<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/01/transferring-data-after-a-no-deal-brexit/</loc>
		<lastmod>2019-01-15T09:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-are-the-priorities-for-cisos-in-2019/</loc>
		<lastmod>2019-01-15T11:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/coverity-2018-12-securing-enterprise-applications/</loc>
		<lastmod>2019-01-15T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-reasons-why-the-integration-of-cybersecurity-tools-is-a-growing-imperative/</loc>
		<lastmod>2019-01-15T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-cyberattacks-directly-impact-your-brand-new-radware-report/</loc>
		<lastmod>2019-01-15T12:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/many-companies-lack-cisos-amid-steeper-compliance-demands/</loc>
		<lastmod>2019-01-15T12:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/del-rio-city-hall-disables-internet-connection-for-all-departments-after-ransomware-attack/</loc>
		<lastmod>2019-01-15T12:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nozomi-networks-schneider-electric-work-together-to-secure-critical-infrastructure/</loc>
		<lastmod>2019-01-15T13:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/c-is-for-cookie-and-compliance-2/</loc>
		<lastmod>2019-01-15T12:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/google-home-and-amazon-alexa-can-no-longer-invade-your-privacy-thanks-to-project-alias/</loc>
		<lastmod>2019-01-15T13:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/huge-prizes-up-for-grabs-for-anyone-who-can-hack-a-tesla/</loc>
		<lastmod>2019-01-15T13:59:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/authorities-cant-force-suspects-to-unlock-phones-with-biometrics-rules-california-court/</loc>
		<lastmod>2019-01-15T14:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fighting-the-evolution-of-malware/</loc>
		<lastmod>2019-01-15T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/risk-management-in-the-digital-age/</loc>
		<lastmod>2019-01-15T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/comptia-a-exam-220-1001/</loc>
		<lastmod>2019-01-15T15:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-domain-2-event-incident-detection/</loc>
		<lastmod>2019-01-15T15:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/non-compliance-is-expensive/</loc>
		<lastmod>2019-01-15T15:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nearly-half-of-organizations-cant-tell-if-their-iot-devices-were-breached-finds-study/</loc>
		<lastmod>2019-01-15T15:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delware-2018-kevin-johnsons-secureideas-all-the-bacon/</loc>
		<lastmod>2019-01-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/massachusetts-expands-breach-notice-law-to-require-18-months-credit-monitoring/</loc>
		<lastmod>2019-01-15T16:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/controlling-the-narrative-the-role-of-the-board-of-directors/</loc>
		<lastmod>2019-01-15T17:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-cnp-expo/</loc>
		<lastmod>2019-01-15T17:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/acquiring-data-with-css-selectors-and-javascript-on-time-based-attacks/</loc>
		<lastmod>2019-01-15T17:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nice-incontact-interactions-2019-customer-conference/</loc>
		<lastmod>2019-01-15T17:35:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/enterprise-connect-orlando-2019/</loc>
		<lastmod>2019-01-15T17:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/secureworld-charlotte/</loc>
		<lastmod>2019-01-15T17:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-federal-tls-chronicles-a-litany-of-failed-certificate-governance/</loc>
		<lastmod>2019-01-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/did-you-read-our-most-popular-2018-blog-posts/</loc>
		<lastmod>2019-01-15T18:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-jeff-silvers-cloud-proxy-technology-the-changing-landscape/</loc>
		<lastmod>2019-01-15T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/luke-kingmas-lou-patrick-mackays-futurism-a-lone-voyager/</loc>
		<lastmod>2019-01-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/9-reasons-cyberattacks-are-so-successful/</loc>
		<lastmod>2019-01-15T22:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/shifting-to-devsecops-with-software-security-testing-built-in/</loc>
		<lastmod>2019-01-15T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/owasp-top-10-security-risks-part-v/</loc>
		<lastmod>2019-01-15T23:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-year-new-security-part-2-cloud-computing-use-cases/</loc>
		<lastmod>2019-01-16T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-predictions-for-2019/</loc>
		<lastmod>2019-01-15T23:12:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/moving-day/</loc>
		<lastmod>2019-01-16T00:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/net-rat-malware-being-spread-by-ms-word-documents/</loc>
		<lastmod>2019-01-16T00:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/stole-24-million-but-still-cant-keep-a-friend/</loc>
		<lastmod>2019-01-16T00:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ticketmaster-and-fastbooking-hacked-lessons-learned-2/</loc>
		<lastmod>2019-01-16T00:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-is-every-leaders-job/</loc>
		<lastmod>2019-01-16T05:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/guest-essay-what-your-company-should-know-about-addressing-kubernetes-security/</loc>
		<lastmod>2019-01-16T08:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ethereum-community-postpones-constantinople-post-vulnerability-detection-from-chainsecurity/</loc>
		<lastmod>2019-01-16T08:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pwn2own-vancouver-2019-targets-include-tesla-model-3-oracle-google-apple-microsoft-and-more/</loc>
		<lastmod>2019-01-16T08:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/35-year-old-vulnerabilities-in-scp-client-discovered-by-f-secure-researcher/</loc>
		<lastmod>2019-01-16T09:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-is-a-critical-factor-in-determining-where-enterprises-will-run-their-application/</loc>
		<lastmod>2019-01-16T11:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/two-ukrainians-charged-with-plot-to-hack-into-sec-and-commit-fraud/</loc>
		<lastmod>2019-01-16T12:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/frost-sullivan-honors-nozomi-networks-with-2019-ics-security-award/</loc>
		<lastmod>2019-01-16T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sec-brings-charges-in-edgar-trade-hacking-case/</loc>
		<lastmod>2019-01-16T13:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-unauth-kublet-api-10250-basic-code-exec/</loc>
		<lastmod>2019-01-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-unauth-kublet-api-10250-token-theft-kubectl/</loc>
		<lastmod>2019-01-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kubernetes-kube-hunter-10255/</loc>
		<lastmod>2019-01-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ciso-view-insights-from-the-global-1000-five-steps-for-integrating-security-with-devops/</loc>
		<lastmod>2019-01-16T14:11:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cert-csih-domain-3-triage-analysis/</loc>
		<lastmod>2019-01-16T14:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-security-implications-for-5g-and-iot/</loc>
		<lastmod>2019-01-16T14:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-3-cyberattacks-targeting-proxy-servers/</loc>
		<lastmod>2019-01-16T15:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-matthew-strongs-history-of-e-waste-recycling/</loc>
		<lastmod>2019-01-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/exploring-barriers-to-justice-in-cybersecurity-with-eliott-behar/</loc>
		<lastmod>2019-01-16T16:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-ceh-certification-overview-of-domains/</loc>
		<lastmod>2019-01-16T16:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-network-level-access-is-critical-for-attackers/</loc>
		<lastmod>2019-01-16T17:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/avast-sponsors-hack-cambridge-challenge-avast/</loc>
		<lastmod>2019-01-16T17:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/largest-data-breach-of-2019-so-far/</loc>
		<lastmod>2019-01-16T17:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2018-wasnt-exactly-a-banner-year-for-consumer-data-privacy-expect-it-to-be-a-big-topic-in-2019/</loc>
		<lastmod>2019-01-16T18:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/huawei-connection-the-trail-of-documents/</loc>
		<lastmod>2019-01-16T18:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-businesses-need-secure-messaging-that-goes-beyond-encryption/</loc>
		<lastmod>2019-01-16T18:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-10-software-vulnerability-list-for-2019/</loc>
		<lastmod>2019-01-16T18:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/all-my-research-published-in-2018/</loc>
		<lastmod>2019-01-16T19:15:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-looking-back-moving-forward/</loc>
		<lastmod>2019-01-16T19:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-jake-liefers-presenting-actioning-attck/</loc>
		<lastmod>2019-01-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/one-up-on-cryptominers-alert-logics-threat-intelligence-unravels-techniques-used-to-evade-detections/</loc>
		<lastmod>2019-01-16T21:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-magnetic-pole/</loc>
		<lastmod>2019-01-16T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/doj-reverses-course-on-the-wire-act/</loc>
		<lastmod>2019-01-16T21:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/revocation-is-broken/</loc>
		<lastmod>2019-01-16T22:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/aws-security-readiness-checklist/</loc>
		<lastmod>2019-01-16T22:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/webinar-california-consumer-privacy-act-are-you-prepared-for-2020/</loc>
		<lastmod>2019-01-17T00:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-professionals-weigh-in-on-what-to-expect-in-2019/</loc>
		<lastmod>2019-01-17T03:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/triton-blackenergy-wannacry-has-your-behavior-changed/</loc>
		<lastmod>2019-01-17T05:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/encryption-trends-and-predictions-over-50-years/</loc>
		<lastmod>2019-01-17T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/average-cost-of-a-cyberattack-now-exceeds-1-million-research-shows/</loc>
		<lastmod>2019-01-17T09:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-popular-es-file-explorer-allegedly-has-an-open-port-vulnerability-that-exposes-android-device-data/</loc>
		<lastmod>2019-01-17T10:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fortnite-just-fixed-a-bug-that-let-attackers-to-fully-access-user-accounts-impersonate-real-players-and-buy-v-buck/</loc>
		<lastmod>2019-01-17T11:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-do-not-collect-stamps-they-pursue-your-data/</loc>
		<lastmod>2019-01-17T12:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-biggest-data-breaches-of-2018/</loc>
		<lastmod>2019-01-17T12:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/prices-for-zero-day-exploits-are-rising/</loc>
		<lastmod>2019-01-17T12:33:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-write-a-rootkit-without-really-trying/</loc>
		<lastmod>2019-01-17T12:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/magecart-hits-hundreds-of-websites-via-ad-supply-chain-hijack/</loc>
		<lastmod>2019-01-17T13:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nearly-800-million-email-addresses-exposed-in-collection-1-data-breach/</loc>
		<lastmod>2019-01-17T13:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/qealler-the-silent-java-credential-thief/</loc>
		<lastmod>2019-01-17T14:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-out-of-4-users-dont-know-facebook-categorizes-them-for-ad-targeting-with-political-and-racial-affinity-being-some-labels-pew-research/</loc>
		<lastmod>2019-01-17T14:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/secs-edgar-system-hacked-allowing-hackers-to-allegedly-make-a-profit-of-4-1-million-via-insider-trading/</loc>
		<lastmod>2019-01-17T14:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/airbnb-privacy-issue-a-guest-found-undisclosed-cameras-in-his-rented-room/</loc>
		<lastmod>2019-01-17T14:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/stop-the-presses-ryuk-holds-la-times-for-ransom/</loc>
		<lastmod>2019-01-17T14:24:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/webinar-a-perfect-crime-the-tech-and-psych-of-effective-phishing-on-jan-31-2019/</loc>
		<lastmod>2019-01-17T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/mcse-overview-and-renewal-requirements/</loc>
		<lastmod>2019-01-17T15:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-guide-to-the-mcse-productivity-certification/</loc>
		<lastmod>2019-01-17T15:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-layered-approach-to-cybersecurity-people-processes-and-technology/</loc>
		<lastmod>2019-01-17T15:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/data-breaches-will-happen-the-three-pillars-of-mitigation/</loc>
		<lastmod>2019-01-17T15:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delware-2018-randy-westergrens-randywestergren-hacking-for-good-the-scary-state-of-appsec/</loc>
		<lastmod>2019-01-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/removal-of-underscores-from-domain-names/</loc>
		<lastmod>2019-01-17T16:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/education-sector-peoplesoft-critical-patch-update-january-2019/</loc>
		<lastmod>2019-01-17T16:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/four-ways-to-optimize-your-application-security-program/</loc>
		<lastmod>2019-01-17T16:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2018-peak-holiday-web-traffic-analysis-advice-for-2019-part-one/</loc>
		<lastmod>2019-01-17T16:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2018-peak-holiday-web-traffic-analysis-advice-for-2019-part-two/</loc>
		<lastmod>2019-01-17T16:37:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dnsfs-is-it-possible-to-use-dns-as-a-file-system/</loc>
		<lastmod>2019-01-17T16:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-ways-modern-malware-defeats-cyber-defenses-what-you-can-do-about-it/</loc>
		<lastmod>2019-01-17T16:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/old-password-habits-die-hard-if-they-ever-die-at-all/</loc>
		<lastmod>2019-01-17T17:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/protect-your-wordpress-from-cybersecurity-threats/</loc>
		<lastmod>2019-01-18T07:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/WordPress-Cybersecurity-Threats.jpg</image:loc>
			<image:title><![CDATA[security threat]]></image:title>
			<image:caption><![CDATA[Linux]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/throwback-thursday-whatever-happened-to-stuxnet/</loc>
		<lastmod>2019-01-17T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-custom-alerts-notify-salesforce-admins-of-data-at-risk/</loc>
		<lastmod>2019-01-17T18:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/is-your-ssl-traffic-hiding-attacks/</loc>
		<lastmod>2019-01-17T19:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-story-vermont-state-official-proves-carrier-claims-of-coverage-are-hogwash/</loc>
		<lastmod>2019-01-17T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/kali-linux-2018-for-testing-and-maintaining-windows-security-wolf-halton-and-bo-weaver-interview/</loc>
		<lastmod>2019-01-17T19:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-ralph-m-defrangescos-drone-detection/</loc>
		<lastmod>2019-01-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/773m-password-megabreach-is-years-old/</loc>
		<lastmod>2019-01-17T20:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/luke-kingma-and-lou-patrick-mackays-futurism-funding-virtually-secured/</loc>
		<lastmod>2019-01-17T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/colorado-bill-seeks-to-offer-icos-an-exemption-from-securities-regulations/</loc>
		<lastmod>2019-01-17T21:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/voipo-data-breach-exposes-millions-avast/</loc>
		<lastmod>2019-01-18T01:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-is-amazon-govcloud/</loc>
		<lastmod>2019-01-18T04:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/43-of-enterprises-not-ready-to-say-goodbye-to-windows-7/</loc>
		<lastmod>2019-01-18T08:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/evaluating-the-gchq-exceptional-access-proposal/</loc>
		<lastmod>2019-01-18T11:54:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/are-you-protected-against-the-5-top-healthcare-cyber-threats/</loc>
		<lastmod>2019-01-18T12:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/microsoft-announces-azure-devops-bug-bounty-program/</loc>
		<lastmod>2019-01-18T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/empire-hacking-ethereum-edition-2/</loc>
		<lastmod>2019-01-18T12:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/phobos-ransomware-distributed-by-dharma-crew/</loc>
		<lastmod>2019-01-18T13:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/collection-1-773-million-email-ids-compromised-on-a-popular-cloud-storage-security-researcher-reports/</loc>
		<lastmod>2019-01-18T13:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/74-of-americans-are-clueless-about-facebooks-data-collection-algorithm-survey-says/</loc>
		<lastmod>2019-01-18T14:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ring-criticized-for-sharing-customer-videos-avast/</loc>
		<lastmod>2019-01-18T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/greg-martins-2019-cybersecurity-predictions/</loc>
		<lastmod>2019-01-18T15:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-robert-simmons-comparing-malicious-files/</loc>
		<lastmod>2019-01-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pci-releases-software-security-framework/</loc>
		<lastmod>2019-01-18T17:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/asia-cross-border-data-flows-its-complicated/</loc>
		<lastmod>2019-01-18T17:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/scp-not/</loc>
		<lastmod>2019-01-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/qa-series-with-rsac-ambassador-branden-williams/</loc>
		<lastmod>2019-01-18T18:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-identify-directory-traversal-vulnerabilities-with-shiftleft-ocular-a-detailed-code-example/</loc>
		<lastmod>2019-01-18T18:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pci-pal-exhibits-at-2019-civica-exchange/</loc>
		<lastmod>2019-01-18T18:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/eating-our-own-duck-food-software-composition-analysis-in-the-synopsys-sdlc/</loc>
		<lastmod>2019-01-18T19:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/guest-essay-why-the-hack-of-south-koreas-weapons-munitions-systems-was-so-predictable/</loc>
		<lastmod>2019-01-18T19:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-david-schuetz-darthnull-how-things-work-a-deep-dive-into-1password-security/</loc>
		<lastmod>2019-01-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-integrate-machine-identities-with-hardware-security-modules-2/</loc>
		<lastmod>2019-01-18T20:22:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-experts-wolf-halton-and-bo-weaver-discuss-pentesting-and-cybersecurity-interview/</loc>
		<lastmod>2019-01-18T20:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-tech-the-cost-of-netflix/</loc>
		<lastmod>2019-01-18T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/with-%e2%85%93-of-enterprises-suffering-from-weak-or-exposed-passwords-is-hollywood-part-of-the-problem/</loc>
		<lastmod>2019-01-18T22:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/improvements-to-sitecheck-website-scanner/</loc>
		<lastmod>2019-01-18T22:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bo-weaver-on-cloud-security-skills-gap-and-software-development-in-2019/</loc>
		<lastmod>2019-01-19T13:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/community-cyber-attacks-simulations-and-cooperation-cyberspeak-podcast/</loc>
		<lastmod>2019-01-19T18:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-sean-kilgallons-magic-malware-analysis-to-generate-important-capabilities/</loc>
		<lastmod>2019-01-19T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-missal-of-silos/</loc>
		<lastmod>2019-01-19T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-ways-threat-actors-steal-sensitive-data/</loc>
		<lastmod>2019-01-20T12:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/wolf-halton-on-whats-changed-in-tech-and-where-we-are-headed/</loc>
		<lastmod>2019-01-20T13:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-nir-yoshas-niryoo-my-quest-for-identity-in-a-vendor-turmoil/</loc>
		<lastmod>2019-01-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/robert-m-lees-jeff-hass-little-bobby-comics-certs/</loc>
		<lastmod>2019-01-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-nightwatch-cybers-nightwatchcyber-a-tale-of-three-brothers-three-android-privacy-bugs/</loc>
		<lastmod>2019-01-20T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ring-doorbell-privacy-concerns-recent-password-breach-news-biometrics-and-fifth-amendment-rights-wb52/</loc>
		<lastmod>2019-01-21T05:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/eu-cancels-the-final-vote-negotiations-on-eu-copyright-bill-amidst-massive-protests/</loc>
		<lastmod>2019-01-21T07:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-exploit-kit-activity-roundup-winter-2019/</loc>
		<lastmod>2019-01-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/shadow-it-running-rampant-in-many-organizations-despite-security-risks/</loc>
		<lastmod>2019-01-21T08:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/remote-access-a-fresh-opportunity-for-hackers/</loc>
		<lastmod>2019-01-21T09:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-wordpress-plugin-vulnerability-is-leaking-twitter-account-information-of-users-making-them-vulnerable-to-compromise/</loc>
		<lastmod>2019-01-21T10:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/internet-outage-or-internet-manipulation-new-america-lists-government-interference-ddos-attacks-as-top-reasons-for-internet-outages-across-the-world/</loc>
		<lastmod>2019-01-21T10:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-imperative-to-address-security-concerns-of-the-rapidly-evolving-internet-of-things/</loc>
		<lastmod>2019-01-21T11:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ivr-a-response-to-automated-calling/</loc>
		<lastmod>2019-01-21T11:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/advanced-information-security-features-for-microsoft-office-365-2/</loc>
		<lastmod>2019-01-21T11:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-mcsema-handles-c-exceptions/</loc>
		<lastmod>2019-01-21T12:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-to-finally-answer-for-cambridge-analytica-scandal-record-fine-expected/</loc>
		<lastmod>2019-01-21T14:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/education-a-cloud-security-investigation-csi/</loc>
		<lastmod>2019-01-21T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/demystifying-the-indian-data-protection-bill-2018-part-2-of-3/</loc>
		<lastmod>2019-01-21T15:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/angry-ex-employee-blamed-for-hack-of-wordpress-plugin-developer-and-email-to-customers-warning-of-security-hole/</loc>
		<lastmod>2019-01-21T15:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-30-data-recovery-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-01-21T15:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/building-a-security-awareness-program-for-small-businesses/</loc>
		<lastmod>2019-01-21T15:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-brandon-s-keaths-introduction-to-ethical-hacking-2/</loc>
		<lastmod>2019-01-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/avast-business-improves-security-for-colleges-avast-business/</loc>
		<lastmod>2019-01-21T16:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-state-of-cybersecurity-today-avast/</loc>
		<lastmod>2019-01-21T16:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hrbrthemes-0-6-0-on-cran-other-in-development-package-news/</loc>
		<lastmod>2019-01-21T16:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-phobos-ransomware-using-same-ransom-note-as-dharma/</loc>
		<lastmod>2019-01-21T17:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/oklahoma-state-government-exposes-federal-law-enforcement-data/</loc>
		<lastmod>2019-01-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/is-ai-the-answer-to-never-ending-cybersecurity-problems/</loc>
		<lastmod>2019-01-21T18:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/looking-back-at-rsac-2018-professional-development/</loc>
		<lastmod>2019-01-21T18:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/upcoming-webinar-modern-network-threat-detection-and-response/</loc>
		<lastmod>2019-01-21T19:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dr-martin-luther-king-day-2019/</loc>
		<lastmod>2019-01-21T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-are-common-certificate-validation-flaws-2/</loc>
		<lastmod>2019-01-21T19:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-bryan-inagaki-s-keynote-business-and-the-beast/</loc>
		<lastmod>2019-01-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-is-iso-27001-applicable-also-for-paper-based-information/</loc>
		<lastmod>2019-01-21T20:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-models-of-the-atom-over-time/</loc>
		<lastmod>2019-01-21T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-6-questions-around-api-and-microservices-security-answered/</loc>
		<lastmod>2019-01-21T22:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-evolution-of-cyber-defenses-attacks-and-vulnerabilities-in-2019/</loc>
		<lastmod>2019-01-21T23:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/french-gdpr-committee-fines-google-57m-avast/</loc>
		<lastmod>2019-01-22T02:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/add-trust-to-your-supply-chain/</loc>
		<lastmod>2019-01-22T02:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-need-for-end-to-end-encryption-avast/</loc>
		<lastmod>2019-01-22T03:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-data-in-the-hybrid-cloud/</loc>
		<lastmod>2019-01-22T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/78-of-customers-wont-go-back-to-a-breached-organisation/</loc>
		<lastmod>2019-01-22T08:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-vulnerability-families-feature/</loc>
		<lastmod>2019-01-22T09:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-api-security-essentials-you-need-to-know/</loc>
		<lastmod>2019-01-22T09:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pears-php-extension-and-application-repository-web-server-disabled-due-to-a-security-breach/</loc>
		<lastmod>2019-01-22T09:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-the-federal-shutdown-could-do-long-term-digital-security-damage/</loc>
		<lastmod>2019-01-22T11:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-10-network-security-challenges-in-2019/</loc>
		<lastmod>2019-01-22T12:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-handle-negative-thoughts-or-emotions-at-work-2/</loc>
		<lastmod>2019-01-22T12:03:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/google-fined-50-million-eur-for-violating-gdpr-rules/</loc>
		<lastmod>2019-01-22T12:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fuzzing-an-api-with-deepstate-part-1/</loc>
		<lastmod>2019-01-22T12:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fugue-closes-out-a-strong-2018-carries-momentum-into-2019/</loc>
		<lastmod>2019-01-23T14:20:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/adware-installers-disguised-as-cracks-installing-stop-ransomware/</loc>
		<lastmod>2019-01-22T13:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/attivo-networks-names-chris-roberts-as-chief-security-strategist/</loc>
		<lastmod>2019-01-23T13:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ottuesday-who-wins-in-a-format-war-a-chat-with-encoding-com/</loc>
		<lastmod>2019-01-22T14:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/covewares-2018-q4-ransomware-marketplace-report/</loc>
		<lastmod>2019-01-22T13:38:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/management-mayhem-part-3-how-to-avoid-the-hidden-costs-of-certificate-management-2/</loc>
		<lastmod>2019-01-22T14:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dns-for-wordpress-admins-domain-registrars-dns-records/</loc>
		<lastmod>2019-01-22T14:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/looking-past-the-hype-to-discover-the-real-potential-of-ai/</loc>
		<lastmod>2019-01-22T14:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-identity-and-access-management-solutions-2/</loc>
		<lastmod>2019-01-22T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/our-solution-path-for-implementing-threat-detection-and-incident-response-publishes/</loc>
		<lastmod>2019-01-22T15:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/if-you-use-freelancers-do-you-need-to-educate-them-about-security-awareness/</loc>
		<lastmod>2019-01-22T15:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-users-guide-10-ways-to-protect-your-personal-data/</loc>
		<lastmod>2019-01-22T15:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pc-report-2019-shows-users-fail-to-update-avast/</loc>
		<lastmod>2019-01-22T15:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tcg-announces-new-work-group-to-develop-cyber-resilient-technologies-and-help-ensure-business-continuity/</loc>
		<lastmod>2019-01-22T15:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-delaware-2018-bryan-inagakis-business-and-the-beast/</loc>
		<lastmod>2019-01-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/assess-your-risks/</loc>
		<lastmod>2019-01-22T16:05:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cvss-characterizing-and-scoring-vulnerabilities/</loc>
		<lastmod>2019-01-22T16:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/breach-fatigue-implications-for-your-business/</loc>
		<lastmod>2019-01-22T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-automation-and-apis-should-replace-user-interfaces-for-enterprise-it-and-security-solutions/</loc>
		<lastmod>2019-01-22T16:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-formula-of-campus-network-security/</loc>
		<lastmod>2019-01-22T17:06:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/endless-zero-days/</loc>
		<lastmod>2019-01-22T17:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-e50000000-fine-is-now-due/</loc>
		<lastmod>2019-01-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lessons-from-text-messaging-leaks-the-jeff-bezos-case/</loc>
		<lastmod>2019-01-22T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-get-cloud-security-training-for-your-team/</loc>
		<lastmod>2019-01-22T18:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/guest-post-six-tangible-ways-soar-can-help-narrow-the-cybersecurity-skills-gap/</loc>
		<lastmod>2019-01-22T19:10:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-grigorios-fragkos-welcome/</loc>
		<lastmod>2019-01-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/are-you-leaving-your-machines-naked-and-afraid-2/</loc>
		<lastmod>2019-01-22T20:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zwillgen-launches-effort-to-support-federal-employees-affected-by-the-ongoing-shutdown/</loc>
		<lastmod>2019-01-22T20:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-things-every-msp-should-know-about-hipaa/</loc>
		<lastmod>2019-01-22T21:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/three-c-words-of-web-app-security-part-3-clickjacking/</loc>
		<lastmod>2019-01-22T22:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-tech-robot-hotel/</loc>
		<lastmod>2019-01-22T22:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/first-oracle-cpu-of-the-year-first-patches-for-e-business-suite-12-2-8-2/</loc>
		<lastmod>2019-01-22T22:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/protecting-against-the-phishing-attack-blind-spot-are-you-prepared/</loc>
		<lastmod>2019-01-22T23:07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/abcs-of-ueba-a-is-for-analytics/</loc>
		<lastmod>2019-01-23T00:10:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cracking-wpa-pre-shared-keys/</loc>
		<lastmod>2019-01-23T14:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bomb-threat-sextortion-spammers-abused-weakness-at-godaddy-com/</loc>
		<lastmod>2019-01-23T02:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/divvycloud-honored-as-one-of-ten-best-tech-startups-in-arlington-virginia/</loc>
		<lastmod>2019-01-23T06:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/remote-code-execution-flaw-in-apt-linux-package-manager-allows-man-in-the-middle-attack/</loc>
		<lastmod>2019-01-23T09:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/have-you-been-a-victim-of-phishing-attack-emails/</loc>
		<lastmod>2019-01-23T09:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/us-department-of-homeland-security-releases-an-emergency-directive-to-combat-dns-tampering/</loc>
		<lastmod>2019-01-23T10:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-government-data-with-nist-800-53/</loc>
		<lastmod>2019-01-23T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-evolution-of-darknets/</loc>
		<lastmod>2019-01-23T12:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybercrime-to-cost-5-2-trillion-over-next-5-years-high-tech-industry-most-at-risk/</loc>
		<lastmod>2019-01-23T12:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fuzzing-an-api-with-deepstate-part-2/</loc>
		<lastmod>2019-01-23T12:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/healthcare-a-cloud-security-investigation-csi/</loc>
		<lastmod>2019-01-23T13:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dhs-issues-emergency-directive-on-dns-infrastructure-tampering/</loc>
		<lastmod>2019-01-23T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/january-2019-update-for-netsparker-enterprise/</loc>
		<lastmod>2019-01-23T13:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/video-trickbot-and-eternalchampion/</loc>
		<lastmod>2019-01-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/introducing-ct-wasm-a-type-driven-extension-to-webassembly-for-secure-in-browser-cryptography/</loc>
		<lastmod>2019-01-23T14:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-your-cloud-business-needs-to-know-about-soc-2-certification/</loc>
		<lastmod>2019-01-23T14:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/less-than-3-percent-of-collection-1-data-dump-passwords-are-unique/</loc>
		<lastmod>2019-01-23T14:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-importance-of-machine-identities-in-detecting-look-alike-sites/</loc>
		<lastmod>2019-01-23T14:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/php-pear-site-hacked-tainted-package-available-for-months/</loc>
		<lastmod>2019-01-23T15:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-cybersecurity-impact-of-the-government-shutdown-is-not-what-you-think/</loc>
		<lastmod>2019-01-23T15:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/government-shutdown-impacts-more-than-security-its-taking-a-toll-on-federal-employees-2/</loc>
		<lastmod>2019-01-23T15:55:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-dimitris-dorizass-having-a-career-in-cyber-security-going-down-the-rabbit-hole/</loc>
		<lastmod>2019-01-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/heres-why-foreign-intelligence-agencies-want-your-data/</loc>
		<lastmod>2019-01-23T16:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/yet-another-huge-data-leak-this-time-in-online-gaming/</loc>
		<lastmod>2019-01-23T16:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/feature-release-18-7-cis-kubernetes-compliance-pack-customized-harvesting-more/</loc>
		<lastmod>2019-01-23T17:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacking-security-episode-4-devsecops-with-meera-rao/</loc>
		<lastmod>2019-01-23T17:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-the-u-s-govt-shutdown-harms-security/</loc>
		<lastmod>2019-01-23T17:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/phone-motion-sensors-the-new-attack-vector/</loc>
		<lastmod>2019-01-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-jos-van-der-peets-what-hacking-has-taught-me-about-security-in-depth-detective-and-preventive-measures/</loc>
		<lastmod>2019-01-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/continuous-monitoring-101/</loc>
		<lastmod>2019-01-23T20:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-30-cryptographer-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-01-23T20:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-the-continued-evolution-of-identity/</loc>
		<lastmod>2019-01-23T19:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-considerations-for-aws-setup-outlined-in-new-video/</loc>
		<lastmod>2019-01-23T21:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/finding-security-professionals-with-the-ciso-hiring-guide-series/</loc>
		<lastmod>2019-01-23T21:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-technical-analysis/</loc>
		<lastmod>2019-01-23T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hardware-hacking-101-lesson-1-beauty-your-home-lab-and-basic-electronics/</loc>
		<lastmod>2019-01-23T22:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/u-s-department-of-homeland-security-issues-emergency-directive-on-dns-hijacking-attacks/</loc>
		<lastmod>2019-01-24T01:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/my-take-us-cyber-adversaries-take-cue-from-shutdown-to-accelerate-malware-deployment/</loc>
		<lastmod>2019-01-24T01:57:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/remembering-security-expert-lee-wilson/</loc>
		<lastmod>2019-01-24T01:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/inner-circle-podcast-episode-019-kamal-shah-talks-about-cybersecurity-across-the-container-lifecycle/</loc>
		<lastmod>2019-01-24T02:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/est-the-forgotten-standard/</loc>
		<lastmod>2019-01-24T08:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/debian-9-7-released-with-fix-for-rce-flaw/</loc>
		<lastmod>2019-01-24T09:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dear-ciso-where-to-look-for-personal-data-2/</loc>
		<lastmod>2019-01-24T10:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/federal-cybersecurity-posture-untenable-according-to-omb-risk-report/</loc>
		<lastmod>2019-01-24T12:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/usc-researchers-present-identification-and-mitigation-techniques-to-combat-fake-news/</loc>
		<lastmod>2019-01-24T14:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/digital-risk-management-frameworks/</loc>
		<lastmod>2019-01-24T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nist-guidance-for-financial-services-protecting-privileged-access-is-a-business-imperative/</loc>
		<lastmod>2019-01-24T15:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ensuring-data-privacy-in-public-clouds/</loc>
		<lastmod>2019-01-24T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/potential-security-risks-for-your-customers/</loc>
		<lastmod>2019-01-24T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-yiannis-koukouras-this-is-a-serious-laptop-no-games-and-chatting-possible-ok/</loc>
		<lastmod>2019-01-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/serverless-and-the-evolution-in-cloud-security-how-faas-differs-from-iaas/</loc>
		<lastmod>2019-01-24T16:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cross-site-cookie-manipulation/</loc>
		<lastmod>2019-01-24T16:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-workforce-gap/</loc>
		<lastmod>2019-01-24T16:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/malvertising-campaign-used-steganography-to-distribute-shlayer-trojan/</loc>
		<lastmod>2019-01-24T16:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/passwords-at-risk-for-users-who-fall-for-voicemail-phishing-emails/</loc>
		<lastmod>2019-01-24T16:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lock-down-your-sensitive-enterprise-content-to-prevent-a-data-leak/</loc>
		<lastmod>2019-01-24T16:45:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/windows-registry-osquery-the-easy-way-to-ensure-users-are-secured/</loc>
		<lastmod>2019-01-24T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/china-blocks-microsofts-bing-search-engine/</loc>
		<lastmod>2019-01-24T17:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-future-of-open-source-software-more-of-everything/</loc>
		<lastmod>2019-01-24T17:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/shodan-safari-the-heckling/</loc>
		<lastmod>2019-01-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/spear-phishing-the-smart-malware/</loc>
		<lastmod>2019-01-24T18:30:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sap-security-notes-2018-lessons-learned-and-a-look-to-whats-ahead-in-2019/</loc>
		<lastmod>2019-01-24T19:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/roles-and-responsibilities-of-the-information-security-manager/</loc>
		<lastmod>2019-01-24T19:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-xavier-mertens-full-packet-capture-for-the-masses/</loc>
		<lastmod>2019-01-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2018-state-privacy-security-laws-a-year-in-review/</loc>
		<lastmod>2019-01-24T19:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/quick-hit-automating-production-graphics-uploads-in-r-markdown-documents-with-googledrive/</loc>
		<lastmod>2019-01-24T20:03:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/seven-must-dos-to-secure-mysql-8-0-2/</loc>
		<lastmod>2019-01-24T20:21:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/lessons-learned-from-2018-holiday-attacks-no-rest-for-the-wicked/</loc>
		<lastmod>2019-01-24T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/2019-and-beyond-the-expanded-rsac-advisory-board-weighs-in-on-whats-next-pt-2/</loc>
		<lastmod>2019-01-24T20:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hack-the-box-htb-machines-walkthrough-series-optimum/</loc>
		<lastmod>2019-01-24T21:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/luke-kingma-and-lou-patrick-mackays-futurism-brains-beget-brawn/</loc>
		<lastmod>2019-01-24T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/optimize-setup-to-improve-your-website-resilience-for-ddos-attacks/</loc>
		<lastmod>2019-01-24T22:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/instrumenting-carbon-black-with-verodin-sip/</loc>
		<lastmod>2019-01-24T23:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/detailed-analysis-of-macos-ios-vulnerability-cve-2019-6231/</loc>
		<lastmod>2019-01-25T01:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/protecting-attack-surfaces-with-trusted-solutions/</loc>
		<lastmod>2019-01-25T01:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-risks-all-gamers-should-know-avast/</loc>
		<lastmod>2019-01-25T01:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-lotteries-to-avoid-with-help-from-aa419/</loc>
		<lastmod>2019-01-25T06:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/microsofts-bing-back-to-normal-in-china/</loc>
		<lastmod>2019-01-25T08:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/business-payroll-compromise-a-new-way-for-criminals-to-steal-from-your-company/</loc>
		<lastmod>2019-01-25T09:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-should-you-subscribe-for-a-free-trial/</loc>
		<lastmod>2019-01-25T09:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pci-pal-honoured-at-the-pci-2019-awards-for-excellence-for-second-consecutive-year/</loc>
		<lastmod>2019-01-25T10:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/researcher-releases-jailbreak-poc-for-ios-12-on-iphone-x/</loc>
		<lastmod>2019-01-25T11:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/web-hosting-security-best-practices/</loc>
		<lastmod>2019-01-25T12:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/50-best-cloud-and-cloud-security-certifications/</loc>
		<lastmod>2019-01-25T12:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/symbolic-path-merging-in-manticore/</loc>
		<lastmod>2019-01-25T12:50:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-become-a-chief-information-security-officer-cyberspeak-podcast/</loc>
		<lastmod>2019-01-25T13:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/study-hospitals-dramatically-increase-ad-spend-following-data-breaches/</loc>
		<lastmod>2019-01-25T13:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/real-substance-on-privileged-access-in-devops-and-cloud/</loc>
		<lastmod>2019-01-25T14:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/malspam-campaign-targeting-russian-speakers-with-redaman-malware/</loc>
		<lastmod>2019-01-25T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fortinet-to-share-expert-healthcare-insights-during-sessions-at-himss19/</loc>
		<lastmod>2019-01-25T14:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/mac-users-affected-by-shlayer-trojan-dropped-via-a-steganography-based-ad-payload-confiant-and-malwarebytes-report/</loc>
		<lastmod>2019-01-25T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/social-engineerings-weakness-an-empowered-work-culture/</loc>
		<lastmod>2019-01-25T15:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-dimitrios-bougioukas-making-a-state-backed-implant-invisible-introducing-a-new-blind-spot-of-modern-a-v-hids/</loc>
		<lastmod>2019-01-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-we-strongly-advocate-ad-blocking-the-steg-affair/</loc>
		<lastmod>2019-01-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/three-charged-for-working-with-serial-swatter/</loc>
		<lastmod>2019-01-25T18:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/introducing-domain-name-validation-method-13/</loc>
		<lastmod>2019-01-25T19:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-isidoros-monogioudis-redbluepurple-how-to-execute-purple-team-exercises-even-if-you-think-you-cant/</loc>
		<lastmod>2019-01-25T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/three-ways-to-limit-the-cybersecurity-impact-of-the-government-shutdown/</loc>
		<lastmod>2019-01-25T21:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-internet-archive/</loc>
		<lastmod>2019-01-25T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/personal-woes-of-two-factor-authentication/</loc>
		<lastmod>2019-01-25T23:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/true-personal-data-innovation-the-market-is-ripe/</loc>
		<lastmod>2019-01-26T00:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/getting-to-know-the-new-rsac-advisory-board-members-joyce-brocaglia/</loc>
		<lastmod>2019-01-26T02:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-protect-your-vpn-from-data-leaks/</loc>
		<lastmod>2019-01-26T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-niko-pissanidis-nato-and-cybersecurity-driving-progress-across-the-alliance/</loc>
		<lastmod>2019-01-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/blackberry-cisco-and-microsoft-move-aggressively-to-protect-trust-and-privacy/</loc>
		<lastmod>2019-01-26T17:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/senator-rubio-latest-privacy-legislative-efforts-a-futile-exercise/</loc>
		<lastmod>2019-01-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-nikolaos-chrysaidos-using-apklab-io-mobile-threat-intel-platform-to-fight-banking-threats/</loc>
		<lastmod>2019-01-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/romanians-on-a-skimming-crime-spree/</loc>
		<lastmod>2019-01-26T20:21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/daniel-storis-kernel-economics/</loc>
		<lastmod>2019-01-26T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-andronikos-kyriaks-paravirtualized-honeypot-deployment-for-the-analysis-of-malicious-activity/</loc>
		<lastmod>2019-01-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hacking-the-gchq-backdoor/</loc>
		<lastmod>2019-01-27T16:23:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/university-of-washington-develops-cellphone-sonar-app-to-detect-opioid-overdose/</loc>
		<lastmod>2019-01-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-gema-fernandez-christina-skouloudis-convincing-my-smartlock-that-its-really-me/</loc>
		<lastmod>2019-01-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/robert-m-lees-jeff-hass-little-bobby-comics-ics/</loc>
		<lastmod>2019-01-27T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tips-for-securing-internet-connected-cameras/</loc>
		<lastmod>2019-01-27T23:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-lack-of-us-privacy-regulations-nest-cameras-hijacked-wb53/</loc>
		<lastmod>2019-01-28T05:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/my-take-3-privacy-and-security-habits-each-individual-has-a-responsibility-to-embrace/</loc>
		<lastmod>2019-01-28T09:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/online-security-for-millennials-what-do-you-meme/</loc>
		<lastmod>2019-01-28T09:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/government-cios-to-focus-technology-investments-on-data-analytics-and-cybersecurity-in-2019-gartner-says/</loc>
		<lastmod>2019-01-28T10:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/video-sharing-platform-targeted-by-credential-stuffing-attacks/</loc>
		<lastmod>2019-01-28T11:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/regulatory-fines-prison-time-render-check-box-security-indefensible/</loc>
		<lastmod>2019-01-28T11:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/osmfs-openstreetmap-foundation-investigation-report-on-unusual-membership-signups-just-before-their-board-elections/</loc>
		<lastmod>2019-01-28T12:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/youtube-to-reduce-recommendations-of-conspiracy-theory-videos-that-misinform-users-in-the-us/</loc>
		<lastmod>2019-01-28T12:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-to-merge-whatsapp-instagram-facebook-messenger-by-2020/</loc>
		<lastmod>2019-01-28T12:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybertech-tel-aviv-2019-the-pregame-show-2/</loc>
		<lastmod>2019-01-28T11:42:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bitglass-security-spotlight-breaches-expose-millions-of-emails-texts-and-call-logs/</loc>
		<lastmod>2019-01-28T12:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-eleventh-annual-disaster-recovery-breakfast-is-that-you-caesar/</loc>
		<lastmod>2019-01-28T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/an-interview-with-ciso-billy-spears-making-a-case-for-machine-identity-protection/</loc>
		<lastmod>2019-01-28T13:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/user-of-the-worlds-biggest-ddos-for-hire-website-police-say-theyre-coming-after-you/</loc>
		<lastmod>2019-01-28T13:37:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/biometric-information-privacy-act-it-is-now-illegal-for-amazon-facebook-or-apple-to-collect-your-biometric-data-without-consent-in-illinois/</loc>
		<lastmod>2019-01-28T13:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/force-remote-logoff-after-idle-time/</loc>
		<lastmod>2019-01-28T13:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/comptia-a-220-1002/</loc>
		<lastmod>2019-01-28T14:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/addressing-the-cybersecurity-skills-gap-requires-a-global-effort/</loc>
		<lastmod>2019-01-28T15:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-you-need-to-know-about-e-rate-funding-for-k-12-in-2019/</loc>
		<lastmod>2019-01-28T15:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/data-privacy-day-what-it-means-for-your-organization/</loc>
		<lastmod>2019-01-28T15:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-social-locking-login-armoring-authentication/</loc>
		<lastmod>2019-01-28T15:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-abdo-shajadis-lets-automate-some-security-tasks-in-pipeline/</loc>
		<lastmod>2019-01-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-evaluation-stage-3-execution-of-testing/</loc>
		<lastmod>2019-01-28T16:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hack-the-box-htb-machines-walkthrough-series-cronos/</loc>
		<lastmod>2019-01-28T16:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/zero-to-value-alert-logic-siemless-threat-management-and-aws/</loc>
		<lastmod>2019-01-28T16:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/data-privacy-day-celebrates-a-new-era-in-privacy/</loc>
		<lastmod>2019-01-28T17:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/weak-kneed-godaddy-security-implementation-permits-large-scale-email-bomb-threat-transmissions/</loc>
		<lastmod>2019-01-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/warning-to-the-big-tech-companies-googles-gdpr-fine-likely-a-harbinger-of-things-to-come/</loc>
		<lastmod>2019-01-28T18:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/managing-for-inclusion-across-the-talent-lifecycle-the-key-to-diversity-equity-and-inclusion-in-cybersecurity-part-1/</loc>
		<lastmod>2019-01-28T18:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-you-should-care-about-data-privacy-day/</loc>
		<lastmod>2019-01-28T18:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/scams-schemes-and-good-news-for-a-change-avast/</loc>
		<lastmod>2019-01-28T18:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/its-time-for-a-new-privacy-code-of-conduct-avast/</loc>
		<lastmod>2019-01-28T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/world-economic-forum-recognizes-cyberattacks-in-top-risks-for-2019/</loc>
		<lastmod>2019-01-28T19:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/japanese-government-will-hack-citizens-iot-devices/</loc>
		<lastmod>2019-01-28T19:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-athens-2018-fotis-sofronis-maritime-cyber-security/</loc>
		<lastmod>2019-01-28T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/onapsis-puts-the-process-of-security-to-work-for-oracle-e-business-suite/</loc>
		<lastmod>2019-01-28T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-joy-of-tech-that-annoying-voice-memo-button/</loc>
		<lastmod>2019-01-28T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/43-of-cybercrimes-target-small-businesses-are-you-next/</loc>
		<lastmod>2019-01-28T23:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-sneak-peek-into-recent-iot-attacks/</loc>
		<lastmod>2019-01-28T23:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-soar-solution-pitfalls-to-avoid/</loc>
		<lastmod>2019-01-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-pitfalls-to-avoid-when-implementing-a-soar-solution-and-what-to-do-instead-2/</loc>
		<lastmod>2019-01-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/rethinking-the-detection-of-child-sexual-abuse-imagery-on-the-internet/</loc>
		<lastmod>2019-01-29T02:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-target-smbs-that-support-us-power-grid-avast/</loc>
		<lastmod>2019-01-29T02:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/passwords-in-a-file/</loc>
		<lastmod>2019-01-29T03:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/making-the-case-for-encryption-in-the-era-of-digital-transformation-highlights-from-our-annual-data-threat-report/</loc>
		<lastmod>2019-01-29T08:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/iec-62351-standards-for-securing-power-system-communications/</loc>
		<lastmod>2019-01-29T08:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gdpr-what-will-happen-after-a-no-deal-brexit/</loc>
		<lastmod>2019-01-29T08:39:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/we-cant-do-anything-about-the-weather-but/</loc>
		<lastmod>2019-01-29T08:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/3-things-you-should-do-on-international-data-privacy-day-2019/</loc>
		<lastmod>2019-01-29T10:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cisco-announces-severe-vulnerability-that-gives-improper-access-controls-for-urls-in-its-small-business-routers-rv320-and-rv325/</loc>
		<lastmod>2019-01-29T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/malware-three-industry-problems-and-how-to-solve-them/</loc>
		<lastmod>2019-01-29T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-growing-surface-of-attack-and-what-cybercrime-has-in-common-with-street-crime-qa-with-steve-morgan-of-cybersecurity-ventures/</loc>
		<lastmod>2019-01-29T12:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gdpr-complaint-claims-google-and-iab-leaked-highly-intimate-data-of-web-users-for-behavioral-advertising/</loc>
		<lastmod>2019-01-29T13:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/untold-number-of-discover-card-account-holders-notified-of-data-breach/</loc>
		<lastmod>2019-01-29T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/education-cybersecurity-threats-to-overcome/</loc>
		<lastmod>2019-01-29T14:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-sharing-content-improves-incident-response/</loc>
		<lastmod>2019-01-29T14:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-sharing-content-can-improve-threat-response/</loc>
		<lastmod>2019-01-29T14:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/securing-jenkins-active-directory-and-ldap-services-in-a-jenkins-environment/</loc>
		<lastmod>2019-01-29T14:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security/</loc>
		<lastmod>2019-01-29T14:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-rise-in-cryptomining/</loc>
		<lastmod>2019-01-29T14:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/seeing-and-addressing-insider-threats-across-your-distributed-network/</loc>
		<lastmod>2019-01-29T15:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/avast-pc-report-2019-reveals-hardware-trends-avast/</loc>
		<lastmod>2019-01-29T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/see-avast-business-at-an-event-near-you-avast-business/</loc>
		<lastmod>2019-01-29T15:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/appsecusa-2018-chenxi-wangs-defensible-application-security-for-the-artificial-intelligence-era/</loc>
		<lastmod>2019-01-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/untangle-expands-cloud-deployments-remote-management-product-offerings-increases-endpoint-visibility/</loc>
		<lastmod>2019-01-29T16:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-your-defenders-paradigm-isnt-working-anymore/</loc>
		<lastmod>2019-01-29T16:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-7-ethics/</loc>
		<lastmod>2019-01-29T16:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-6-information-security-policies-laws-and-acts/</loc>
		<lastmod>2019-01-29T16:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-5-information-security-procedures-and-assessment-methodologies/</loc>
		<lastmod>2019-01-29T16:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-4-information-security-tools-systems-and-programs/</loc>
		<lastmod>2019-01-29T16:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-3-security/</loc>
		<lastmod>2019-01-29T16:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-2-analysis-assessment/</loc>
		<lastmod>2019-01-29T16:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/certified-ethical-hacker-domain-1-background/</loc>
		<lastmod>2019-01-29T16:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xdedic-marketplace-for-hacked-rdp-credentials-is-taken-down/</loc>
		<lastmod>2019-01-29T16:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/telcos-discover-the-value-of-machine-identities-in-protecting-revenue/</loc>
		<lastmod>2019-01-29T16:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-mistakes-cisos-must-avoid-in-2019/</loc>
		<lastmod>2019-01-29T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/money-laundering-and-counter-terrorist-financing-what-is-fatf/</loc>
		<lastmod>2019-01-29T17:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/department-of-defense-launches-first-dfars-compliance-audit/</loc>
		<lastmod>2019-01-29T17:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/japan-government-set-to-hack-citizen-owned-iot-devices/</loc>
		<lastmod>2019-01-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-dependencies-matter-for-sast/</loc>
		<lastmod>2019-01-29T18:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/privacy-on-the-internet-what-privacy/</loc>
		<lastmod>2019-01-29T18:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/why-ford-foundation-is-helping-bruce-schneier-bring-a-new-field-to-rsa-conference-in-2019/</loc>
		<lastmod>2019-01-29T18:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-public-interest-technologist-track-at-the-rsa-conference/</loc>
		<lastmod>2019-01-29T18:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/meet-the-new-imperva-defending-your-business-growth-today-and-tomorrow/</loc>
		<lastmod>2019-01-29T18:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/spam-injector-disguised-as-license-key-in-wordpress-website/</loc>
		<lastmod>2019-01-29T19:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/state-of-the-internet-volume-5-issue-1/</loc>
		<lastmod>2019-01-29T19:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/software-defined-perimeter-a-modern-vpn-with-traditional-challenges/</loc>
		<lastmod>2019-01-29T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/serverside-graphql-querying-with-absinthe/</loc>
		<lastmod>2019-01-29T19:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/spear-phishing-hr-for-sensitive-employee-data-attacks-are-on-the-rise/</loc>
		<lastmod>2019-01-29T19:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-chicago-five-heroes-all/</loc>
		<lastmod>2019-01-29T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/owasp-top-ten-iot-2018/</loc>
		<lastmod>2019-01-29T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bankbot-anubis-switches-to-chinese-and-adds-telegram-for-c2/</loc>
		<lastmod>2019-01-29T22:01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/mit-ut-rekognition-is-bad-tech/</loc>
		<lastmod>2019-01-29T22:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/plan-ahead-to-get-the-most-out-of-the-2019-rsa-conference/</loc>
		<lastmod>2019-01-30T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/computing-technology-at-a-tipping-point-says-wef-davos-panel/</loc>
		<lastmod>2019-01-30T06:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-faces-hurdles-as-it-attempts-to-unify-messaging-platforms/</loc>
		<lastmod>2019-01-30T07:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/quick-hit-using-seymour-to-subscribe-to-your-gitlahub-repo-issues-in-feedly/</loc>
		<lastmod>2019-01-30T08:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-get-the-best-roi-in-test-automation/</loc>
		<lastmod>2019-01-30T09:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/enisa-calls-for-automated-defense-against-automated-threats/</loc>
		<lastmod>2019-01-30T09:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-tech-this-free-tool-can-help-gauge-manage-third-party-cyber-risk-its-called-vrmmm/</loc>
		<lastmod>2019-01-30T09:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-hires-top-eef-lawyer-and-facebook-critic-as-whatsapp-privacy-policy-manager/</loc>
		<lastmod>2019-01-30T10:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-fresh-look-on-reverse-proxy-related-attacks/</loc>
		<lastmod>2019-01-30T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/scanning-applications-that-make-use-of-single-sign-on-sso/</loc>
		<lastmod>2019-01-30T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/application-security-weekly-reverse-proxies-using-weblogic-tomcat-and-nginx/</loc>
		<lastmod>2019-01-30T11:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/san-francisco-legislation-proposes-a-citywide-ban-on-governments-use-of-facial-recognition-technology/</loc>
		<lastmod>2019-01-30T11:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/pci-london-and-pci-awards-in-excellence-a-recap/</loc>
		<lastmod>2019-01-30T12:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fast-static-maps-built-with-r/</loc>
		<lastmod>2019-01-30T12:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/browser-extensions-can-pose-significant-cyber-security-threats/</loc>
		<lastmod>2019-01-30T12:56:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/judge-denies-approval-of-50m-settlement-to-yahoo-data-breach-lawsuit/</loc>
		<lastmod>2019-01-30T13:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/finance-a-cloud-security-investigation-csi/</loc>
		<lastmod>2019-01-30T13:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/information-security-manager-skills-and-traits/</loc>
		<lastmod>2019-01-30T14:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-become-an-information-security-manager/</loc>
		<lastmod>2019-01-30T14:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-secure-is-your-digital-super-bowl-experience/</loc>
		<lastmod>2019-01-30T15:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/nz-police-issues-update-on-suspicious-cryptopia-hack-says-significant-amount-stolen/</loc>
		<lastmod>2019-01-30T15:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/an-approach-for-securing-advanced-threats-for-your-customers/</loc>
		<lastmod>2019-01-30T15:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/facebook-pays-users-20-month-to-install-a-facebook-research-vpn-that-spies-on-their-phone-and-web-activities-techcrunch-reports/</loc>
		<lastmod>2019-01-30T15:43:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/outage-in-the-microsoft-365-and-gmail-made-users-unable-to-log-into-their-accounts/</loc>
		<lastmod>2019-01-30T15:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/enisa-releases-2018-report/</loc>
		<lastmod>2019-01-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/thieves-stole-1-7-billion-in-cryptocurrency-in-2018-as-mining-gives-way-to-stealing-in-crypto-space/</loc>
		<lastmod>2019-01-30T16:22:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cybersecurity-skills-shortage-a-hiring-managers-perspective/</loc>
		<lastmod>2019-01-30T16:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/key-points-for-building-and-connecting-security-friendly-apis/</loc>
		<lastmod>2019-01-30T16:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/leveraging-threat-stacks-out-of-the-box-rulesets-and-single-view-for-managing-multiple-aws-accounts/</loc>
		<lastmod>2019-01-30T16:45:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-shift-left-with-application-security-tools-and-how-not-to/</loc>
		<lastmod>2019-01-30T17:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/managing-for-inclusion-across-the-talent-lifecycle-the-key-to-diversity-equity-and-inclusion-in-cybersecurity-part-2/</loc>
		<lastmod>2019-01-30T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/critical-flaw-found-in-es-file-explorer-avast/</loc>
		<lastmod>2019-01-30T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/malwarebytes-releases-state-of-malware-report/</loc>
		<lastmod>2019-01-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/remote-hardware-takeover-via-vulnerable-admin-software/</loc>
		<lastmod>2019-01-30T18:03:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tech-refresh-as-part-of-an-effective-vulnerability-management-program-part-one/</loc>
		<lastmod>2019-01-30T18:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/what-goals-are-right-for-your-appsec-program/</loc>
		<lastmod>2019-01-30T19:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/dns-flag-day-akamai/</loc>
		<lastmod>2019-01-30T19:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/using-a-scep-gateway-to-distribute-certificates-to-managed-devices/</loc>
		<lastmod>2019-01-30T20:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/6-tips-for-success-when-changing-tech-roles/</loc>
		<lastmod>2019-01-30T20:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-leeds-2019-glenn-pegden-confessions-of-a-bug-bounty-triager/</loc>
		<lastmod>2019-01-30T20:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-revoke-a-lets-encrypt-certificate/</loc>
		<lastmod>2019-01-30T21:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/xkcd-midcontinent-rift-system/</loc>
		<lastmod>2019-01-30T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/apple-pulls-service-from-facebook-avast/</loc>
		<lastmod>2019-01-30T23:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/understanding-and-maintaining-pci-compliance/</loc>
		<lastmod>2019-01-31T03:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/youre-paying-too-much-for-your-siem/</loc>
		<lastmod>2019-01-31T09:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/my-take-bashe-attack-theorizes-a-200-billion-ransomware-raid-using-nsa-class-cyber-weapons/</loc>
		<lastmod>2019-01-31T09:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/uk-enterprises-to-compete-for-70m-in-government-cybersecurity-challenge/</loc>
		<lastmod>2019-01-31T09:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-biggest-security-hurdles-in-your-business-and-how-to-overcome-them/</loc>
		<lastmod>2019-01-31T10:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sbi-data-leak-in-india-results-in-information-of-millions-of-customers-exposed-online/</loc>
		<lastmod>2019-01-31T10:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/top-12-allot-blogs-of-2018/</loc>
		<lastmod>2019-01-31T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/airbus-reveals-it-suffered-a-digital-security-incident/</loc>
		<lastmod>2019-01-31T12:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/insider-threat-analyst-files-2-1-2019-california-state-dor-data-breach-analysis-and-guidance/</loc>
		<lastmod>2019-01-31T13:12:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/information-security-no-longer-the-department-of-no/</loc>
		<lastmod>2019-01-31T13:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/information-security-specialist-sounds-respectable/</loc>
		<lastmod>2019-01-31T14:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hackers-hit-airbus-steal-personal-details-of-employees/</loc>
		<lastmod>2019-01-31T14:38:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-shortage-in-common-sense-the-myth-of-the-talent-gap/</loc>
		<lastmod>2019-01-31T14:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tripwire-patch-priority-index-for-january-2019/</loc>
		<lastmod>2019-01-31T14:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ease-me-into-cryptography-part-3-asymmetric-ciphers/</loc>
		<lastmod>2019-01-31T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/integrated-risk-management-and-digital-business/</loc>
		<lastmod>2019-01-31T14:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/from-the-core-to-the-edge-3-security-imperatives-and-the-evolving-digital-topology/</loc>
		<lastmod>2019-01-31T15:20:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/new-updater-helps-worlds-most-popular-software-avast/</loc>
		<lastmod>2019-01-31T15:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/attackers-are-leveraging-automation/</loc>
		<lastmod>2019-01-31T15:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/visit-us-at-rsac-2019/</loc>
		<lastmod>2019-01-31T15:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/hack-the-box-htb-machines-walkthrough-series-october/</loc>
		<lastmod>2019-01-31T15:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/information-security-manager-salary-in-2019/</loc>
		<lastmod>2019-01-31T15:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-cut-healthcare-cyber-incidents-by-80-percent/</loc>
		<lastmod>2019-01-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-leeds-2019-saskia-coplans-selling-0days-by-the-pound-does-responsible-disclosure-work/</loc>
		<lastmod>2019-01-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/preserve-ip-and-pii-with-dynamic-governance-over-external-workflows/</loc>
		<lastmod>2019-01-31T16:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/tripwirebookclub-pentesting-azure-applications/</loc>
		<lastmod>2019-01-31T17:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-new-outlook-ajax-vm/</loc>
		<lastmod>2019-01-31T17:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/national-data-privacy-day-is-wishful-thinking/</loc>
		<lastmod>2019-01-31T17:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ready-for-dns-flag-day/</loc>
		<lastmod>2019-01-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bens-book-of-the-month-review-of-the-perfect-weapon-war-sabotage-and-fear-in-the-cyber-age/</loc>
		<lastmod>2019-01-31T18:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/looking-into-jaff-ransomware/</loc>
		<lastmod>2019-01-31T18:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/oracle-virtualbox-nat-network-dos-vulnerability/</loc>
		<lastmod>2019-01-31T19:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/bsides-leeds-2019-jay-harris-a-pentesters-guide-to-left-shifting-security/</loc>
		<lastmod>2019-01-31T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/three-things-to-consider-when-picking-a-privileged-access-security-solution-for-your-cybersecurity-strategy/</loc>
		<lastmod>2019-01-31T20:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/phishing-scammers-are-targeting-the-rsa-conference-again/</loc>
		<lastmod>2019-01-31T20:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/unchecked-open-source-components-introducing-more-risk-to-businesses/</loc>
		<lastmod>2019-01-31T21:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/daniel-storis-first-time/</loc>
		<lastmod>2019-01-31T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/ssl-attacks-part-1-why-do-cybercriminals-abuse-digital-certificates/</loc>
		<lastmod>2019-01-31T22:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-standards-race-of-the-future-is-on/</loc>
		<lastmod>2019-02-01T04:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/inner-circle-podcast-episode-020-ivan-novikov-chats-about-fuzzing-in-testing/</loc>
		<lastmod>2019-02-01T04:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/can-security-teams-tame-todays-cloud-complexity/</loc>
		<lastmod>2019-02-01T08:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-why-companies-should-care-about-2-2-billion-stolen-credentials-circulating-in-easy-reach/</loc>
		<lastmod>2019-02-01T09:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/getting-started-in-red-teaming-and-offensive-security-cyberspeak-podcast/</loc>
		<lastmod>2019-02-01T10:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/apple-reinstates-facebook-and-google-developer-certificates-restores-the-ability-to-run-internal-ios-apps/</loc>
		<lastmod>2019-02-01T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hackers-breach-airbus-steal-employee-information/</loc>
		<lastmod>2019-02-01T12:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/abusing-docker-api-socket/</loc>
		<lastmod>2019-02-01T13:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/250-webstresser-users-to-face-legal-action/</loc>
		<lastmod>2019-02-01T13:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/houzz-says-security-incident-might-have-exposed-user-data/</loc>
		<lastmod>2019-02-01T13:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fortinet-at-mobile-world-congress-2019/</loc>
		<lastmod>2019-02-01T14:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fake-android-apps-and-phony-youtube-stars-avast/</loc>
		<lastmod>2019-02-01T15:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-steve-davies-war-games-simulating-cyber-incidents-for-fun-profit/</loc>
		<lastmod>2019-02-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/your-2019-essential-software-security-development-devops-conferences/</loc>
		<lastmod>2019-02-01T17:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsac-innovator-and-entrepreneur-seminar/</loc>
		<lastmod>2019-02-01T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/immunizing-your-healthcare-technology-against-cybersecurity-threats-2/</loc>
		<lastmod>2019-02-01T17:31:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/facebookery-2019-zuckerbergs-desperation/</loc>
		<lastmod>2019-02-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cave-of-broken-mirrors-3-issues-with-aws-cognito/</loc>
		<lastmod>2019-02-01T18:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-are-compression-side-channel-attacks/</loc>
		<lastmod>2019-02-01T19:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-the-beer-farmers-we-take-your-security-seriously-or-do-we/</loc>
		<lastmod>2019-02-01T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/employee-remote-access-threats-vs-vendor-access-threats/</loc>
		<lastmod>2019-02-01T20:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-biff-tannen/</loc>
		<lastmod>2019-02-01T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-emergence-of-identity-and-access-threat-prevention-as-explained-by-451-research/</loc>
		<lastmod>2019-02-01T22:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-prevent-cross-site-contamination-for-beginners/</loc>
		<lastmod>2019-02-01T22:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/homebrew-2-0-0-released-homebrewanalytics-package-updated/</loc>
		<lastmod>2019-02-02T14:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-stefan-khaes-khae-weaponising-layer-8/</loc>
		<lastmod>2019-02-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/listen-in-on-fcc-lawyers-attempting-to-defend-repeal-of-net-neutrality-rules/</loc>
		<lastmod>2019-02-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-james-ogdens-ee-by-packet-filter-ebpf-for-security-monitoring/</loc>
		<lastmod>2019-02-02T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-facebooks-friendly-fraud/</loc>
		<lastmod>2019-02-02T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/r-package-update-urlscan/</loc>
		<lastmod>2019-02-03T11:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-meadow-ellis-hardware-hacking-we-need-to-go-deeper/</loc>
		<lastmod>2019-02-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/researchers-discover-hardcoded-passwords-in-physical-access-controls/</loc>
		<lastmod>2019-02-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-andy-gills-becoming-boba-fett-hacking-companies-for-internet-glory-while-not-dying-in-a-sarlacc-pit/</loc>
		<lastmod>2019-02-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/send-udp-probes-with-payloads-and-receive-process-responses-in-r/</loc>
		<lastmod>2019-02-03T20:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-emergence-of-geopolitical-fueled-cyber-attacks/</loc>
		<lastmod>2019-02-03T21:33:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2018-nist-cybersecurity-risk-management-conference/</loc>
		<lastmod>2019-02-03T21:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/robert-m-lees-jeff-hass-little-bobby-comics-believe/</loc>
		<lastmod>2019-02-03T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avoid-these-common-security-misconfigurations/</loc>
		<lastmod>2019-02-04T00:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/massive-apple-facetime-privacy-bug-selling-your-privacy-for-money-insecure-smart-light-bulbs-wb54/</loc>
		<lastmod>2019-02-04T05:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/pci-pal-and-pay360-by-capita-host-the-future-of-payments-and-compliance/</loc>
		<lastmod>2019-02-04T09:24:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/smart-mobility-and-the-blockchain/</loc>
		<lastmod>2019-02-04T09:41:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/abcs-of-ueba-b-is-for-behavior/</loc>
		<lastmod>2019-02-04T10:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/public-interest-tech-at-the-rsa-conference/</loc>
		<lastmod>2019-02-04T10:36:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/research-corporate-phishing-incidents-cost-4-3m-to-investigate-per-year/</loc>
		<lastmod>2019-02-04T11:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/acunetix-web-application-vulnerability-report-2019/</loc>
		<lastmod>2019-02-04T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dear-ciso-partial-inventory-is-no-inventory-at-all-2/</loc>
		<lastmod>2019-02-04T11:52:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/scammers-threatening-youtube-content-creators-with-channel-suspension/</loc>
		<lastmod>2019-02-04T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/introducing-zombie-poodle-and-goldendoodle/</loc>
		<lastmod>2019-02-04T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cloud-access-security-brokers-2020/</loc>
		<lastmod>2019-02-04T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyber-security-roundup-for-january-2019/</loc>
		<lastmod>2019-02-04T14:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/do-not-underestimate-the-challenge-of-securing-sd-wan/</loc>
		<lastmod>2019-02-04T14:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/social-engineer-newsletter-vol-08-issue-112/</loc>
		<lastmod>2019-02-04T14:55:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/virality-of-fake-news-on-social-media-are-weaponized-ai-bots-to-blame-questions-destin-sandlin/</loc>
		<lastmod>2019-02-04T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/student-loan-company-fought-off-1-million-cyberattacks-in-a-year/</loc>
		<lastmod>2019-02-04T15:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/do-you-have-security-champions-in-your-company-a-6-step-checklist-for-a-successful-program/</loc>
		<lastmod>2019-02-04T15:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/security-awareness-for-vendors-and-contractors/</loc>
		<lastmod>2019-02-04T15:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-surprise-panel-yay-open-source-supply-chain-a-critical-view-from-red-blue/</loc>
		<lastmod>2019-02-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/your-smart-scale-is-leaking-more-than-your-weight-privacy-issues-in-iot/</loc>
		<lastmod>2019-02-04T16:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/emotet-how-it-might-infect-your-pc/</loc>
		<lastmod>2019-02-04T17:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/super-bowl-ads-tackle-ai-and-cyber-security/</loc>
		<lastmod>2019-02-04T17:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/compromised-by-errors-the-sorry-tale-of-flawed-forensic-software/</loc>
		<lastmod>2019-02-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/preparing-for-an-open-source-audit-which-software-assets-are-worth-analyzing/</loc>
		<lastmod>2019-02-04T18:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/infographic-employees-are-cyber-secure-in-theory-but-not-in-practice/</loc>
		<lastmod>2019-02-04T18:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/looking-back-at-rsac-2018-c-suite-views/</loc>
		<lastmod>2019-02-04T18:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-challenges-of-diy-botnet-detection-and-how-to-overcome-them/</loc>
		<lastmod>2019-02-04T19:05:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/crooks-continue-to-exploit-godaddy-hole/</loc>
		<lastmod>2019-02-04T19:12:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-microsoft-exchange-vulnerability-exposes-domain-admin-privileges-heres-what-to-do/</loc>
		<lastmod>2019-02-04T19:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-car-in-a-box/</loc>
		<lastmod>2019-02-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/protect-your-network-from-malware/</loc>
		<lastmod>2019-02-04T20:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-facetimes-little-facepalm/</loc>
		<lastmod>2019-02-04T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/huge-data-leak-24-million-financial-and-banking-docs-exposed/</loc>
		<lastmod>2019-02-04T22:12:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-you-dont-need-or-want-a-siem-tool/</loc>
		<lastmod>2019-02-04T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/another-data-breach-rubrik-joins-massive-data-breach-list/</loc>
		<lastmod>2019-02-04T23:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/facebook-turns-15-amidst-privacy-concerns-avast/</loc>
		<lastmod>2019-02-05T00:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shiftleft-is-2019-rsa-innovation-sandbox-finalist/</loc>
		<lastmod>2019-02-05T01:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/video-interview-how-secure-are-your-code-signing-certificates/</loc>
		<lastmod>2019-02-05T03:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/undetected-linux-backdoor-speakup-infects-linux-macos-with-cryptominers/</loc>
		<lastmod>2019-02-05T08:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/automotive-technologies-and-cyber-security/</loc>
		<lastmod>2019-02-05T08:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/five-lessons-we-learnt-about-gdpr-in-2018/</loc>
		<lastmod>2019-02-05T09:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-documentation-the-best-defense-is-a-good-offense/</loc>
		<lastmod>2019-02-05T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/california-consumer-privacy-act-are-you-prepared-for-2020-cyberspeak-podcast/</loc>
		<lastmod>2019-02-05T10:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2019-digital-identity-progress-report/</loc>
		<lastmod>2019-02-05T11:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/home-router-or-trojan-horse/</loc>
		<lastmod>2019-02-05T11:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ensuring-strong-cyber-security-at-the-edge-2/</loc>
		<lastmod>2019-02-05T11:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-the-future-of-big-data-analytics-and-hadoop-2/</loc>
		<lastmod>2019-02-05T11:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-is-the-relationship-between-devops-and-cybersecurity/</loc>
		<lastmod>2019-02-05T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/nozomi-networks-embeds-scadaguardian-advanced-on-ruggedcom-platform/</loc>
		<lastmod>2019-02-05T13:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/7-safety-tips-for-children-on-the-internet-avast/</loc>
		<lastmod>2019-02-05T14:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/powering-low-latency-live-streaming/</loc>
		<lastmod>2019-02-05T15:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/https-the-myth-of-secure-encrypted-traffic-exposed/</loc>
		<lastmod>2019-02-05T15:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/education-cybersecurity-upgrade/</loc>
		<lastmod>2019-02-05T15:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/protect-against-current-and-future-threats-with-the-fortigate-enterprise-security-bundle/</loc>
		<lastmod>2019-02-05T15:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-james-stevensons-profiling-the-attacker/</loc>
		<lastmod>2019-02-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-cybersecurity-and-cloud-innovator-and-a-great-partner/</loc>
		<lastmod>2019-02-05T16:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-security-is-needed-to-keep-the-ci-cd-pipeline-flowing-smoothly/</loc>
		<lastmod>2019-02-05T16:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-googles-gdpr-fine-means-for-smes/</loc>
		<lastmod>2019-02-05T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/webinar-from-dev-to-infosec-myinfosecstory-on-feb-21-2019/</loc>
		<lastmod>2019-02-05T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/announcing-black-duck-opssight-2-2-container-security-at-scale/</loc>
		<lastmod>2019-02-05T17:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-post-digitization-ciso/</loc>
		<lastmod>2019-02-05T17:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsac-day-one-seminar-solving-our-cybersecurity-talent-shortage/</loc>
		<lastmod>2019-02-05T17:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/newly-discovered-security-snafu-3g-4g-5g-networks-impacted-here-we-go/</loc>
		<lastmod>2019-02-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/its-free-security-doesnt-have-to-cost-a-cent/</loc>
		<lastmod>2019-02-05T18:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-psychological-profile-of-a-hacker-with-emphasis-on-security-awareness/</loc>
		<lastmod>2019-02-05T18:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/lost-access-to-cryptocurrency-cold-storage-puts-200-million-on-ice/</loc>
		<lastmod>2019-02-05T18:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/keeping-a-finger-on-bipa/</loc>
		<lastmod>2019-02-05T18:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-does-your-password-say-about-you/</loc>
		<lastmod>2019-02-05T19:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ransomware-evolution-gandcrab-v5-1-new-exploit-kit-distribution-and-tor-site-features/</loc>
		<lastmod>2019-02-05T19:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-gem-hills-check-yourself-before-you-wreck-yourself/</loc>
		<lastmod>2019-02-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-valentines-day-warning-for-lets-encrypt-sni-users/</loc>
		<lastmod>2019-02-05T20:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/safer-internet-day-security-vs-convenience/</loc>
		<lastmod>2019-02-05T21:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/luke-kingma-and-lou-patrick-mackays-futurism-facebookery-the-banning/</loc>
		<lastmod>2019-02-05T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/3-tips-to-mitigate-security-risk-during-an-erp-cloud-migration/</loc>
		<lastmod>2019-02-05T23:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/more-alleged-sim-swappers-face-justice/</loc>
		<lastmod>2019-02-06T05:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/mandrill-email-api-outage-unresolved-leaving-users-frustrated/</loc>
		<lastmod>2019-02-06T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-information-do-cyber-criminals-most-want-from-your-business/</loc>
		<lastmod>2019-02-06T11:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/googles-new-chrome-extension-password-checkup-checks-if-your-username-or-password-has-been-exposed-to-a-third-party-breach/</loc>
		<lastmod>2019-02-06T12:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/software-vulnerabilities-used-by-200-vt-towns-left-employees-ssns-exposed/</loc>
		<lastmod>2019-02-06T12:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-why-satya-nadella-is-wise-to-align-with-privacy-advocates-on-regulating-facial-recognition/</loc>
		<lastmod>2019-02-06T13:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ohio-senate-bill-220-incentivizes-businesses-to-maintain-higher-levels-of-cybersecurity/</loc>
		<lastmod>2019-02-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/21-developers-docker-experts-reveal-the-biggest-mistakes-people-make-when-switching-to-docker-containers/</loc>
		<lastmod>2019-02-06T14:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-perfect-sales-kickoff/</loc>
		<lastmod>2019-02-06T14:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/premiering-feb-19-cyberark-webinar-on-top-security-projects-featuring-gartners-neil-macdonald/</loc>
		<lastmod>2019-02-06T14:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/achieving-business-goals-with-intent-based-segmentation/</loc>
		<lastmod>2019-02-06T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/robust-security-with-intent-based-segmentation/</loc>
		<lastmod>2019-02-06T14:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/millennials-swipe-right-on-fintech-and-security/</loc>
		<lastmod>2019-02-06T14:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-ransomware-as-a-service-understanding-raas/</loc>
		<lastmod>2019-02-06T15:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/study-shows-security-challenges-in-the-auto-industry/</loc>
		<lastmod>2019-02-06T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-tom-hargreaves-hacking-acorn-machines-or-the-bad-old-days-of-my-misspent-youth/</loc>
		<lastmod>2019-02-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-gmail-dot-addresses-to-commit-fraud/</loc>
		<lastmod>2019-02-06T16:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/machine-learning-signatures-rules-behaviors-tips-on-navigating-modern-cloud-security-solutions/</loc>
		<lastmod>2019-02-06T16:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-are-government-officials-who-know-next-to-nothing-about-encryption-so-eager-to-mandate-encryption-backdoors/</loc>
		<lastmod>2019-02-06T16:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/city-and-county-of-san-francisco-set-to-ban-facial-recognition-by-government-agencies/</loc>
		<lastmod>2019-02-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qealler-a-new-jar-based-information-stealer/</loc>
		<lastmod>2019-02-06T19:07:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-leeds-2019-amanda-berlins-hackers-hugs-drugs-mental-health-in-infosec/</loc>
		<lastmod>2019-02-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/soc-101-what-is-it/</loc>
		<lastmod>2019-02-06T21:13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-get-started-in-infosec-tips-certifications-and-career-paths/</loc>
		<lastmod>2019-02-06T21:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-modern-osi-model/</loc>
		<lastmod>2019-02-06T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/customers-blame-companies-not-hackers-for-data-breaches/</loc>
		<lastmod>2019-02-06T22:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/partnerships-aid-your-security-operations-center-ecosystem/</loc>
		<lastmod>2019-02-07T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bolster-your-security-ecosystem-with-security-partnerships/</loc>
		<lastmod>2019-02-07T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads/</loc>
		<lastmod>2019-02-07T10:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/phishers-leveraging-google-translate-to-target-google-and-facebook-users/</loc>
		<lastmod>2019-02-07T12:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-chrome-extension-warns-if-your-password-has-been-leaked/</loc>
		<lastmod>2019-02-07T12:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/seattle-government-arrange-public-review-on-the-citys-surveillance-tech-systems/</loc>
		<lastmod>2019-02-07T12:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/a-look-back-at-the-ddos-trends-of-2018/</loc>
		<lastmod>2019-02-07T13:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/here-comes-5g-what-are-the-data-security-implications/</loc>
		<lastmod>2019-02-07T13:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/social-engineer-newsletter-vol-08-issue-113/</loc>
		<lastmod>2019-02-07T13:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/congress-wants-written-answers-from-apple-on-facetime-privacy-glitch/</loc>
		<lastmod>2019-02-07T13:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vigilant-launches-gdpr-manager-to-streamline-data-protection-and-compliance/</loc>
		<lastmod>2019-02-07T14:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/upcoming-webinar-container-incidents-by-tabletop-intro-to-real-time-security-operations/</loc>
		<lastmod>2019-02-07T14:14:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/addressing-uk-security-concerns-in-huawei-products-may-take-5-years-exec-says/</loc>
		<lastmod>2019-02-07T14:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/top-30-data-center-manager-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-02-07T14:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vcp-6-5-certification-exam/</loc>
		<lastmod>2019-02-07T14:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/are-you-missing-out-on-the-appsec-conversation-that-will-benefit-your-program/</loc>
		<lastmod>2019-02-07T15:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-top-tactics-to-be-successful-at-secure-devops/</loc>
		<lastmod>2019-02-07T15:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-do-banks-and-cybersecurity-have-in-common-everything/</loc>
		<lastmod>2019-02-07T15:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-david-branscomes-doesnt-it-make-you-wannacry-mitigating-ransomware-on-a-windows-network/</loc>
		<lastmod>2019-02-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/best-of-both-worlds-automated-cloud-access-management-and-incident-response/</loc>
		<lastmod>2019-02-07T16:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avast-is-awarded-product-of-the-year-title-avast/</loc>
		<lastmod>2019-02-07T16:14:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/phishing-by-open-graph-protocol/</loc>
		<lastmod>2019-02-07T17:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-if-cybersecurity-culture-is-a-solution/</loc>
		<lastmod>2019-02-07T17:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qa-series-with-rsac-ambassador-theresa-payton/</loc>
		<lastmod>2019-02-07T17:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/keep-malicious-actors-out-of-your-private-business-workflows/</loc>
		<lastmod>2019-02-07T17:33:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-godaddy-hole-or-exploiting-the-insecurity-event-horizon/</loc>
		<lastmod>2019-02-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hiding-in-plain-sight-how-phishing-attacks-are-evolving/</loc>
		<lastmod>2019-02-07T18:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/quick-dissections-collections-2-5/</loc>
		<lastmod>2019-02-07T18:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/x-509-certificate-issuance-too-slow-for-devops/</loc>
		<lastmod>2019-02-07T18:09:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-2019-tampa-daniel-nuttings-bryan-turners-regex-for-incident-response/</loc>
		<lastmod>2019-02-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/some-iphone-apps-record-users-screens-avast/</loc>
		<lastmod>2019-02-07T20:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-cybersecurity-skills-gap-the-defining-skills-shortage-of-our-age-2/</loc>
		<lastmod>2019-02-07T21:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-shame-on-you-facebook-and-google/</loc>
		<lastmod>2019-02-07T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-next-gen-wafs-to-solve-modern-appsec-problems/</loc>
		<lastmod>2019-02-07T22:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-anatomy-of-website-malware-an-introduction/</loc>
		<lastmod>2019-02-07T22:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/visit-fortinet-on-the-microsoft-ignite-world-tour/</loc>
		<lastmod>2019-02-07T22:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/10-steps-every-organization-should-take-to-improve-cybersecurity/</loc>
		<lastmod>2019-02-08T00:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/boards-now-face-the-encryption-question/</loc>
		<lastmod>2019-02-08T02:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/data-security-is-everyones-responsibility/</loc>
		<lastmod>2019-02-08T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-open-sources-clusterfuzz-a-scalable-fuzzing-tool/</loc>
		<lastmod>2019-02-08T08:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/super-mario-oddity/</loc>
		<lastmod>2019-02-08T09:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/signal-introduces-optional-link-previews-to-enable-users-understand-whats-behind-a-url/</loc>
		<lastmod>2019-02-08T11:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/googles-adiantum-a-new-encryption-standard-for-lower-end-phones-and-other-smart-devices/</loc>
		<lastmod>2019-02-08T11:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-bezos-dick-pics-mightve-been-exposed/</loc>
		<lastmod>2019-02-08T12:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/kick-start-your-cloud-security-the-facts-infographic/</loc>
		<lastmod>2019-02-08T12:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/update-your-ios-devices-now-against-the-facetime-eavesdropping-bug/</loc>
		<lastmod>2019-02-08T12:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/phishers-target-anti-money-laundering-officers-at-u-s-credit-unions/</loc>
		<lastmod>2019-02-08T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/apple-announces-the-ios-12-1-4-with-a-fix-for-its-group-facetime-video-bug/</loc>
		<lastmod>2019-02-08T12:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/moving-to-the-cloud-do-i-still-need-a-firewall/</loc>
		<lastmod>2019-02-08T13:02:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/australia-investigating-digital-attack-attempt-against-federal-parliament/</loc>
		<lastmod>2019-02-08T13:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-monitor-file-changes-across-windows-servers/</loc>
		<lastmod>2019-02-08T13:30:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/40-of-organizations-will-adopt-biometric-saas-authentication-by-2022-gartner-predicts/</loc>
		<lastmod>2019-02-08T13:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/aligning-digital-transformation-and-security-at-ibm-think-2019/</loc>
		<lastmod>2019-02-08T14:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/icedid-targets-e-tailers-and-siri-flaw-found-avast/</loc>
		<lastmod>2019-02-08T14:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/serverless-security-and-the-weakest-link-or-how-not-to-get-nuked-by-app-dos/</loc>
		<lastmod>2019-02-08T15:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/video-a-perfect-crime-the-tech-and-psych-of-effective-phishing/</loc>
		<lastmod>2019-02-08T15:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-justin-wynns-intermediate-physical-security/</loc>
		<lastmod>2019-02-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/networking-pitch-perfecting-and-more-meta-networks-heading-back-for-another-round-at-rsac-early-stage-expo/</loc>
		<lastmod>2019-02-08T17:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ssl-attacks-part-2-where-can-cybercriminals-access-digital-certificates/</loc>
		<lastmod>2019-02-08T17:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-many-splendored-delusions-of-mark-zuckerberg/</loc>
		<lastmod>2019-02-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/california-consumer-privacy-act-the-toughest-data-privacy-law-in-the-united-states-2/</loc>
		<lastmod>2019-02-08T17:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/simplifying-cybersecurity-deployments-with-automation/</loc>
		<lastmod>2019-02-08T18:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/insider-threat-analyst-files-2-8-2019-vpn-a-double-edged-sword-analysis-of-us-sens-rubio-wyden-vpn-national-security-warning/</loc>
		<lastmod>2019-02-08T19:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-revolutionary-approach-to-hipaa-compliance/</loc>
		<lastmod>2019-02-08T19:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-marc-bakers-security-analytics-in-the-cloud/</loc>
		<lastmod>2019-02-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/women-needed-in-cybersecurity/</loc>
		<lastmod>2019-02-08T20:13:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/third-party-assessments-what-to-expect-and-why-they-can-benefit-you/</loc>
		<lastmod>2019-02-08T20:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/five-erp-security-themes-at-rsac-2019-and-how-to-learn-more/</loc>
		<lastmod>2019-02-08T20:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/growing-the-number-of-women-in-cybersecurity-cyberspeak-podcast/</loc>
		<lastmod>2019-02-08T21:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/himss-2019-champions-of-security-unite/</loc>
		<lastmod>2019-02-08T21:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-sharing-options/</loc>
		<lastmod>2019-02-08T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ios-12-1-4-patches-three-major-flaws-avast/</loc>
		<lastmod>2019-02-09T02:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/investigating-wmi-attacks/</loc>
		<lastmod>2019-02-09T05:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-filip-chytrys-how-to-use-400m-endpoints-to-build-strong-ai-detection-systems/</loc>
		<lastmod>2019-02-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/greenwalds-bezos-protests-invasion-of-privacy-and-builds-a-new-surveillance-state/</loc>
		<lastmod>2019-02-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-beau-bullocks-derek-banks-travelocalypse-its-dangerous-business-hacker-going-out-your-front-door/</loc>
		<lastmod>2019-02-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-carbonated-beverage-language-map/</loc>
		<lastmod>2019-02-09T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/quick-hit-speeding-up-a-slow-mundane-task-with-a-little-rcpp/</loc>
		<lastmod>2019-02-09T22:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-tigran-terpands-becoming-ahuman-nmap-cultivating-a-renaissance-approach-for-the-social-engineer/</loc>
		<lastmod>2019-02-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cryptocurrency-malware-app-discovered-in-googleplay/</loc>
		<lastmod>2019-02-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-kevin-kaminskis-michael-musics-logging-pitfalls-and-how-to-abuse-them/</loc>
		<lastmod>2019-02-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/api-security-applying-the-separation-of-concerns-design-principle/</loc>
		<lastmod>2019-02-10T20:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/robert-m-lees-jeff-hass-little-bobby-comics-deeply-learning/</loc>
		<lastmod>2019-02-10T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ways-to-protect-your-org-from-insider-threats/</loc>
		<lastmod>2019-02-10T23:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dna-testing-and-the-fbi-198-million-dollar-cryptocurrency-password-password-checkup-chrome-extension-wb55/</loc>
		<lastmod>2019-02-11T05:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/brave-privacy-browser-has-a-backdoor-to-remotely-inject-headers-in-http-requests-hackernews/</loc>
		<lastmod>2019-02-11T09:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-short-and-longer-term-remaining-damage-of-the-government-closure-on-cybersecurity/</loc>
		<lastmod>2019-02-11T10:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/microsoft-and-cisco-propose-ideas-for-a-biometric-privacy-law-after-the-state-of-illinois-passed-one/</loc>
		<lastmod>2019-02-11T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/security-researchers-discloses-vulnerabilities-in-tls-libraries-and-the-downgrade-attack-on-tls-1-3/</loc>
		<lastmod>2019-02-11T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/its-your-right-do-it-right-2/</loc>
		<lastmod>2019-02-11T12:15:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hackers-invited-to-attack-swiss-e-voting-system-in-latest-bug-bounty-program/</loc>
		<lastmod>2019-02-11T13:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/five-convergence-solutions-to-help-manufacturing-cross-the-it-ot-security-schism/</loc>
		<lastmod>2019-02-11T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/supply-chain-security-sex-appeal-pain-avoidance-and-allies/</loc>
		<lastmod>2019-02-11T13:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/unsanctioned-apps-in-the-enterprise/</loc>
		<lastmod>2019-02-11T14:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/owning-your-legal-practices-cybersecurity-msps-and-you/</loc>
		<lastmod>2019-02-11T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/automatic-4k-hd-for-youtube-extension-pulled-from-chrome-store-for-pop-up-ad-abuse/</loc>
		<lastmod>2019-02-11T14:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/inner-circle-podcast-episode-021-wendy-nather-talks-about-the-value-of-zero-trust-security/</loc>
		<lastmod>2019-02-11T14:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-the-key-management-interoperability-protocol-kmip-the-benefit-of-a-kmip-compliant-key-manager/</loc>
		<lastmod>2019-02-11T15:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/enhancing-cyber-threat-protection-in-microsoft-office-365/</loc>
		<lastmod>2019-02-11T15:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/national-clean-your-pc-day-avast/</loc>
		<lastmod>2019-02-11T15:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-rick-ramgatties-hacking-iot-devices-by-chaining-application-security-vulnerabilities/</loc>
		<lastmod>2019-02-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/7-benefits-of-security-awareness-training/</loc>
		<lastmod>2019-02-11T16:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/red-teaming-overview-assessment-methodology/</loc>
		<lastmod>2019-02-11T16:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/u-s-senators-concerned-by-government-employees-use-of-foreign-vpns/</loc>
		<lastmod>2019-02-11T16:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/congratulations-to-cyberarks-scott-whitehouse-on-being-named-a-crn-channel-chief-four-years-running/</loc>
		<lastmod>2019-02-11T17:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bigid-and-rsac-innovation-sandbox-building-on-a-record-year-in-data-privacy/</loc>
		<lastmod>2019-02-11T17:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-true-end-to-end-encryption-is-important-for-distributed-apps/</loc>
		<lastmod>2019-02-11T17:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/future-of-payments-conference/</loc>
		<lastmod>2019-02-11T17:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/red-team-operations-lock-picking-and-physical-security/</loc>
		<lastmod>2019-02-11T17:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-iot-still-feature-rich-security-poor/</loc>
		<lastmod>2019-02-11T17:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/did-you-check-the-post-it-under-the-keyboard/</loc>
		<lastmod>2019-02-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/five-major-cloud-security-roadblocks-and-their-impact-on-the-enterprise/</loc>
		<lastmod>2019-02-11T19:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-jeremy-rasmussens-election-hacking-getting-ready-for-the-russian-onslaught-in-2020/</loc>
		<lastmod>2019-02-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/securing-the-widening-attack-surface-of-healthcare-today/</loc>
		<lastmod>2019-02-11T20:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/webinar-qa-from-modern-network-threat-detection-and-response/</loc>
		<lastmod>2019-02-11T21:36:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-lets-play-facebook/</loc>
		<lastmod>2019-02-11T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qualifying-encoders-with-akamai/</loc>
		<lastmod>2019-02-11T22:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-business-of-organised-cybercrime/</loc>
		<lastmod>2019-02-11T22:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/your-lenovo-watch-x-is-watching-you-sharing-what-it-learns/</loc>
		<lastmod>2019-02-11T23:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/guest-essay-australias-move-compelling-vpns-to-cooperate-with-law-enforcement-is-all-wrong/</loc>
		<lastmod>2019-02-12T00:03:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsa-2019-sessions-you-should-have-on-your-calendar/</loc>
		<lastmod>2019-02-12T00:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/does-artificial-intelligence-mean-artificial-security/</loc>
		<lastmod>2019-02-12T08:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/average-ddos-attack-volume-tripled-in-a-year-new-data-reveals/</loc>
		<lastmod>2019-02-12T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-can-project-furnace-solve-dx-dilemma-by-combining-serverless-computing-and-gitops/</loc>
		<lastmod>2019-02-12T09:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/so-youve-suffered-a-data-breach-heres-what-you-do-next/</loc>
		<lastmod>2019-02-12T09:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cis-top-20-security-controls-with-tony-sager-cyberspeak-podcast/</loc>
		<lastmod>2019-02-12T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5g-big-csp-security-as-a-service-opportunity/</loc>
		<lastmod>2019-02-12T11:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/switzerland-launches-a-bug-bounty-program-public-intrusion-test-to-find-vulnerabilities-in-its-e-voting-systems/</loc>
		<lastmod>2019-02-12T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/it-is-everyones-business-and-responsibility-40-cybersecurity-professionals-share-what-they-wish-business-leaders-would-understand-in-their-own-words/</loc>
		<lastmod>2019-02-12T12:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/greyenergy-malware-research-paper-maldoc-to-backdoor/</loc>
		<lastmod>2019-02-12T12:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/in-the-event-of-shutdown-part-2-trust-your-instruments/</loc>
		<lastmod>2019-02-12T13:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dunkin-says-credential-stuffing-attacks-targeted-dd-perks-accounts/</loc>
		<lastmod>2019-02-12T13:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/email-provider-vfemail-suffers-catastrophic-hack/</loc>
		<lastmod>2019-02-12T13:33:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-schedule-future-and-recurrent-scans/</loc>
		<lastmod>2019-02-12T14:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-build-facilitates-scanning-restricted-areas-and-sites-which-use-swagger-and-soap/</loc>
		<lastmod>2019-02-12T14:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/authenticated-scans-on-applications-that-make-use-of-one-time-tokens-or-captchas/</loc>
		<lastmod>2019-02-12T14:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-of-education-sector-in-the-air-edguards-awarded/</loc>
		<lastmod>2019-02-12T14:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/uk-consumers-wont-spend-with-brands-they-dont-trust/</loc>
		<lastmod>2019-02-12T14:55:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/facial-recognition-on-the-rise-avast/</loc>
		<lastmod>2019-02-12T14:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-risks-do-iot-security-issues-pose-to-businesses/</loc>
		<lastmod>2019-02-12T14:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cloud-on-premises-or-hybrid-what-is-the-best-hsm-solution-for-you/</loc>
		<lastmod>2019-02-12T15:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/3-takeaways-from-dojs-indictment-of-russian-hackers/</loc>
		<lastmod>2019-02-12T14:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/government-shutdown-cybersecurity-outcomes-three-weeks-out/</loc>
		<lastmod>2019-02-12T15:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-tal-melameds-serverless-security-top-10/</loc>
		<lastmod>2019-02-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shiftleft-raises-20-million-in-series-b-funding/</loc>
		<lastmod>2019-02-12T16:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/financial-services-blindspot-browser/</loc>
		<lastmod>2019-02-12T16:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-services-to-fill-critical-security-gaps/</loc>
		<lastmod>2019-02-12T16:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fault-in-our-staff-education-organization-cybersecurity/</loc>
		<lastmod>2019-02-12T16:18:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/designing-out-cyber-threats/</loc>
		<lastmod>2019-02-12T16:20:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dont-be-a-dumb-carrier/</loc>
		<lastmod>2019-02-12T16:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-visibility-is-critical-to-protecting-machine-identities-an-interview-with-ciso-john-graham/</loc>
		<lastmod>2019-02-12T16:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/high-severity-runc-vulnerability-exposes-docker-and-kubernetes-hosts/</loc>
		<lastmod>2019-02-12T16:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/transforming-alert-fatigue-into-proactive-security-management/</loc>
		<lastmod>2019-02-12T17:17:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/getting-to-know-the-new-rsac-advisory-board-members-j-trevor-hughes/</loc>
		<lastmod>2019-02-12T17:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/privacy-charade-cisco-lines-up-in-privacy-parade/</loc>
		<lastmod>2019-02-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/3-takeaways-from-managing-the-business-risks-of-open-source-webinar/</loc>
		<lastmod>2019-02-12T18:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/earning-network-ceus/</loc>
		<lastmod>2019-02-12T18:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/network-study-resources/</loc>
		<lastmod>2019-02-12T18:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/quickly-gauge-your-serverless-security-readiness-with-this-short-quiz/</loc>
		<lastmod>2019-02-12T18:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/protecting-your-domain-names-taking-the-first-steps/</loc>
		<lastmod>2019-02-12T18:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vaporstream-introduces-new-automation-module-to-secure-communications-platform-that-streamlines-healthcare-business-workflows-2/</loc>
		<lastmod>2019-02-12T18:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/february-2019-patch-tuesday-74-vulns-20-critical-exchange-0-day-adobe-vulns/</loc>
		<lastmod>2019-02-12T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-nikita-mazurovs-kenny-browns-phishing-u2f-protected-accounts/</loc>
		<lastmod>2019-02-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/champions-of-health-and-cybersecurity-unite-at-himss-2019/</loc>
		<lastmod>2019-02-12T20:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/understanding-6-key-terms-used-to-describe-phishing-schemes/</loc>
		<lastmod>2019-02-12T21:24:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/daniel-storis-what-processes-do-when-they-are-idle/</loc>
		<lastmod>2019-02-12T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/googlebot-or-a-ddos-attack/</loc>
		<lastmod>2019-02-12T23:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/sap-security-notes-february-19-several-critical-bugs-affecting-sap-hana-xsa/</loc>
		<lastmod>2019-02-12T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/es2019-features-coming-to-javascript-starring-us/</loc>
		<lastmod>2019-02-12T23:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vert-threat-alert-february-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-02-13T00:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/patch-tuesday-february-2019-edition/</loc>
		<lastmod>2019-02-13T03:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-benefits-of-remaining-anonymous-online/</loc>
		<lastmod>2019-02-13T08:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-valentines-day-premonition/</loc>
		<lastmod>2019-02-13T10:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/australian-government-worries-businesses-dont-focus-enough-on-securing-commercial-secrets/</loc>
		<lastmod>2019-02-13T10:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/whats-new-at-swimlane-find-out-at-rsa-2019/</loc>
		<lastmod>2019-02-13T11:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/researchers-prove-that-intel-sgx-and-tsx-can-hide-malware-from-antivirus-software/</loc>
		<lastmod>2019-02-13T11:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/to-agent-or-not-to-agent-that-is-the-vulnerability-management-question/</loc>
		<lastmod>2019-02-13T11:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-security-plus/</loc>
		<lastmod>2019-02-13T12:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyberinsurance-and-acts-of-war/</loc>
		<lastmod>2019-02-13T12:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-impervas-new-attack-crowdsourcing-secures-your-businesss-applications/</loc>
		<lastmod>2019-02-13T12:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qualys-acquires-software-assets-of-cloud-application-management-company-adya/</loc>
		<lastmod>2019-02-13T13:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/datacamp-implements-partial-password-reset-after-data-security-incident/</loc>
		<lastmod>2019-02-13T13:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyber-attack-costs-can-cripple-small-and-medium-sized-businesses/</loc>
		<lastmod>2019-02-13T13:20:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bitglass-security-spotlight-google-gdpr-homeland-security/</loc>
		<lastmod>2019-02-13T14:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/api-security-lives-at-the-heart-of-the-breach/</loc>
		<lastmod>2019-02-13T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hiding-malware-in-certificates/</loc>
		<lastmod>2019-02-13T14:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-key-cloud-security-use-cases/</loc>
		<lastmod>2019-02-13T14:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/key-reasons-to-teach-an-online-course-benefits-of-online-teaching/</loc>
		<lastmod>2019-02-13T15:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-advanced-ai-to-stay-ahead-of-cybercriminals/</loc>
		<lastmod>2019-02-13T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-test-your-security-controls-for-small-medium-businesses/</loc>
		<lastmod>2019-02-13T15:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/13-popular-wireless-hacking-tools-updated-for-2019/</loc>
		<lastmod>2019-02-13T15:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-joe-grays-social-forensication-a-multidisciplinary-approach-to-successful-social-engineering/</loc>
		<lastmod>2019-02-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/tricky-will-ueba-and-nta-ever-merge/</loc>
		<lastmod>2019-02-13T16:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/federal-pki-security-challenges-extending-idaas-with-certificate-as-a-service/</loc>
		<lastmod>2019-02-13T16:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-costs-of-cyberattacks-are-real/</loc>
		<lastmod>2019-02-13T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2019-secure-miami/</loc>
		<lastmod>2019-02-13T17:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ransomware-attack-on-msps-exploits-popular-psa-rmm-tool/</loc>
		<lastmod>2019-02-13T17:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hrs-role-in-protecting-your-business/</loc>
		<lastmod>2019-02-13T17:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-flaws-in-childrens-smart-watches-2/</loc>
		<lastmod>2019-02-13T17:51:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/illinois-supreme-court-has-ruled-no-proof-of-harm-needed-in-biometric-privacy-violations/</loc>
		<lastmod>2019-02-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/more-resources-needed-to-improve-connected-car-security/</loc>
		<lastmod>2019-02-13T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-to-expect-at-our-accelerate-2019-conference/</loc>
		<lastmod>2019-02-13T18:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/beyond-tor-examining-the-uncharted-corners-of-the-dark-web/</loc>
		<lastmod>2019-02-13T19:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-defend-against-the-runc-container-vulnerability/</loc>
		<lastmod>2019-02-13T19:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fosdem-2019-designing-better-cryptographic-mechanisms-to-avoid-pitfalls-talk-by-maximilian-blochberger/</loc>
		<lastmod>2019-02-13T19:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-brian-etchiesons-beyond-lockpicking/</loc>
		<lastmod>2019-02-13T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/turnkey-fortinet-solutions-part-of-new-marketplace-for-oracle-cloud-infrastructure/</loc>
		<lastmod>2019-02-13T20:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/no-avoiding-the-inevitable-the-time-for-cyber-security-analytics-is-now/</loc>
		<lastmod>2019-02-13T21:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-launch-risk/</loc>
		<lastmod>2019-02-13T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/preview-pain-malware-triggers-in-outlook-preview-without-user-opening-word-document/</loc>
		<lastmod>2019-02-14T02:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/tech-refresh-as-part-of-an-effective-vulnerability-management-program-part-two/</loc>
		<lastmod>2019-02-14T02:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bomb-threat-hoaxer-exposed-by-hacked-gaming-site/</loc>
		<lastmod>2019-02-14T05:37:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/truth-or-dar-or-the-truth-about-dar-security/</loc>
		<lastmod>2019-02-14T08:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/abcs-of-ueba-c-is-for-context-2/</loc>
		<lastmod>2019-02-14T10:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/openssl-3-0-will-have-significant-changes-in-architecture-will-include-fips-module-and-more/</loc>
		<lastmod>2019-02-14T11:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/pci-pal-enables-pci-compliance-for-sixpackabs/</loc>
		<lastmod>2019-02-14T11:54:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/adventures-of-cyber-security-monitoring-during-2018-u-s-midterm-elections/</loc>
		<lastmod>2019-02-14T12:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-hackable-is-your-dating-app/</loc>
		<lastmod>2019-02-14T14:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hacker-arrested-for-wave-of-fake-bomb-and-shooting-threats-against-schools/</loc>
		<lastmod>2019-02-14T14:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-news-hackers-aim-no-worse-than-cupid/</loc>
		<lastmod>2019-02-14T14:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-difference-between-security-trick-plays-and-security-fundamentals/</loc>
		<lastmod>2019-02-14T14:52:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/demystifying-the-crypter-used-in-emotet-qbot-and-dridex/</loc>
		<lastmod>2019-02-14T15:38:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hack-the-box-htb-machines-walkthrough-series-valentine/</loc>
		<lastmod>2019-02-14T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/infosec-institutes-top-podcasts-to-take-your-computer-skills-to-the-next-level/</loc>
		<lastmod>2019-02-14T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-organizations-can-benefit-if-the-ciso-is-an-attorney/</loc>
		<lastmod>2019-02-14T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-wes-widners-the-sound-of-evil/</loc>
		<lastmod>2019-02-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/healthcares-cybersecurity-radiography-only-one-in-six-organizations-can-detect-advanced-threats/</loc>
		<lastmod>2019-02-14T16:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-software-standards-aim-to-slow-rampant-credit-card-theft/</loc>
		<lastmod>2019-02-14T17:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dod-releases-report-stryker-vehicles-hacked-in-nato-exercises/</loc>
		<lastmod>2019-02-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/3-reasons-your-business-needs-security-at-the-edge/</loc>
		<lastmod>2019-02-14T18:15:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/social-media-the-new-public-square-for-fraudsters/</loc>
		<lastmod>2019-02-14T18:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fortinet-beats-the-competition-with-its-robust-secure-sd-wan-solution/</loc>
		<lastmod>2019-02-14T18:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-bruce-andersons-an-inside-look-at-stopping-unauthorized-sellers-counterfeiters-on-amazon/</loc>
		<lastmod>2019-02-14T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/build-a-holistic-proactive-defense-around-your-business-workflows/</loc>
		<lastmod>2019-02-14T20:15:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-gift-ideas-for-the-technologist-in-your-life/</loc>
		<lastmod>2019-02-14T20:38:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/romance-can-be-costly-if-you-fall-for-these-scams/</loc>
		<lastmod>2019-02-14T21:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-profile-of-a-nice-guy/</loc>
		<lastmod>2019-02-14T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-science-project-or-immediate-value-which-do-you-prefer/</loc>
		<lastmod>2019-02-14T22:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/6-bold-predictions-for-smartphone-surveillance-in-2019/</loc>
		<lastmod>2019-02-14T23:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/safecase-and-beyond-safeguarding-smartphone-data/</loc>
		<lastmod>2019-02-14T23:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-smartphone-espionage-can-disrupt-an-election/</loc>
		<lastmod>2019-02-14T23:23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/demystifying-the-hardware-supply-chain-for-smartphones/</loc>
		<lastmod>2019-02-14T23:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/why-does-the-world-need-a-safecase/</loc>
		<lastmod>2019-02-14T23:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/voice-is-the-next-interface-but-what-does-that-mean-for-mobile-security/</loc>
		<lastmod>2019-02-14T23:23:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/blog-checkmarx-2019-02-13-171054/</loc>
		<lastmod>2019-02-14T23:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/logonbox-awarded-as-a-2019-it-security-software-rising-star-by-financesonline-directory/</loc>
		<lastmod>2019-02-14T23:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/state-of-passwords-security-2019-businesses-still-falling-short/</loc>
		<lastmod>2019-02-14T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/an-overview-of-yubikey-two-factor-authentication/</loc>
		<lastmod>2019-02-14T23:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-reduce-identity-theft-with-multi-factor-authentication/</loc>
		<lastmod>2019-02-14T23:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/4-questions-to-ask-our-experts-at-rsa/</loc>
		<lastmod>2019-02-15T00:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-anti-fraud-resolution-2/</loc>
		<lastmod>2019-02-15T02:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybercrime-results-are-in-and-the-winner-is-2/</loc>
		<lastmod>2019-02-15T02:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/data-is-the-new-currency-own-your-data-or-someone-else-will-2/</loc>
		<lastmod>2019-02-15T02:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/defending-your-future-with-machine-learning-2/</loc>
		<lastmod>2019-02-15T02:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/fighting-holiday-fraud-lessons-from-black-friday-cyber-monday-2/</loc>
		<lastmod>2019-02-15T02:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/sleepless-in-security-sensor-y-overload-2/</loc>
		<lastmod>2019-02-15T02:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/a-theoretical-riskicists-guide-to-the-universe-3/</loc>
		<lastmod>2019-02-15T02:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/build-a-global-anti-fraud-operations-center-in-five-steps-2/</loc>
		<lastmod>2019-02-15T02:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/7-security-trends-to-watch-in-the-new-year-2/</loc>
		<lastmod>2019-02-15T02:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/rise-of-the-machines-a-new-world-of-identity-governance-2/</loc>
		<lastmod>2019-02-15T02:44:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/closing-the-cyber-skills-gap-cyberspeak-podcast/</loc>
		<lastmod>2019-02-15T10:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bank-of-valletta-shuts-down-operations-after-hackers-attempt-13-million-eur-transfer-overseas/</loc>
		<lastmod>2019-02-15T11:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/optus-customers-saw-incorrect-info-after-logging-into-my-account-site/</loc>
		<lastmod>2019-02-15T12:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-what-it-takes-to-beat-cybercrime-in-the-age-of-dx-and-iot-personal-responsibility/</loc>
		<lastmod>2019-02-15T12:52:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/10-ways-to-deadbolt-your-google-account/</loc>
		<lastmod>2019-02-15T13:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/windows-malware-for-macs-and-more-weekly-news-avast/</loc>
		<lastmod>2019-02-15T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/has-technology-improved-or-destroyed-business-security/</loc>
		<lastmod>2019-02-15T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fic-2019-protecting-is-attacks-starts-with-secure-access-management/</loc>
		<lastmod>2019-02-15T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-wes-lamberts-enterprise-security-monitoring-seeing-clearly-with-security-onion/</loc>
		<lastmod>2019-02-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/add-security-to-your-website-agency-portfolio/</loc>
		<lastmod>2019-02-15T16:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ssl-tls-attacks-part-3-whos-at-risk-from-compromised-digital-certificates/</loc>
		<lastmod>2019-02-15T17:12:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-inaugural-rsa-conference-launch-pad-empowering-early-stage-innovators-in-cybersecurity/</loc>
		<lastmod>2019-02-15T17:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cough-up-the-bandwidth/</loc>
		<lastmod>2019-02-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/creating-a-cloud-security-strategy-with-culture-and-technology/</loc>
		<lastmod>2019-02-15T19:13:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/automation-you-can-trust-remediating-cloud-misconfigurations-and-policy-violations-in-real-time/</loc>
		<lastmod>2019-02-15T19:21:23+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->