credit-card-stealers/</loc>
		<lastmod>2018-03-22T02:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/do-they-have-ai-or-that-rant-on-ai-in-security/</loc>
		<lastmod>2018-03-22T03:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/small-gains-big-wins-security-threats-cause-sleepless-nights-for-uk-cisos/</loc>
		<lastmod>2018-03-22T07:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/q4-2017-global-ddos-threat-landscape-report/</loc>
		<lastmod>2018-03-22T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/whatever-the-future-of-payments-you-can-trust-in-a-lack-of-trust/</loc>
		<lastmod>2018-03-22T09:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc>
		<lastmod>2018-03-22T10:50:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/researchers-can-earn-up-to-15k-in-netflixs-new-public-bug-bounty-program/</loc>
		<lastmod>2018-03-22T11:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-18-application-software-security/</loc>
		<lastmod>2018-03-22T11:38:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/dynamic-abap-calls/</loc>
		<lastmod>2018-03-22T11:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/travel-site-orbitz-warns-data-breach-may-have-exposed-880000-payment-card-details/</loc>
		<lastmod>2018-03-22T13:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-legitimacy-of-cryptocurrency-has-made-it-harder-for-hackers/</loc>
		<lastmod>2018-03-22T13:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/880000-payment-cards-data-breached-in-orbitz-security-incident/</loc>
		<lastmod>2018-03-22T13:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sacre-bleu-tamper-proof-cryptocash-wallet-tampered-with/</loc>
		<lastmod>2018-03-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/survey-americans-spent-1-4b-on-credit-freeze-fees-in-wake-of-equifax-breach/</loc>
		<lastmod>2018-03-22T14:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/reverse-engineering-the-cuban-sonic-weapon/</loc>
		<lastmod>2018-03-22T14:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sven-morgenroth-explains-demos-same-origin-policy-and-how-to-circumvent-it/</loc>
		<lastmod>2018-03-22T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-champions-a-scalable-approach-for-securing-devops/</loc>
		<lastmod>2018-03-22T15:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/human-threats-facing-healthcare-organizations/</loc>
		<lastmod>2018-03-22T16:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/siri-leak/</loc>
		<lastmod>2018-03-22T16:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-matt-davis-utilizing-high-entropy-stack-canaries-for-locating-function-return-addresses/</loc>
		<lastmod>2018-03-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/post-of-the-week-saml-idp-and-sp-on-one-big-ip/</loc>
		<lastmod>2018-03-22T18:24:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ddos-attacks-are-growing-what-can-businesses-do/</loc>
		<lastmod>2018-03-22T18:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tpm-a-powerful-inexpensive-security-building-block/</loc>
		<lastmod>2018-03-22T19:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/city-of-atlanta-computer-systems-reportedly-hit-by-cyber-attack/</loc>
		<lastmod>2018-03-22T20:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-a-breach-at-facebook/</loc>
		<lastmod>2018-03-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/key-vulnerabilities-devices-and-people-avast-business/</loc>
		<lastmod>2018-03-22T21:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/use-our-suite-of-ethereum-security-tools/</loc>
		<lastmod>2018-03-23T04:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-are-10-signs-you-need-to-be-more-direct/</loc>
		<lastmod>2018-03-23T06:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/19-of-ohio-state-university-students-clicked-on-links-in-phishing-simulation/</loc>
		<lastmod>2018-03-23T11:08:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/greykey-iphone-unlocker/</loc>
		<lastmod>2018-03-23T11:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/malicious-cryptominer-in-wireless-networks/</loc>
		<lastmod>2018-03-23T12:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/contact-centres-com-on-semafones-5-insider-threats-for-contact-centres/</loc>
		<lastmod>2018-03-23T12:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/guccifer-2-0s-schoolboy-error-reveals-hes-hacking-from-moscow/</loc>
		<lastmod>2018-03-23T12:53:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/end-of-an-era/</loc>
		<lastmod>2018-03-23T13:24:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/city-of-atlanta-systems-infected-with-ransomware-sensitive-data-at-risk/</loc>
		<lastmod>2018-03-23T13:51:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-1400000000-windfall/</loc>
		<lastmod>2018-03-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-does-the-gdpr-consider-to-be-a-data-breach/</loc>
		<lastmod>2018-03-23T14:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/san-diego-sues-experian-over-id-theft-service/</loc>
		<lastmod>2018-03-23T16:31:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/celebrating-stephen-hawking-with-a-419-scam/</loc>
		<lastmod>2018-03-23T16:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/looking-ahead-to-rsa-talking-open-source-components/</loc>
		<lastmod>2018-03-23T16:55:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/update-on-meltdown-and-spectre-exploits/</loc>
		<lastmod>2018-03-23T17:09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/life-cycle-of-a-web-app-0-day/</loc>
		<lastmod>2018-03-23T17:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/computer-forensics-chain-of-custody/</loc>
		<lastmod>2018-03-23T17:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-dan-andersons-breaking-crypto-with-randomness/</loc>
		<lastmod>2018-03-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/on-mimes-software-versions-and-web-site-promiscuity-a-k-a-three-new-packages-to-round-out-the-week/</loc>
		<lastmod>2018-03-23T18:06:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/computer-forensics-embedded-device-analysis-and-examination-steps/</loc>
		<lastmod>2018-03-23T18:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/could-facebook-data-leak-be-turning-point-in-privacy-debate/</loc>
		<lastmod>2018-03-23T20:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-brief-history-of-stephen-hawking/</loc>
		<lastmod>2018-03-23T20:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-zuckerbergs-apology/</loc>
		<lastmod>2018-03-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/friday-squid-blogging-giant-squid-stealing-food-from-each-other/</loc>
		<lastmod>2018-03-23T21:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/when-the-hurricane-hits-whats-your-plan/</loc>
		<lastmod>2018-03-23T21:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/more-on-that-siri-silliness/</loc>
		<lastmod>2018-03-23T21:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cloud-security-this-week-march-23-2018/</loc>
		<lastmod>2018-03-23T22:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tech-companies-wrestle-with-keeping-users-safe-avast/</loc>
		<lastmod>2018-03-24T01:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-you-should-not-trust-your-weather-app/</loc>
		<lastmod>2018-03-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/zeynep-tufekci-on-facebook-and-cambridge-analytica/</loc>
		<lastmod>2018-03-24T17:49:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-kelly-shortriges-big-game-theory-hunting-the-peculiarities-of-human-behavior-in-the-infosec-game/</loc>
		<lastmod>2018-03-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/our-strategy/</loc>
		<lastmod>2018-03-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/weekly-cyber-risk-roundup-orbitz-breach-facebook-privacy-fallout/</loc>
		<lastmod>2018-03-25T03:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/grud/</loc>
		<lastmod>2018-03-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-anna-trikalinou-and-dan-lakes-taking-dma-attacks-to-the-next-level/</loc>
		<lastmod>2018-03-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/daniel-storis-ruby-concurrency-book/</loc>
		<lastmod>2018-03-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-shared-security-weekly-blaze-facebook-and-the-cambridge-analytica-controversy-vulnerable-vpns-siri-lock-screen-privacy/</loc>
		<lastmod>2018-03-26T04:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/semafone-named-finalist-in-2018-pymnts-voice-challenge-with-amazon-alexa/</loc>
		<lastmod>2018-03-26T08:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebook-accused-of-secretly-collecting-user-text-and-call-data/</loc>
		<lastmod>2018-03-26T11:57:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/who-and-what-is-coinhive/</loc>
		<lastmod>2018-03-26T12:12:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cobalt-carbanak-malware-group-leader-arrested-in-spain/</loc>
		<lastmod>2018-03-26T12:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-the-s-in-citrix-synergy-2018/</loc>
		<lastmod>2018-03-26T12:26:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/se-at-the-nation-state-level/</loc>
		<lastmod>2018-03-26T13:17:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-17-implement-a-security-awareness-and-training-program/</loc>
		<lastmod>2018-03-26T13:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/crypto-zealots/</loc>
		<lastmod>2018-03-26T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/quantifying-financial-risk-exposure-to-cyber-attacks/</loc>
		<lastmod>2018-03-26T14:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/adding-backdoors-at-the-chip-level/</loc>
		<lastmod>2018-03-26T14:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bromium-vs-remote-browsers-downloads-make-the-difference/</loc>
		<lastmod>2018-03-26T15:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/malicious-cryptomining-and-the-blacklist-conundrum/</loc>
		<lastmod>2018-03-26T15:26:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/review-istorage-diskashur-pro-2-portable-ssd/</loc>
		<lastmod>2018-03-26T15:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-rsa-conference-2018-keynote-line-up/</loc>
		<lastmod>2018-03-26T16:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/slingshot-malware-uses-iot-device-in-targeted-attacks/</loc>
		<lastmod>2018-03-26T16:19:01+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Slingshot-Malware.jpg</image:loc>
			<image:title><![CDATA[Slingshot Malware]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-facebooks-cambridge-analytica-problem-means-for-your-data/</loc>
		<lastmod>2018-03-26T16:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/protecting-voice-payments-with-3-little-words-in-the-amazon-alexa-voice-challenge/</loc>
		<lastmod>2018-03-26T17:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-philippe-laulherets-lets-learn-mips-and-japanese/</loc>
		<lastmod>2018-03-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/trusted-computing-group-welcomes-korea-internet-and-security-agency-kisa-as-a-government-liaison-member/</loc>
		<lastmod>2018-03-26T18:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-week-in-security-march-19-march-25/</loc>
		<lastmod>2018-03-26T18:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/forrester-urges-organizations-to-use-cloud-to-cloud-backup-for-saas-data-protection/</loc>
		<lastmod>2018-03-26T18:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/4-reasons-for-slow-mobile-internet-speeds/</loc>
		<lastmod>2018-03-26T20:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-joy-of-tech-why-are-you-still-on-facebook/</loc>
		<lastmod>2018-03-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/8-reasons-to-use-a-vpn-avast/</loc>
		<lastmod>2018-03-26T21:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-is-virtual-hardening/</loc>
		<lastmod>2018-03-26T22:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/emergency-vs-continuous-incident-response/</loc>
		<lastmod>2018-03-27T00:12:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/silent-librarian-more-to-the-story-of-the-iranian-mabna-institute-indictment/</loc>
		<lastmod>2018-03-27T00:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-in-nessus-elliptic-curve-cryptography-with-ssh/</loc>
		<lastmod>2018-03-27T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-research-ideas-to-improve-post-graduation-outcomes/</loc>
		<lastmod>2018-03-27T04:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/edge-computing-and-the-future-of-iot/</loc>
		<lastmod>2018-03-27T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/qr-code-bug-in-ios-11-tricks-camera-app-to-open-unpredictable-websites/</loc>
		<lastmod>2018-03-27T08:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/anti-social-media/</loc>
		<lastmod>2018-03-27T09:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebook-cambridge-analytica-data-breach/</loc>
		<lastmod>2018-03-27T10:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/atlanta-struggling-to-recover-from-ransomware-infection-days-after-attack/</loc>
		<lastmod>2018-03-27T12:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/6-steps-for-gdpr-readiness/</loc>
		<lastmod>2018-03-27T12:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/coin-miner-reports-outrank-ransomware-by-two-orders-of-magnitude-according-to-bitdefender-telemetry/</loc>
		<lastmod>2018-03-27T13:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-manga-of-the-cyber-army-of-the-united-states-of-america/</loc>
		<lastmod>2018-03-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/automation-in-software-defined-data-centers/</loc>
		<lastmod>2018-03-27T14:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/get-the-real-scoop-office-365-backup-policies-how-to-fully-protect-your-data/</loc>
		<lastmod>2018-03-27T14:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/fooling-face-recognition-with-infrared-light/</loc>
		<lastmod>2018-03-27T14:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/devsecops-beyond-the-myths-cutting-through-the-hype-and-getting-to-results/</loc>
		<lastmod>2018-03-27T14:37:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-16-account-monitoring-and-control/</loc>
		<lastmod>2018-03-27T14:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/creator-of-cryptocurrency-miner-coinhive-reveals-his-identity/</loc>
		<lastmod>2018-03-27T14:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/web-application-firewalls-the-definitive-primer/</loc>
		<lastmod>2018-03-27T15:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/improved-cybersecurity-measures-for-better-organizations/</loc>
		<lastmod>2018-03-27T16:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-six-biggest-inside-threats-to-law-firm-it/</loc>
		<lastmod>2018-03-27T16:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/can-the-washington-d-c-metroplex-become-a-major-hub-for-cybersecurity-startups/</loc>
		<lastmod>2018-03-27T16:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/encryption-101-decryptors-thought-process/</loc>
		<lastmod>2018-03-27T16:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/trusted-computing-group-announces-storage-certification-program-and-releases-storage-test-cases-specification/</loc>
		<lastmod>2018-03-27T17:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bsides-pdx-alexei-kojenov-and-alex-ivkins-hacking-a-hackathon-for-fun-and-profit/</loc>
		<lastmod>2018-03-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/api-security-scanning-how-is-it-done-the-right-way/</loc>
		<lastmod>2018-03-27T18:06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/3-big-ways-youre-losing-business-with-old-tech/</loc>
		<lastmod>2018-03-27T18:32:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/mickey-bresman-discusses-why-hacker-attacks-on-active-directory-are-increasing/</loc>
		<lastmod>2018-03-27T18:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-guide-to-xml-file-structure-external-entity-xxe-attacks/</loc>
		<lastmod>2018-03-27T19:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/10-best-practices-for-mobile-app-penetration-testing/</loc>
		<lastmod>2018-03-27T19:52:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-set-up-a-web-app-pentesting-lab-in-4-easy-steps/</loc>
		<lastmod>2018-03-27T20:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-personal-data/</loc>
		<lastmod>2018-03-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-next-start-up-bit-discovery/</loc>
		<lastmod>2018-03-27T21:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-study-in-exploit-development-part-1-setup-and-proof-of-concept/</loc>
		<lastmod>2018-03-27T21:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ietf-network-working-group-slated-to-consider-the-holy-hand-grenade-of-antioch-aka-draft-camelot-holy-grenade-00/</loc>
		<lastmod>2018-03-27T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/cambridge-analytica-the-devil-is-in-the-contractual-details/</loc>
		<lastmod>2018-03-28T03:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tcg-kisa-5133/</loc>
		<lastmod>2018-03-28T05:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-enterprises-should-control-their-encryption-keys/</loc>
		<lastmod>2018-03-28T08:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/small-gains-big-wins-when-facing-cyber-threats-a-swift-response-could-save-your-company/</loc>
		<lastmod>2018-03-28T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/applying-rop-chaining-concepts-to-serverless-functions/</loc>
		<lastmod>2018-03-28T10:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tracing-stolen-bitcoin/</loc>
		<lastmod>2018-03-28T11:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/limited-breach-detected-on-system-supporting-baltimores-911-emergency-services/</loc>
		<lastmod>2018-03-28T11:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/20-critical-security-controls-control-15-wireless-access-control/</loc>
		<lastmod>2018-03-28T11:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-is-doxxing-and-how-to-avoid-it/</loc>
		<lastmod>2018-03-28T13:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/privileged-identity-management-set-to-rise-through-2022/</loc>
		<lastmod>2018-03-28T13:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/illuminating-the-path-to-digital-maturity/</loc>
		<lastmod>2018-03-28T13:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/its-complicated-operational-security-for-developers/</loc>
		<lastmod>2018-03-28T14:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/offensivecon-2018-building-a-zero-day-machine/</loc>
		<lastmod>2018-03-28T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-mikrotik-routeros-based-botnet/</loc>
		<lastmod>2018-03-28T15:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/making-the-grade-achieve-ssl-labs-a-grade-with-imperva-waf/</loc>
		<lastmod>2018-03-28T15:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-nonattribution-approximation/</loc>
		<lastmod>2018-03-28T15:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/evident-gdpr-report-delivers-automated-approach-to-compliance-monitoring-and-management/</loc>
		<lastmod>2018-03-28T15:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/upcoming-webinar-prepare-your-security-operations-for-orchestration-and-automation-tools/</loc>
		<lastmod>2018-03-28T15:54:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/10-ways-to-protect-your-android-phone/</loc>
		<lastmod>2018-03-28T16:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/countdown-to-gdpr-5-data-security-and-privacy-policies/</loc>
		<lastmod>2018-03-28T17:23:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/burp-suite-continuing-the-saga/</loc>
		<lastmod>2018-03-28T18:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/56-of-orgs-hit-with-ransomware-attack-in-the-past-year-finds-new-survey/</loc>
		<lastmod>2018-03-28T20:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/samsam-ransomware-how-to-identify-and-mitigate-the-risk/</loc>
		<lastmod>2018-03-28T21:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/an-in-depth-malware-analysis-of-quantloader/</loc>
		<lastmod>2018-03-28T23:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/my-take-why-googles-move-to-label-non-https-sites-not-secure-is-a-good-thing/</loc>
		<lastmod>2018-03-29T00:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-checklist-for-online-gaming-privacy/</loc>
		<lastmod>2018-03-29T03:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/annual-report-shows-increased-maturity-in-security-operations/</loc>
		<lastmod>2018-03-29T07:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/leveraging-tokenization-services-from-the-major-card-brands/</loc>
		<lastmod>2018-03-29T08:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-fbis-10-most-wanted-black-hat-hackers-9-and-8/</loc>
		<lastmod>2018-03-29T10:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/r%e2%81%b6-capturing-youtube-captions/</loc>
		<lastmod>2018-03-29T11:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebook-to-include-data-misuse-issues-in-bug-bounty-program/</loc>
		<lastmod>2018-03-29T12:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/limited-intrusion-detected-at-boeing-company-says-wannacry-articles-are-overstated-and-inaccurate/</loc>
		<lastmod>2018-03-29T12:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/another-branch-prediction-attack/</loc>
		<lastmod>2018-03-29T12:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/omitting-the-o-in-com-could-be-costly/</loc>
		<lastmod>2018-03-29T13:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-you-should-never-pass-untrusted-data-to-unserialize-when-writing-php-code/</loc>
		<lastmod>2018-03-29T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/choosing-the-right-ddos-solution-part-ii-on-demand-cloud-service/</loc>
		<lastmod>2018-03-29T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-universities-should-respond-to-iranian-hacking-charges/</loc>
		<lastmod>2018-03-29T14:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/why-im-going-to-rsa-2018-ca-veracodes-new-svp-of-engineering/</loc>
		<lastmod>2018-03-29T14:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sap-hana-pentesting-part-1-vulnerabilities-history/</loc>
		<lastmod>2018-03-29T15:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-you-need-to-know-snipr-credential-stuffing-tool/</loc>
		<lastmod>2018-03-29T15:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/exploit-kits-winter-2018-review/</loc>
		<lastmod>2018-03-29T15:52:39+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->