<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-roger-grimes-day-when-quantum-computers-breaks-crypto/</loc>
		<lastmod>2019-02-15T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/securing-clients-in-sap-s-4hana-and-netweaver-abap/</loc>
		<lastmod>2019-02-15T20:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-invisible-formatting/</loc>
		<lastmod>2019-02-15T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/increasing-threat-intelligence-with-apklab-io-avast/</loc>
		<lastmod>2019-02-16T00:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vaporstream-unveils-new-user-interface-designed-to-improve-usability-and-streamline-workflows-optimizing-productivity-2/</loc>
		<lastmod>2019-02-16T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rietspoof-malware-family-increases-activity-avast/</loc>
		<lastmod>2019-02-16T15:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-gene-cronks-securing-shadow-it/</loc>
		<lastmod>2019-02-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/us-dod-launches-new-ai-based-fire-fighting-project-in-california/</loc>
		<lastmod>2019-02-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bsides-tampa-2019-mike-brookss-vciso-is-that-the-right-answer/</loc>
		<lastmod>2019-02-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/luke-kingma-and-lou-patrick-mackays-futurism-heres-the-story-of-a-failed-group-facetime/</loc>
		<lastmod>2019-02-16T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/blockchain-and-trust/</loc>
		<lastmod>2019-02-17T10:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-francis-duffs-security-tool-evaluations-with-mitre-attck/</loc>
		<lastmod>2019-02-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/deepsqueek/</loc>
		<lastmod>2019-02-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-avi-zajacs-a-little-birdy-told-me-about-your-warrants/</loc>
		<lastmod>2019-02-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/resolve-to-be-more-involved-in-your-local-community-revisited/</loc>
		<lastmod>2019-02-17T21:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/robert-m-lees-jeff-hass-little-bobby-comics-strategies/</loc>
		<lastmod>2019-02-17T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/conquering-caffeinated-amazon-athena-with-the-metis-trio-of-packages/</loc>
		<lastmod>2019-02-18T03:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/preventing-illegal-robocalls-webcam-spying-dating-app-account-hacking-wb56/</loc>
		<lastmod>2019-02-18T05:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/account-security-a-divided-user-perception/</loc>
		<lastmod>2019-02-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/in-lead-up-to-elections-australia-confirms-nation-state-attack-on-infrastructure-political-parties/</loc>
		<lastmod>2019-02-18T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks/</loc>
		<lastmod>2019-02-18T13:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/popular-torrents-uploader-caught-sharing-gandcrab-ransomware/</loc>
		<lastmod>2019-02-18T14:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/inner-circle-podcast-episode-022-marcus-carey-chats-about-tribe-of-hackers/</loc>
		<lastmod>2019-02-18T14:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/changes-to-comptias-a-exam-220-901-and-220-902-220-1001-and-220-1002/</loc>
		<lastmod>2019-02-18T15:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/microsoft-mcse-exam-review/</loc>
		<lastmod>2019-02-18T15:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fear-of-data-breaches-driving-big-businesses-to-raise-spending-on-it-in-2019-survey-shows/</loc>
		<lastmod>2019-02-18T15:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-evms-a-code-pirates-cutlass-recovering-software-architecture-from-embedded-binaries/</loc>
		<lastmod>2019-02-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/in-dev-wigle-your-way-into-a-hotspot-with-wiglr/</loc>
		<lastmod>2019-02-18T17:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/webinar-how-to-become-a-certified-ethical-hacker-ceh/</loc>
		<lastmod>2019-02-18T17:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/popular-computer-forensics-top-21-tools-updated-for-2019/</loc>
		<lastmod>2019-02-18T17:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-hidden-costs-and-risks-of-free-puppies-and-open-source/</loc>
		<lastmod>2019-02-18T17:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-releases-new-chrome-password-warning-extension/</loc>
		<lastmod>2019-02-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/forgerock-identity-cloud-early-access-program/</loc>
		<lastmod>2019-02-18T17:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-michael-porteras-analyzing-shodan-images-with-optical-character-recognition/</loc>
		<lastmod>2019-02-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-error-bars/</loc>
		<lastmod>2019-02-18T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/learn-how-you-can-get-a-running-start-with-devsecops/</loc>
		<lastmod>2019-02-18T22:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-you-should-be-concerned-about-cybersecurity-now-more-than-ever-before/</loc>
		<lastmod>2019-02-19T01:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-evolving-levels-of-effort-2/</loc>
		<lastmod>2019-02-19T06:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2019-thales-dtr-global-edition-facts-that-may-surprise-you/</loc>
		<lastmod>2019-02-19T08:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/450000-usernames-and-passwords-stolen-from-coinmama-cryptocurrency-broker/</loc>
		<lastmod>2019-02-19T08:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-gandcrab-v5-1-decryptor-available-now/</loc>
		<lastmod>2019-02-19T09:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-future-of-the-contact-centre/</loc>
		<lastmod>2019-02-19T10:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/kali-linux-2019-1-released-with-support-for-metasploit-5-0/</loc>
		<lastmod>2019-02-19T10:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/strictly-private-why-iso-27001-is-a-big-deal/</loc>
		<lastmod>2019-02-19T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/tribbles-supply-chains-and-industrial-cyber-security/</loc>
		<lastmod>2019-02-19T11:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/20-cant-miss-seminars-sessions-and-panels-at-rsac-this-year/</loc>
		<lastmod>2019-02-19T12:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/when-it-comes-to-nist-800-171-compliance-theres-on-time-and-theres-lombardi-time/</loc>
		<lastmod>2019-02-19T12:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/7-tips-to-keep-your-data-secure-in-the-cloud/</loc>
		<lastmod>2019-02-19T12:16:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/estonias-volunteer-cyber-militia/</loc>
		<lastmod>2019-02-19T12:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2-7-million-recordings-of-phone-calls-made-to-swedish-1177-health-care-service-were-left-publicly-accessible-online/</loc>
		<lastmod>2019-02-19T12:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/decryptor-now-available-for-files-affected-by-gandcrab-ransomware-v5-1/</loc>
		<lastmod>2019-02-19T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/us-version-of-gdpr-could-be-in-the-cards-for-2019/</loc>
		<lastmod>2019-02-19T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-prioritize-cloud-security-in-2019/</loc>
		<lastmod>2019-02-19T13:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/enterprise-security-and-risk-management-efforts-continue-to-lag/</loc>
		<lastmod>2019-02-19T13:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/splunk-will-no-longer-be-available-for-russian-companies/</loc>
		<lastmod>2019-02-19T14:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/risk-quantification-its-not-what-its-how/</loc>
		<lastmod>2019-02-19T14:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-rsa-2019-shortlist/</loc>
		<lastmod>2019-02-19T14:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-devops-ebook-managing-application-secrets-what-do-developers-really-want/</loc>
		<lastmod>2019-02-19T14:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cert-csih-domain-4-respond/</loc>
		<lastmod>2019-02-19T14:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/breaking-the-silence-about-privileged-access-management-at-gartner-iam-summit/</loc>
		<lastmod>2019-02-19T15:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/pay-attention-to-student-privacy-protection/</loc>
		<lastmod>2019-02-19T15:08:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/veracode-included-in-new-forrester-now-tech-software-composition-analysis-q1-2019/</loc>
		<lastmod>2019-02-19T15:16:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/brain-hacking-why-social-engineering-is-so-effective/</loc>
		<lastmod>2019-02-19T15:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/who-puts-the-ethics-in-ai-avast/</loc>
		<lastmod>2019-02-19T15:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/regent-college-protects-with-avast-business-managed-antivirus-avast-business/</loc>
		<lastmod>2019-02-19T15:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fortinet-secures-the-path-to-5g/</loc>
		<lastmod>2019-02-19T15:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/analysis-of-a-fresh-variant-of-the-emotet-malware/</loc>
		<lastmod>2019-02-19T15:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/understanding-the-darknet-and-its-impact-on-cybersecurity/</loc>
		<lastmod>2019-02-19T15:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ransomware-to-land-cyber-crooks-decades-in-maryland-prisons-if-new-bill-passes/</loc>
		<lastmod>2019-02-19T15:47:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-omahas-4f4d414841-tripe-wireless/</loc>
		<lastmod>2019-02-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cipher-selected-as-top-10-best-performing-mssp/</loc>
		<lastmod>2019-02-19T16:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/home-digital-asset-security/</loc>
		<lastmod>2019-02-19T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/quick-and-dirty-burpsuite-tutorial-2019-update/</loc>
		<lastmod>2019-02-19T16:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/top-5-free-learning-resources-for-cyber-security-beginners-updated-2019/</loc>
		<lastmod>2019-02-19T16:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/firedomes-endpoint-protection-solution-for-improved-iot-security/</loc>
		<lastmod>2019-02-19T16:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/three-major-australian-political-parties-hacked-by-sophisticated-state-actor-ahead-of-election/</loc>
		<lastmod>2019-02-19T16:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/phishing-attacks-how-to-protect-your-business-and-users-2/</loc>
		<lastmod>2019-02-19T17:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-identify-threats-within-your-docker-containers/</loc>
		<lastmod>2019-02-19T17:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-improve-software-security-testing-in-the-auto-industry/</loc>
		<lastmod>2019-02-19T17:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/streamlining-healthcare-workflows-with-vaporstream-concierge/</loc>
		<lastmod>2019-02-19T17:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/gangster-of-digitals/</loc>
		<lastmod>2019-02-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-david-huertas-how-the-press-gets-pwned/</loc>
		<lastmod>2019-02-19T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-importance-of-website-logs/</loc>
		<lastmod>2019-02-19T20:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/smarthome-is-it-simple-yet/</loc>
		<lastmod>2019-02-19T20:23:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-machine-learning-2/</loc>
		<lastmod>2019-02-19T20:08:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-rando-stats-from-watching-ecrime-all-day-every-day/</loc>
		<lastmod>2019-02-19T21:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bring-automation-to-your-hsm-key-orchestration/</loc>
		<lastmod>2019-02-19T21:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-joy-of-tech-news-of-apple-news/</loc>
		<lastmod>2019-02-19T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/it-culture-transformation-and-technology/</loc>
		<lastmod>2019-02-19T22:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/things-to-worry-about-in-2019/</loc>
		<lastmod>2019-02-20T00:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/q-a-common-misconceptions-about-security-in-hybrid-environments/</loc>
		<lastmod>2019-02-20T01:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/92-million-myheritage-genealogy-accounts-breached-now-what-2/</loc>
		<lastmod>2019-02-20T00:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/book-review-linux-basics-for-hackers/</loc>
		<lastmod>2019-02-20T02:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/i-just-wanted-the-data-turning-tableau-tidyverse-tears-into-smiles-with-base-r-an-encoding-detective-story/</loc>
		<lastmod>2019-02-20T05:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/totalretail-feature-when-it-comes-to-security-us-consumers-put-their-money-where-their-trust-is/</loc>
		<lastmod>2019-02-20T10:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/finance-digest-feature-payment-card-security-looking-ahead-2019/</loc>
		<lastmod>2019-02-20T11:03:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ryuk-ransomware-exploring-the-technical-and-human-connections/</loc>
		<lastmod>2019-02-20T11:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/github-increases-its-reward-payout-model-for-its-bug-bounty-program/</loc>
		<lastmod>2019-02-20T11:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsa-conference-2019-best-sessions-for-secops/</loc>
		<lastmod>2019-02-20T12:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/separ-infostealer-using-living-off-the-land-tactics-to-target-businesses/</loc>
		<lastmod>2019-02-20T12:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-federal-agencies-can-fulfill-the-next-steps-of-the-fcwaa/</loc>
		<lastmod>2019-02-20T12:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/aws-system-manager-and-the-dangers-of-default-permissions/</loc>
		<lastmod>2019-02-20T12:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-in-hot-water-after-not-revealing-it-had-hidden-a-secret-microphone-in-home-alarm-product/</loc>
		<lastmod>2019-02-20T13:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/excessive-permissions-are-your-1-cloud-threat/</loc>
		<lastmod>2019-02-20T13:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-impact-of-quantum-computing-on-cybersecurity/</loc>
		<lastmod>2019-02-20T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/even-with-security-flaws-you-should-be-using-a-password-manager/</loc>
		<lastmod>2019-02-20T13:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/data-breach-at-stanford-exposes-student-records-personal-info/</loc>
		<lastmod>2019-02-20T14:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avast-security-themed-events-at-mwc-2019-avast/</loc>
		<lastmod>2019-02-20T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyber-and-physical-convergence-is-creating-new-attack-opportunities-for-cybercriminals/</loc>
		<lastmod>2019-02-20T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-not-so-black-and-white-of-grayware/</loc>
		<lastmod>2019-02-20T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/exploring-commonly-used-yet-vulnerable-components/</loc>
		<lastmod>2019-02-20T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-marc-sodas-three-ways-duckduckgo-protects-user-privacy/</loc>
		<lastmod>2019-02-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/threat-stack-successfully-completes-type-2-soc-2-examination-with-zero-exceptions-again/</loc>
		<lastmod>2019-02-20T16:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-heres-why-the-internet-societys-new-privacy-code-of-conduct-deserves-wide-adoption/</loc>
		<lastmod>2019-02-20T16:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-secure-communications-to-safeguard-against-phishing-2/</loc>
		<lastmod>2019-02-20T16:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-things-impacting-security-in-2019/</loc>
		<lastmod>2019-02-20T16:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/looking-back-at-rsac-2018-security-strategy-operations/</loc>
		<lastmod>2019-02-20T17:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-xinjang-job/</loc>
		<lastmod>2019-02-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-free-study-resources-for-the-comptia-network-exam/</loc>
		<lastmod>2019-02-20T18:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/have-you-ever-received-one-of-those-calls/</loc>
		<lastmod>2019-02-20T18:55:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-importance-of-forward-secrecy-in-tls-1-3/</loc>
		<lastmod>2019-02-20T19:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/which-cybersecurity-framework-is-right-for-you/</loc>
		<lastmod>2019-02-20T19:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoo-con-2019-nina-kollars-paul-bristers-mentoring-the-intelligent-deviant/</loc>
		<lastmod>2019-02-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/disabling-anti-malware-scanning/</loc>
		<lastmod>2019-02-20T20:55:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/looking-for-a-gigya-alternative-try-loginradius-a-superior-and-modern-identity-platform/</loc>
		<lastmod>2019-02-20T20:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-opportunity-rover/</loc>
		<lastmod>2019-02-20T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/key-development-skills-for-it-pros/</loc>
		<lastmod>2019-02-20T22:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/nest-secure-users-learn-of-secret-microphone-avast/</loc>
		<lastmod>2019-02-20T23:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/can-you-trust-security-tests/</loc>
		<lastmod>2019-02-20T23:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/139-us-bars-restaurants-and-coffeeshops-infected-by-credit-card-stealing-malware/</loc>
		<lastmod>2019-02-21T07:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/downtime-can-cost-a-company-up-to-67-million-over-two-years-threatening-brand-reputation/</loc>
		<lastmod>2019-02-21T08:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/in-the-future-you-may-find-her-on-an-island-meet-ncipher-securitys-vp-of-operations-gwen-martin/</loc>
		<lastmod>2019-02-21T07:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cybersecurity-statistics-for-2019-the-chances-your-business-will-be-attacked/</loc>
		<lastmod>2019-02-21T08:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/onionshare-2-an-open-source-tool-that-uses-tor-onion-services-for-securely-sharing-files-is-now-out/</loc>
		<lastmod>2019-02-21T10:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsa-2019-blog-series-securing-microservices/</loc>
		<lastmod>2019-02-21T11:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/see-the-latest-clearswift-technology-in-action-at-rsa-2019-2/</loc>
		<lastmod>2019-02-21T11:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/report-concerted-global-cyber-attack-could-disrupt-global-economy/</loc>
		<lastmod>2019-02-21T12:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/keeping-it-private-for-the-good-of-the-company-2/</loc>
		<lastmod>2019-02-21T12:09:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cspm-for-aws-monitoring-misconfigurations-in-iaas/</loc>
		<lastmod>2019-02-21T13:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-breed-of-fuel-pump-skimmer-uses-sms-and-bluetooth/</loc>
		<lastmod>2019-02-21T13:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/linux-use-after-free-vulnerability-found-in-linux-2-6-through-4-20-11/</loc>
		<lastmod>2019-02-21T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/googles-home-security-system-nest-secures-had-a-hidden-microphone-google-says-it-was-an-error/</loc>
		<lastmod>2019-02-21T13:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-cybersecurity-trends-aggravate-cisos-stress/</loc>
		<lastmod>2019-02-21T14:22:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bob-1-0-1-ctf-walkthrough/</loc>
		<lastmod>2019-02-21T14:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/top-30-information-assurance-analyst-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-02-21T14:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/whos-afraid-of-security-headlines-stay-safe-with-proven-privileged-access-security/</loc>
		<lastmod>2019-02-21T14:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/automated-wordpress-security-protection-with-sucuri/</loc>
		<lastmod>2019-02-21T14:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/toyota-australia-driven-offline-by-cyber-attack-as-heart-hospital-hit-by-ransomware/</loc>
		<lastmod>2019-02-21T14:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/github-ups-the-rewards-expands-the-scope-of-its-bug-bounty-program/</loc>
		<lastmod>2019-02-21T14:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/gartner-future-of-identity-management-is-mobile-saas/</loc>
		<lastmod>2019-02-21T14:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/owasps-most-wanted/</loc>
		<lastmod>2019-02-21T15:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/join-fortinet-at-rsa-conference-2019-in-san-francisco-ca/</loc>
		<lastmod>2019-02-21T15:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/securing-the-customer-experience-for-5g-and-iot/</loc>
		<lastmod>2019-02-21T15:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/launch-of-the-sevillage-at-def-con-27-signups/</loc>
		<lastmod>2019-02-21T15:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/using-a-next-gen-waf-to-identify-prevent-carding/</loc>
		<lastmod>2019-02-21T15:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dfars-cybersecurity-audits-what-to-expect/</loc>
		<lastmod>2019-02-21T15:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-emma-zaballos-anne-addison-meriwethers-a-tisket-a-tasket-a-dark-web-shopping-basket/</loc>
		<lastmod>2019-02-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/brave-browser-sacrifices-security/</loc>
		<lastmod>2019-02-21T16:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/everything-you-never-knew-but-need-to-about-endpoint-security/</loc>
		<lastmod>2019-02-21T16:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/innovation-and-emerging-technology-at-the-2019-rsa-conference/</loc>
		<lastmod>2019-02-21T16:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/murkios-bot-drops-files-and-controls-system-remotely/</loc>
		<lastmod>2019-02-21T17:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/nypd-seeking-capability-to-disable-shoot-down-drones/</loc>
		<lastmod>2019-02-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/armorblox-brings-understanding-to-cybersecurity/</loc>
		<lastmod>2019-02-21T18:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vpn-privacy-what-nobody-told-you/</loc>
		<lastmod>2019-02-21T18:31:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/these-recently-discovered-poodles-can-bypass-your-tls/</loc>
		<lastmod>2019-02-21T19:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-promise-of-machine-learning-vs-the-reality-of-human-assisted-learning/</loc>
		<lastmod>2019-02-21T19:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/throwback-thursday-whatever-happened-to-anthem/</loc>
		<lastmod>2019-02-21T19:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cdm-compliance-and-cybersecurity-risks/</loc>
		<lastmod>2019-02-21T19:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/deep-instinct-appoints-deborah-chase-hopkins-to-its-board-of-directors/</loc>
		<lastmod>2019-02-21T19:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-john-amirrezvanis-ad-laundering-bribes-backdoors/</loc>
		<lastmod>2019-02-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/no-one-is-safe-the-five-most-popular-social-engineering-attacks-against-your-companys-wi-fi-network/</loc>
		<lastmod>2019-02-21T20:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/love-really-is-blind-cyber-criminals-are-attracted-to-the-vulnerability-of-dating-apps-and-sites/</loc>
		<lastmod>2019-02-21T20:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hackers-use-fake-google-recaptcha-to-cloak-banking-malware/</loc>
		<lastmod>2019-02-21T20:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/5-reasons-to-eliminate-manual-network-change-processes-missed-slas-and-more/</loc>
		<lastmod>2019-02-21T21:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/optimize-your-okta-deployment-with-preempt/</loc>
		<lastmod>2019-02-21T21:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-launch-conditions/</loc>
		<lastmod>2019-02-21T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/myfitnesspal-data-breach/</loc>
		<lastmod>2019-02-21T22:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/helping-partners-manage-cybersecurity-strategy-at-accelerate-2019/</loc>
		<lastmod>2019-02-21T23:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/whats-the-greater-risk-to-uk-5g-huawei-backdoors-or-ddos/</loc>
		<lastmod>2019-02-22T02:11:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-video-series-how-a-security-operations-command-center-took-on-the-largest-attacks-the-internet-has-ever-seen/</loc>
		<lastmod>2019-02-22T02:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/oracle-e-business-suite-security-tips-for-dbas-2/</loc>
		<lastmod>2019-02-22T04:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-you-wont-see-or-hear-at-the-oscars/</loc>
		<lastmod>2019-02-22T05:40:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/average-ransomware-payment-rose-13-to-6700-in-q4-2018-from-q3/</loc>
		<lastmod>2019-02-22T09:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vfemail-suffers-complete-data-wipe-out/</loc>
		<lastmod>2019-02-22T12:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/proposed-bill-would-strengthen-californias-data-breach-notification-law/</loc>
		<lastmod>2019-02-22T12:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-will-the-indian-e-commerce-industry-grow-in-2018/</loc>
		<lastmod>2019-02-22T13:02:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-you-should-reconsider-prioritizing-high-severity-vulnerabilities-in-your-fix-schedule/</loc>
		<lastmod>2019-02-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/reactive-vs-proactive-cybersecurity-5-reasons-why-traditional-security-no-longer-works/</loc>
		<lastmod>2019-02-22T14:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-current-state-of-artificial-intelligence-in-cybersecurity-cyberspeak-podcast/</loc>
		<lastmod>2019-02-22T14:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/switzerlands-e-voting-system-source-code-leaked-ahead-of-its-bug-bounty-program-slammed-for-being-poorly-constructed/</loc>
		<lastmod>2019-02-22T14:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/drupal-releases-security-advisory-for-serious-remote-code-execution-vulnerability/</loc>
		<lastmod>2019-02-22T14:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/is-huawei-a-threat-to-uk-national-security/</loc>
		<lastmod>2019-02-22T14:49:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/researchers-extract-master-password-in-cleartext-from-1password/</loc>
		<lastmod>2019-02-22T14:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/three-data-breaches-and-one-bad-ad-weekend-avast/</loc>
		<lastmod>2019-02-22T15:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-falcon-darkstars-looking-for-malicious-hardware-implants-with-minimal-equipment/</loc>
		<lastmod>2019-02-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/from-my-gartner-blog-the-deception-paper-update-is-out/</loc>
		<lastmod>2019-02-22T17:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/security-analytics-now-required-in-cybersecurity/</loc>
		<lastmod>2019-02-22T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-return-to-pigeons/</loc>
		<lastmod>2019-02-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/carriers-need-iot-protection-avast/</loc>
		<lastmod>2019-02-22T18:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-feature-for-spanning-backup-for-office-365-encryption-key-management/</loc>
		<lastmod>2019-02-22T19:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/imperva-makes-major-expansion-in-application-security/</loc>
		<lastmod>2019-02-22T19:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-parker-wiksells-jewell-seays-patchwerk-kernel-patching-for-fun-and-profit/</loc>
		<lastmod>2019-02-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/join-gurucul-at-rsa-conference-2019-in-san-francisco-2/</loc>
		<lastmod>2019-02-22T19:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/our-updated-applying-deception-technologies-and-techniques-to-improve-threat-detection-and-response-2019-publishes/</loc>
		<lastmod>2019-02-22T20:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dealing-with-tls-certificates-in-devops/</loc>
		<lastmod>2019-02-22T21:03:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cloudy-with-a-chance-of-caffeinated-query-orchestration-new-rjava-wrappers-for-aws-athena-sdk-for-java/</loc>
		<lastmod>2019-02-22T21:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/20-popular-wireless-hacking-tools-updated-for-2019/</loc>
		<lastmod>2019-02-22T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/emerging-threat-jenkins-plugins-remote-code-execution/</loc>
		<lastmod>2019-02-22T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-night-shift/</loc>
		<lastmod>2019-02-22T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/kashmir-hill-blocking-tech-giants-week-1/</loc>
		<lastmod>2019-02-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-olivia-thets-nicolas-kseibs-cryptolocker-deep-dive-tracking-security-threats-bitcoin/</loc>
		<lastmod>2019-02-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/facebookery-the-tell-all-app/</loc>
		<lastmod>2019-02-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-andrea-matwyshyns-elliot-kayes-be-an-iot-safety-hero/</loc>
		<lastmod>2019-02-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-physics-suppression/</loc>
		<lastmod>2019-02-23T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/payroll-provider-gives-extortionists-a-payday/</loc>
		<lastmod>2019-02-24T00:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/csp-best-practices-for-delivering-secure-sd-wan/</loc>
		<lastmod>2019-02-24T15:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-whitney-merrills-losts-andrew-morris-bruce-potters-between-two-moose/</loc>
		<lastmod>2019-02-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/robert-m-lees-jeff-hass-little-bobby-comics-owns/</loc>
		<lastmod>2019-02-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avast-adds-value-and-revenue-to-your-network-avast/</loc>
		<lastmod>2019-02-24T18:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-many-organizations-still-dont-get-security/</loc>
		<lastmod>2019-02-24T19:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-jared-rittles-process-control-through-counterfeit-comms/</loc>
		<lastmod>2019-02-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/3-things-youll-learn-at-the-onapsis-rsa-speaking-session/</loc>
		<lastmod>2019-02-24T22:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/making-cybersecurity-more-proactive-with-artificial-intelligence/</loc>
		<lastmod>2019-02-24T23:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-nests-secret-microphone-facebook-login-phishing-password-manager-vulnerabilities-wb57/</loc>
		<lastmod>2019-02-25T05:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-identity-access-and-governance-tech-converge-to-meet-data-protection-challenges/</loc>
		<lastmod>2019-02-25T08:25:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-improve-threat-visibility-and-reduce-time-to-detection-with-network-traffic-analytics-nta/</loc>
		<lastmod>2019-02-25T09:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/telephone-scams-your-credit-card-was-used-in-fraudulent-activities/</loc>
		<lastmod>2019-02-25T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/not-all-sandboxes-are-created-equal/</loc>
		<lastmod>2019-02-25T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/icann-calls-for-dnssec-across-unsecured-domain-names-amidst-increasing-malicious-activity-in-the-dns-infrastructure/</loc>
		<lastmod>2019-02-25T12:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/an-alternative-look-at-cybersecurity-awareness-in-education/</loc>
		<lastmod>2019-02-25T12:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/exploring-the-keynotes-and-sessions-being-offered-at-accelerate-2019/</loc>
		<lastmod>2019-02-25T14:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/addressing-todays-risks-requires-reliable-threat-intelligence/</loc>
		<lastmod>2019-02-25T14:44:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/announcing-the-polaris-software-integrity-platform/</loc>
		<lastmod>2019-02-25T14:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/tips-to-help-you-move-beyond-a-help-desk-role/</loc>
		<lastmod>2019-02-25T15:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fourandsix-2-1-ctf-walkthrough/</loc>
		<lastmod>2019-02-25T15:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-happens-on-the-endpoint-stays-on-the-endpoint/</loc>
		<lastmod>2019-02-25T15:14:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/healthcare-breaches-and-the-rise-of-hacking-and-it-incidents/</loc>
		<lastmod>2019-02-25T15:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hacker-sells-620-million-customer-details-on-dark-web-for-20k-in-bitcoin/</loc>
		<lastmod>2019-02-25T15:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/russian-creator-of-neverquest-banking-trojan-pleads-guilty-in-american-court/</loc>
		<lastmod>2019-02-25T15:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/reverse-location-search-warrants/</loc>
		<lastmod>2019-02-25T15:37:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/researchers-highlight-design-weaknesses-in-the-4g-and-5g-cellular-paging-protocols/</loc>
		<lastmod>2019-02-25T15:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-douglas-bienstocks-becs-and-beyond-investigating-and-defending-office-365/</loc>
		<lastmod>2019-02-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/on-the-security-of-password-managers/</loc>
		<lastmod>2019-02-25T16:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/exploiting-spring-boot-actuators/</loc>
		<lastmod>2019-02-25T16:17:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/demystifying-the-india-data-protection-bill-2018-part-3-of-3/</loc>
		<lastmod>2019-02-25T16:35:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/instant-gdpr-best-practices-assessment/</loc>
		<lastmod>2019-02-25T17:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/getting-to-know-the-new-rsac-advisory-board-members-caroline-wong/</loc>
		<lastmod>2019-02-25T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-csps-can-secure-a-network-of-iot-devices/</loc>
		<lastmod>2019-02-25T17:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/holy-bits-coderperson/</loc>
		<lastmod>2019-02-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/we-need-more-phishing-sites-on-https/</loc>
		<lastmod>2019-02-25T18:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/nys-dfs-transitional-period-ends-friday-are-you-ready/</loc>
		<lastmod>2019-02-25T18:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-andrew-blaichs-michael-flossmans-behind-enemy-lines-inside-the-operations-of-a-nation-states-cyber-program/</loc>
		<lastmod>2019-02-25T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/latest-drupal-rce-flaw-used-by-cryptocurrency-miners-and-other-attackers/</loc>
		<lastmod>2019-02-25T21:22:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-plutonium/</loc>
		<lastmod>2019-02-25T23:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-basic-question-about-tcp/</loc>
		<lastmod>2019-02-25T23:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/sushi-workshops-and-demos-bromium-is-ready-for-rsa/</loc>
		<lastmod>2019-02-26T00:23:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/guest-essay-repelling-social-engineering-attacks-requires-shoring-up-the-weakest-link-humans/</loc>
		<lastmod>2019-02-26T08:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ncipher-security-to-join-entrust-datacard/</loc>
		<lastmod>2019-02-26T07:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/gdpr-more-popular-than-beyonce-or-kim-kardashian/</loc>
		<lastmod>2019-02-26T11:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-business-impact-of-cyber-risk-cyberspeak-podcast/</loc>
		<lastmod>2019-02-26T11:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/businesses-increasingly-expose-sensitive-data-via-cloud-applications-and-services/</loc>
		<lastmod>2019-02-26T11:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/spending-headcount-and-optimism-6-significant-takeaways-from-the-state-of-it-security-survey-by-esecurity-planet/</loc>
		<lastmod>2019-02-26T12:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-report-social-media-platforms-and-the-cybercrime-economy/</loc>
		<lastmod>2019-02-26T12:01:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/attacking-soldiers-on-social-media/</loc>
		<lastmod>2019-02-26T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vulnerability-management-and-patch-management-are-not-the-same/</loc>
		<lastmod>2019-02-26T12:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/do-security-cameras-undermine-your-authentication/</loc>
		<lastmod>2019-02-26T12:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/online-bidding-phishing-schemes-targeting-u-s-government-contractors/</loc>
		<lastmod>2019-02-26T12:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ransomware-attack-encrypts-medical-records-at-australian-hospital/</loc>
		<lastmod>2019-02-26T12:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/oil-gas-cybersecurity-and-process-safety-converge-thanks-to-triton/</loc>
		<lastmod>2019-02-26T13:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/uk-consumers-more-likely-than-us-to-change-spending-habits-following-data-breaches/</loc>
		<lastmod>2019-02-26T13:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/scala-regex-string-extraction/</loc>
		<lastmod>2019-02-26T14:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/gen-nakasone-on-us-cybercommand/</loc>
		<lastmod>2019-02-26T14:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/7-ways-cyberark-simplifies-deployment-integration-and-scaling-of-privileged-access-security/</loc>
		<lastmod>2019-02-26T14:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/do-you-need-cipt-certification/</loc>
		<lastmod>2019-02-26T14:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-align-training-with-the-nist-nice-framework/</loc>
		<lastmod>2019-02-26T14:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/try-a-different-angle-of-education-tech-development/</loc>
		<lastmod>2019-02-26T14:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/tech-refresh-as-part-of-an-effective-vulnerability-management-program-part-three/</loc>
		<lastmod>2019-02-26T15:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/prepare-now-for-5g-security-transformation/</loc>
		<lastmod>2019-02-26T15:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-whitehat-security-partnership-program-enables-solution-providers-to-drive-strong-gross-profits-leveraging-state-of-the-art-devsecops-tools/</loc>
		<lastmod>2019-02-26T15:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/this-message-is-from-a-trusted-sender-or-is-it/</loc>
		<lastmod>2019-02-26T15:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-soldier-of-fortrans-deconstructing-defenestrate-c/</loc>
		<lastmod>2019-02-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/an-interview-with-ciso-justin-metallo-what-it-takes-to-protect-machine-identities/</loc>
		<lastmod>2019-02-26T16:38:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/pci-scanning-announcement/</loc>
		<lastmod>2019-02-26T16:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-automate-static-analysis-in-your-sdlc/</loc>
		<lastmod>2019-02-26T17:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/digital-risk-redefines-enterprise-risk-management/</loc>
		<lastmod>2019-02-26T17:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/carrier-coding-incompetence-the-gift-that-keeps-on-giving/</loc>
		<lastmod>2019-02-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fortanix-launches-native-rust-based-software-development-kit-for-intel-sgx-applications/</loc>
		<lastmod>2019-03-04T13:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/nobody-likes-a-smartphone-ban/</loc>
		<lastmod>2019-02-26T18:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/making-sense-of-security-privacy-and-confidentiality-in-texting/</loc>
		<lastmod>2019-02-26T18:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/mitigating-cloud-attacks-with-configuration-hardening/</loc>
		<lastmod>2019-02-26T18:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/jenkins-messing-with-new-exploits-pt1/</loc>
		<lastmod>2019-02-26T18:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-released-a-paper-showing-how-its-fighting-disinformation-on-its-platforms/</loc>
		<lastmod>2019-02-26T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-matt-blazes-voting-in-2019-bad-or-worse/</loc>
		<lastmod>2019-02-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/google-analytics-and-angular-in-magento-credit-card-stealing-scripts/</loc>
		<lastmod>2019-02-26T21:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-norm-normal-file-format/</loc>
		<lastmod>2019-02-26T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-appsec-abcs-cybersecuritys-first-childrens-book/</loc>
		<lastmod>2019-02-26T22:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/former-russian-cybersecurity-chief-sentenced-to-22-years-in-prison/</loc>
		<lastmod>2019-02-27T00:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/keeping-your-workplace-violence-program-current/</loc>
		<lastmod>2019-02-27T01:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/icann-warns-domain-name-system-under-attack-avast/</loc>
		<lastmod>2019-02-27T01:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/defending-against-magecart-supply-chain-attacks/</loc>
		<lastmod>2019-02-27T06:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/entrust-datacard-to-acquire-general-purpose-hardware-security-module-business-from-thales/</loc>
		<lastmod>2019-02-27T07:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/my-take-why-the-next-web-delivered-ad-you-encounter-could-invisibly-infect-your-smartphone/</loc>
		<lastmod>2019-02-27T08:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/high-tech-bridge-coo-talks-about-web-wordpress-security/</loc>
		<lastmod>2019-02-27T08:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-most-common-physical-and-network-controls-when-implementing-iso-27001-in-a-data-center/</loc>
		<lastmod>2019-02-27T08:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/92-of-businesses-cite-insider-threats-as-biggest-concern-survey-shows/</loc>
		<lastmod>2019-02-27T08:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/network-security-solutions-be-wary-of-the-hype-around-ai/</loc>
		<lastmod>2019-02-27T08:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/sixpackabs-building-customers-trust-with-pci-dss-compliance/</loc>
		<lastmod>2019-02-27T10:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/trends-in-industrial-control-systems-cybersecurity/</loc>
		<lastmod>2019-02-27T11:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-mobile-bitcoin-miner-really/</loc>
		<lastmod>2019-02-27T11:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fraudsters-bring-fresh-bait-to-tax-phishing-this-year/</loc>
		<lastmod>2019-02-27T12:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/bitglass-security-spotlight-apple-cryptocurrency-and-mass-breaches/</loc>
		<lastmod>2019-02-27T13:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hackers-make-3-25-billion-per-year-from-social-media-cybercrime/</loc>
		<lastmod>2019-02-27T13:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ramnit-in-the-uk/</loc>
		<lastmod>2019-02-27T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/whats-so-next-gen-about-the-next-gen-waf/</loc>
		<lastmod>2019-02-27T14:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-research-from-eclypsium-discloses-a-vulnerability-in-bare-metal-cloud-servers-that-allows-attackers-to-steal-data/</loc>
		<lastmod>2019-02-27T14:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/were-going-to-rsa-2019-want-to-join-us/</loc>
		<lastmod>2019-02-27T14:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/data-destruction-for-everyday-people/</loc>
		<lastmod>2019-02-27T14:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ooda-and-cybersecurity/</loc>
		<lastmod>2019-02-27T15:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-kevin-bilzers-rj-joyces-seamus-burkes-high-confidence-malware-attribution/</loc>
		<lastmod>2019-02-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/video-from-dev-to-infosec-myinfosecstory/</loc>
		<lastmod>2019-02-27T16:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-modernization-drives-cybercrime/</loc>
		<lastmod>2019-02-27T16:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/keeping-pace-in-the-race-for-flexibility/</loc>
		<lastmod>2019-02-27T16:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-80s-called-they-want-their-on-premises-solution-back/</loc>
		<lastmod>2019-02-27T16:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/whats-hiding-in-encrypted-traffic-millions-of-advanced-threats/</loc>
		<lastmod>2019-02-27T17:53:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rightscale-2019-state-of-the-cloud-report-from-flexera-identifies-cloud-adoption-trends/</loc>
		<lastmod>2019-02-27T17:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-blockchain-can-be-hacked-the-51-rule-and-more/</loc>
		<lastmod>2019-02-27T17:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-farseer-malware-designed-to-spy-on-windows-users/</loc>
		<lastmod>2019-02-27T17:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/luke-kingma-and-lou-patrick-mackays-futurism-vallei-uncannii/</loc>
		<lastmod>2019-02-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/webinar-5-steps-to-improving-the-omnichannel-customer-journey/</loc>
		<lastmod>2019-02-27T17:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/looking-for-diverse-cybersecurity-talent-these-visionary-companies-and-initiatives-grow-their-own/</loc>
		<lastmod>2019-02-27T18:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qa-series-with-rsac-ambassador-john-strand/</loc>
		<lastmod>2019-02-27T18:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avast-at-rsa-2019-connect-with-our-team-avast/</loc>
		<lastmod>2019-02-27T18:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-veracode-scans-docker-containers-for-open-source-vulnerabilities/</loc>
		<lastmod>2019-02-27T19:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/aws-security-best-practices-for-api-gateway/</loc>
		<lastmod>2019-02-27T19:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-jeremy-gillulas-encrypting-the-web-isnt-enough-how-eff-plans-to-encrypt-the-entire-internet/</loc>
		<lastmod>2019-02-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/can-you-stop-a-breach-in-19-minutes/</loc>
		<lastmod>2019-02-27T20:14:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/jenkins-messing-with-exploits-pt2-cve-2019-1003000/</loc>
		<lastmod>2019-02-27T20:23:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-session-hijacking/</loc>
		<lastmod>2019-02-27T20:25:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/jenkins-master-post/</loc>
		<lastmod>2019-02-27T21:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/crypto-mining-service-coinhive-to-call-it-quits/</loc>
		<lastmod>2019-02-27T23:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-to-expect-at-rsa-conference-2019/</loc>
		<lastmod>2019-02-28T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsac-2019-blog-series-taking-the-risk-out-of-digital-transformation-rsac-2019s-quest-for-delivering-better/</loc>
		<lastmod>2019-02-28T06:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-12-most-critical-risks-for-serverless-applications-2019-guide/</loc>
		<lastmod>2019-02-28T08:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/is-machu-picchu-in-this-high-achievers-future-meet-ncipher-securitys-global-vp-of-legal-loni-kupchanko/</loc>
		<lastmod>2019-02-28T07:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/businesses-warned-of-malware-spread-via-linkedin-job-offers/</loc>
		<lastmod>2019-02-28T09:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/cyber-assessments-and-patient-security-looking-back-at-key-themes-from-himss-2019/</loc>
		<lastmod>2019-02-28T10:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vigilant-software-and-cipher-team-up-for-financial-services-win/</loc>
		<lastmod>2019-02-28T11:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/us-ally-uae-will-deploy-huawei-5g-technology-for-high-speed-wireless-networks/</loc>
		<lastmod>2019-02-28T11:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/ring-doorbell-fixes-flaw-that-allowed-attackers-to-spy-on-inject-footage/</loc>
		<lastmod>2019-02-28T12:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/is-the-comptia-network-certification-worth-it/</loc>
		<lastmod>2019-02-28T13:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-about-cybersecurity-awareness/</loc>
		<lastmod>2019-02-28T14:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/comptia-network-domain-1-networking-concepts/</loc>
		<lastmod>2019-02-28T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/comptia-network-domain-5-network-troubleshooting-and-tools/</loc>
		<lastmod>2019-02-28T14:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/comptia-network-domain-4-network-security/</loc>
		<lastmod>2019-02-28T14:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/comptia-network-domain-3-network-operations/</loc>
		<lastmod>2019-02-28T14:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/comptia-network-domain-2-infrastructure/</loc>
		<lastmod>2019-02-28T14:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/drat-all-the-%f0%9f%93%a6-enabling-easier-package-discovery-and-installation-with-your-own-cran-like-repo-for-your-packages/</loc>
		<lastmod>2019-02-28T14:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/government-organizations-address-cloud-security-and-compliance-with-the-cyberark-privileged-access-security-solution-for-aws-govcloud-us/</loc>
		<lastmod>2019-02-28T14:45:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/smart-business-travel-needs-smart-sso-tips-for-beating-digital-jet-lag/</loc>
		<lastmod>2019-02-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/booter-boss-interviewed-in-2014-pleads-guilty/</loc>
		<lastmod>2019-02-28T15:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/jenkins-decrypting-credentials-xml/</loc>
		<lastmod>2019-02-28T15:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/contrast-security-closes-65-million-series-d-funding-round/</loc>
		<lastmod>2019-02-28T15:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-to-cut-through-vendor-claims-marketing-hype-when-evaluating-new-security-tools/</loc>
		<lastmod>2019-02-28T15:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vulnreport-install-2/</loc>
		<lastmod>2019-02-28T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/heres-how-carriers-can-differentiate-their-5g-offerings/</loc>
		<lastmod>2019-02-28T15:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/packet-pacing-benefits-for-midgress-traffic/</loc>
		<lastmod>2019-02-28T15:46:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/sound-hijacking-abusing-missing-xfo/</loc>
		<lastmod>2019-02-28T15:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-chris-coxs-the-apt-at-home/</loc>
		<lastmod>2019-02-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/dont-let-security-needs-halt-your-digital-transformation-imperva-flexprotect-offers-agile-security-for-any-enterprise/</loc>
		<lastmod>2019-02-28T16:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/marionet-a-browser-based-attack-that-allows-hackers-to-run-malicious-code-even-if-users-exit-a-web-page/</loc>
		<lastmod>2019-02-28T16:44:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/is-antivirus-protection-necessary-for-my-business-avast-business/</loc>
		<lastmod>2019-02-28T16:44:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/apptega-amplify-2019-rocks-out-the-garage/</loc>
		<lastmod>2019-02-28T17:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/coinhive-the-in-browser-cryptomining-service-beloved-by-hackers-is-dead/</loc>
		<lastmod>2019-02-28T17:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/everything-you-need-to-know-about-a-new-canada-data-breach-notification-law-and-how-cspi-can-help-improve-compliance/</loc>
		<lastmod>2019-02-28T17:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/connected-cars-need-better-connection-to-cybersecurity/</loc>
		<lastmod>2019-02-28T17:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/mozilla-ca-quandary-highlights-the-importance-of-trust-store-security/</loc>
		<lastmod>2019-02-28T17:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/linkedin-jobs-the-malign-effect/</loc>
		<lastmod>2019-02-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/youll-see-this-message-when-it-is-too-late-the-legal-and-economic-aftermath-of-cybersecurity-breaches/</loc>
		<lastmod>2019-02-28T18:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/qa-with-rsa-conference-2019-keynote-rohit-ghai/</loc>
		<lastmod>2019-02-28T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/fake-browser-updates-push-ransomware-and-bank-malware/</loc>
		<lastmod>2019-02-28T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/shmoocon-2019-amlie-korans-firemen-vs-safety-matches-how-the-current-skills-pipeline-is-wrong/</loc>
		<lastmod>2019-02-28T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/becoming-better-at-rsa/</loc>
		<lastmod>2019-02-28T20:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/android-app-testing-on-chromebooks/</loc>
		<lastmod>2019-02-28T20:20:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/they-can-do-that-childrens-smartwatch-recalled-over-privacy-concerns/</loc>
		<lastmod>2019-02-28T19:57:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/vpn-for-secure-and-private-web-access-think-again/</loc>
		<lastmod>2019-02-28T21:35:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/xkcd-differentiation-and-integration/</loc>
		<lastmod>2019-02-28T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/the-role-of-privileged-access-management-in-addressing-cybersecurity-challenges/</loc>
		<lastmod>2019-02-28T23:13:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/emerging-threat-drupal-rest-api-remote-code-execution/</loc>
		<lastmod>2019-03-01T00:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/hardware-hacking-101-lesson-2-classical-hardware-hacking/</loc>
		<lastmod>2019-03-01T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/will-deception-fizzle-again/</loc>
		<lastmod>2019-03-01T01:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-even-better-this-time-around/</loc>
		<lastmod>2019-03-01T06:39:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/digital-transformation-escalates-compliance-challenges/</loc>
		<lastmod>2019-03-01T08:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hybrid-cloud-security-lags-behind-implementation/</loc>
		<lastmod>2019-03-01T11:16:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/genesys-xperience19/</loc>
		<lastmod>2019-03-01T11:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/coinhive-to-shut-down-all-its-cryptojacking-services-on-march-8/</loc>
		<lastmod>2019-03-01T12:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/youtube-disables-comment-feature-on-videos-with-minors/</loc>
		<lastmod>2019-03-01T14:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tiktok-fined-5-7m-for-illegally-collecting-childrens-personal-data/</loc>
		<lastmod>2019-03-01T14:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mnos-seek-stronger-mobile-security-for-customers-avast/</loc>
		<lastmod>2019-03-01T14:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/aio-bots-hit-retailers-and-exspectre-rises-avast/</loc>
		<lastmod>2019-03-01T14:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/centos-update-for-bpftool-cesa-20183651-centos7/</loc>
		<lastmod>2019-03-01T15:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/g-suite-account-recovery-get-your-data-back-the-way-it-was-in-just-a-few-clicks/</loc>
		<lastmod>2019-03-01T15:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-parker-thompsons-mudges-tim-carstens-ground-truth-18-vendors-6000-firmware-images-2-7-million-binaries-and-a-flaw-in-the-linux-mips-stack/</loc>
		<lastmod>2019-03-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/massive-fine-signals-shift-in-coppa-enforcement-apps-popular-with-teens-or-tweens-should-take-note/</loc>
		<lastmod>2019-03-01T15:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/data-loss-protection-redefining-dlp/</loc>
		<lastmod>2019-03-01T17:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/all-hat-no-network-googles-big-talk-on-a-fido2-password-free-future/</loc>
		<lastmod>2019-03-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/insider-threats-seemingly-innocent-shortcuts-can-leave-you-exposed/</loc>
		<lastmod>2019-03-01T18:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyber-security-roundup-for-february-2019/</loc>
		<lastmod>2019-03-01T19:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/qa-with-rsa-conference-2019-keynote-pat-gelsinger/</loc>
		<lastmod>2019-03-01T19:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-xena-olsens-24-7-cti-operationalizing-cyber-threat-intelligence/</loc>
		<lastmod>2019-03-01T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/coinhive-shutters-due-to-drop-in-crypto-value-avast/</loc>
		<lastmod>2019-03-01T20:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-synopsys-polaris-platform-optimized-for-red-hat-openshift-container-platform/</loc>
		<lastmod>2019-03-01T20:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/breakdown-of-a-targeted-danabot-attack/</loc>
		<lastmod>2019-03-01T21:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-reply-guys/</loc>
		<lastmod>2019-03-01T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-restore-ui-spanning-backup-for-salesforce/</loc>
		<lastmod>2019-03-01T22:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/qa-why-soar-startup-syncurity-is-bringing-a-case-management-approach-to-threat-detection/</loc>
		<lastmod>2019-03-01T22:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/onapsis-to-host-upcoming-security-webcasts-for-oracle-e-business-suite/</loc>
		<lastmod>2019-03-01T22:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/2019-update-on-frameworks-standards-and-regulations-for-infosec/</loc>
		<lastmod>2019-03-02T01:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-karl-koschers-demystifying-imsi-catchers/</loc>
		<lastmod>2019-03-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fast-changing-security-landscape-may-render-this-years-rsa-conference-the-most-human-edition-ever/</loc>
		<lastmod>2019-03-02T17:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nasas-voyager-2-november-exit-of-the-heliosphere-now-a-denizen-of-interstellar-space/</loc>
		<lastmod>2019-03-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/where-are-all-the-government-infosec-professionals-cyberspeak-podcast/</loc>
		<lastmod>2019-03-02T18:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-the-shmoo-groups-0wn-the-con-2019/</loc>
		<lastmod>2019-03-02T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-normal-distribution/</loc>
		<lastmod>2019-03-02T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2-companies-working-together-to-bring-your-erp-security-strategy-to-life/</loc>
		<lastmod>2019-03-02T22:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/another-perhaps-more-pernicious-form-of-price-fixing/</loc>
		<lastmod>2019-03-02T23:52:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/enisa-issues-recommendations-to-protect-eu-parliament-elections-against-cyber-threats/</loc>
		<lastmod>2019-03-03T15:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/coinhive-crypto-mining-service-announces-shutdown/</loc>
		<lastmod>2019-03-03T15:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/most-cybersecurity-incidents-in-healthcare-sector-start-with-email/</loc>
		<lastmod>2019-03-03T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-jared-strouds-weapons-of-text-destruction/</loc>
		<lastmod>2019-03-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-war-we-try-to-ignore/</loc>
		<lastmod>2019-03-03T19:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-opening-remarks-rumblings-ruminations-and-rants/</loc>
		<lastmod>2019-03-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cran-mirror-security/</loc>
		<lastmod>2019-03-03T20:22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/luke-kingma-and-lou-patrick-mackays-futurism-free-zoltar/</loc>
		<lastmod>2019-03-03T23:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/multi-factor-authentication-new-attacks-on-4g-and-5g-mobile-networks/</loc>
		<lastmod>2019-03-04T05:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-memory-hacking-arises-as-a-go-to-tactic-to-carry-out-deep-persistent-incursions/</loc>
		<lastmod>2019-03-04T08:11:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/marriott-data-breach-cost-the-hotel-chain-only-3-million-in-net-expenses-so-far/</loc>
		<lastmod>2019-03-04T08:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/simplifying-security-configuration-a-ux-revamp-retrospective/</loc>
		<lastmod>2019-03-04T11:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/automated-api-protection-with-wap/</loc>
		<lastmod>2019-03-04T11:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/architecting-dns-for-ddos-durability-and-resilience/</loc>
		<lastmod>2019-03-04T11:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bot-manager-staying-ahead-of-the-bot-landscape/</loc>
		<lastmod>2019-03-04T11:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/professional-services-simplified-check-out-whats-new/</loc>
		<lastmod>2019-03-04T11:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/own-your-digital-future-cloud-migration-best-practices/</loc>
		<lastmod>2019-03-04T11:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/does-zero-trust-security-have-to-be-hard-to-be-effective/</loc>
		<lastmod>2019-03-04T11:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/future-proofing-your-content-security-perimeter-with-enhanced-token-authentication/</loc>
		<lastmod>2019-03-04T11:07:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securing-cdn-delivery-with-tls-at-massive-scale/</loc>
		<lastmod>2019-03-04T11:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/prevent-access-to-unauthorized-viewers-with-enhanced-proxy-detection/</loc>
		<lastmod>2019-03-04T11:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/whats-new-in-web-performance-march-2019/</loc>
		<lastmod>2019-03-04T11:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/http-2-will-be-automatically-enabled-by-default-on-the-akamai-intelligent-edge-platform/</loc>
		<lastmod>2019-03-04T11:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/enhancing-api-gateway-with-request-throttling-to-manage-overconsumption/</loc>
		<lastmod>2019-03-04T11:18:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsoft-adds-new-features-to-microsoft-office-365-microsoft-threat-experts-priority-notifications-desktop-app-assure-and-more/</loc>
		<lastmod>2019-03-04T11:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/googles-project-zero-reveals-a-high-severity-copy-on-write-security-flaw-found-in-macos-kernel/</loc>
		<lastmod>2019-03-04T11:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-latest-in-creepy-spyware/</loc>
		<lastmod>2019-03-04T12:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tripwire-patch-priority-index-for-february-2019/</loc>
		<lastmod>2019-03-04T12:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fine-tuning-cybersecurity-with-the-attck-framework/</loc>
		<lastmod>2019-03-04T12:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-2019-witnessing-how-the-world-is-changing/</loc>
		<lastmod>2019-03-04T12:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ccna-vs-comptia-network-which-should-i-get/</loc>
		<lastmod>2019-03-04T13:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/announcing-cyberark-application-access-manager-secrets-management-for-applications-tools-containers-and-devops/</loc>
		<lastmod>2019-03-04T14:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/authenticating-with-authority-can-multi-factor-authentication-provide-total-protection/</loc>
		<lastmod>2019-03-04T14:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/machine-learning-and-ueba-user-entity-behavior-analytics/</loc>
		<lastmod>2019-03-04T14:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cloud-security-needs-in-higher-education/</loc>
		<lastmod>2019-03-04T14:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-route-to-root-container-escape-using-kernel-exploitation-2/</loc>
		<lastmod>2019-03-04T13:20:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tufin-expands-its-technology-alliance-partner-tap-program/</loc>
		<lastmod>2019-03-04T14:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-five-predictions-of-cloud-computing-for-2019/</loc>
		<lastmod>2019-03-04T14:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/avast-business-introduces-secure-web-gateway-avast-business/</loc>
		<lastmod>2019-03-04T15:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fortinet-introduces-fortiinsight-for-enhanced-insider-threat-protection/</loc>
		<lastmod>2019-03-04T15:11:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/secure-technical-advancement-in-research-and-education-fortinet-at-the-internet2-global-summit/</loc>
		<lastmod>2019-03-04T15:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/welcome-to-rsa-conference-usa-2019/</loc>
		<lastmod>2019-03-04T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/twistlock-expands-cloud-native-cybersecurity-platform-for-hosts-containers-and-serverless-across-the-devsecops-lifecycle/</loc>
		<lastmod>2019-03-05T14:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-sim-card-hijacking-works/</loc>
		<lastmod>2019-03-04T15:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-christine-giglios-infosec-and-9-1-1-when-the-location-of-your-emergency-is-in-the-building/</loc>
		<lastmod>2019-03-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tpms-or-hsms-and-their-role-in-full-disk-encryption-fde/</loc>
		<lastmod>2019-03-04T16:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/secure-coding-for-pci-compliance/</loc>
		<lastmod>2019-03-04T16:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/embracing-heterogeneity/</loc>
		<lastmod>2019-03-04T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-advanced-persistent-threat-is-as-relevant-as-ever/</loc>
		<lastmod>2019-03-04T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/un-aviation-agency-attempted-coverup-minimization-of-2016-cyberattack/</loc>
		<lastmod>2019-03-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/opjerusalem-flashinstaller-ransomware-2/</loc>
		<lastmod>2019-03-04T17:15:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-ways-data-protection-can-secure-customer-centric-innovation/</loc>
		<lastmod>2019-03-04T18:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/idaptive-lands-cutting-edge-identity-and-access-management-award/</loc>
		<lastmod>2019-03-04T18:50:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-janith-weerasinghs-rachel-greenstadts-machine-learning-models-and-mental-health/</loc>
		<lastmod>2019-03-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/divvycloud-named-editors-choice-award-winner-by-cyber-defense-magazine/</loc>
		<lastmod>2019-03-04T20:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-identity-self-service-the-logonbox-approach/</loc>
		<lastmod>2019-03-04T20:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/divvyclouds-2019-state-of-enterprise-cloud-adoption-and-security-report/</loc>
		<lastmod>2019-03-04T20:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hundreds-of-vulnerable-docker-hosts-exploited-by-cryptocurrency-miners/</loc>
		<lastmod>2019-03-04T21:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hacked-website-trend-report-2018/</loc>
		<lastmod>2019-03-04T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/robert-m-lees-jeff-hass-little-bobby-comics-alarm-squirrel/</loc>
		<lastmod>2019-03-04T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hackers-sell-access-to-bait-and-switch-empire/</loc>
		<lastmod>2019-03-04T22:11:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/chronicle-a-new-alphabet-company-partners-with-avast-avast/</loc>
		<lastmod>2019-03-04T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/wordpress-woocommerce-xss-vulnerability-hijacking-a-customer-account-with-a-crafted-image/</loc>
		<lastmod>2019-03-04T23:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fake-mobile-ccleaner-app-tricking-users-avast/</loc>
		<lastmod>2019-03-05T01:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securitys-most-pressing-problems-get-fresh-looks-from-startups-in-rsa-conferences-innovation-sandbox-competition/</loc>
		<lastmod>2019-03-05T02:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/day-1-recap-innovation-sandbox-cyber-security-talent-shortage-seminar-and-more/</loc>
		<lastmod>2019-03-05T03:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/data-breach-disclosures-by-uk-banks-jump-480-in-2018-financial-regulator-says/</loc>
		<lastmod>2019-03-05T08:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/swimlane-makes-a-splash-at-rsa-conference-2019/</loc>
		<lastmod>2019-03-05T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/can-you-stop-phishing-emails-why-what-youre-doing-now-is-failing/</loc>
		<lastmod>2019-03-05T08:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/five-easy-steps-to-keep-on-your-organizations-devops-security-checklist/</loc>
		<lastmod>2019-03-05T11:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gdpr-compliant-organisations-reaping-the-benefits-study-finds/</loc>
		<lastmod>2019-03-05T11:24:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/group-policy-security-tinkering-with-external-paths/</loc>
		<lastmod>2019-03-05T12:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/emotet-lokibot-trickbot-still-impacting-enterprise-environments-globally/</loc>
		<lastmod>2019-03-05T12:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-large-enterprises-are-securing-the-cloud-qa-with-richard-stiennon-author-of-secure-cloud-transformation/</loc>
		<lastmod>2019-03-05T13:18:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/partnering-with-pci-pal/</loc>
		<lastmod>2019-03-05T13:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/do-you-need-programming-skills-for-a-cyber-security-career/</loc>
		<lastmod>2019-03-05T13:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberark-version-10-8-flies-high-in-the-cloud/</loc>
		<lastmod>2019-03-05T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/our-devices-listening/</loc>
		<lastmod>2019-03-05T14:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fortigate-vm-next-generation-firewall-extends-support-for-vmware-nsx-t-data-center/</loc>
		<lastmod>2019-03-05T14:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-pci-standards-for-new-ways-of-building-software/</loc>
		<lastmod>2019-03-05T15:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-big-bad-bot-problem/</loc>
		<lastmod>2019-03-05T15:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-guide-to-business-endpoint-security-avast-business/</loc>
		<lastmod>2019-03-05T15:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-get-kids-prepared-for-a-career-in-cybersecurity/</loc>
		<lastmod>2019-03-05T15:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/virtual-machine-introspection-in-malware-analysis-api-monitoring/</loc>
		<lastmod>2019-03-05T15:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-key-takeaways-from-mwc19/</loc>
		<lastmod>2019-03-05T15:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-is-penetration-testing-critical-to-the-security-of-the-organization/</loc>
		<lastmod>2019-03-05T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-cryptomix-clop-ransomware-variant-claims-to-target-networks/</loc>
		<lastmod>2019-03-05T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-researcher-exposes-malicious-github-repositories-that-host-more-than-300-backdoored-apps/</loc>
		<lastmod>2019-03-05T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-rays-redacted-whats-the-latest-411-on-419s/</loc>
		<lastmod>2019-03-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/idaptive-delivers-intelligent-mfa-for-cortex-by-palo-alto-networks/</loc>
		<lastmod>2019-03-05T15:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/integrating-security-with-speed-in-the-hashicorp-devops-lifecycle/</loc>
		<lastmod>2019-03-05T16:38:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-devsecops-days/</loc>
		<lastmod>2019-03-05T16:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/alert-logic-expands-protection-to-reduce-your-attack-surface/</loc>
		<lastmod>2019-03-05T16:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/impact-of-cybercrime-on-education-industry/</loc>
		<lastmod>2019-03-05T17:06:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-you-shouldnt-worry-about-risk/</loc>
		<lastmod>2019-03-05T17:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vaporstream-continues-to-shine-as-a-winner-of-cyber-defense-magazines-2019-infosec-awards/</loc>
		<lastmod>2019-03-05T17:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/it-only-takes-one-to-detect-or-infect/</loc>
		<lastmod>2019-03-05T17:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebookery-remember-when-they-said-5-of-banned-app-users-were-kids-the-truth-is-very-very-different/</loc>
		<lastmod>2019-03-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/making-sast-easier-faster-and-more-integrated-with-polaris/</loc>
		<lastmod>2019-03-05T18:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/quelle-est-la-difference-entre-une-attaque-active-et-une-attaque-passive-utilisant-le-chiffrement/</loc>
		<lastmod>2019-03-05T18:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/jenkins-cve-2018-1000600-poc/</loc>
		<lastmod>2019-03-05T19:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/get-set-election-go-preparing-for-the-2019-elections/</loc>
		<lastmod>2019-03-05T19:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-kirsten-renners-shut-up-and-listen/</loc>
		<lastmod>2019-03-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/untangle-introduces-network-security-framework/</loc>
		<lastmod>2019-03-05T20:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/where-is-your-data-and-what-does-it-do/</loc>
		<lastmod>2019-03-05T20:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/whats-new-in-security-march-2019/</loc>
		<lastmod>2019-03-05T20:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/heads-up-roll-your-own-http-headers-investigations-with-the-hdrs-package/</loc>
		<lastmod>2019-03-05T20:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-begun-the-fold-wars-have/</loc>
		<lastmod>2019-03-05T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/datastream-the-real-world-benefits-of-real-time-logging/</loc>
		<lastmod>2019-03-05T22:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/passive-und-aktive-angriffe-mit-verschlusselung-was-ist-der-unterschied/</loc>
		<lastmod>2019-03-05T23:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-risks-from-domain-typo-squatters/</loc>
		<lastmod>2019-03-06T00:47:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/day-2-recap-keynote-highlights-cryptographers-panel-rsac-launch-pad-and-more/</loc>
		<lastmod>2019-03-06T02:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/early-stage-entrepreneurs-face-panel-of-vcs-in-first-ever-launch-pad-session-at-rsac/</loc>
		<lastmod>2019-03-06T02:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-comcast-made-quick-work-of-adopting-devsecops/</loc>
		<lastmod>2019-03-06T02:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-piece-of-hardware-at-the-cutting-edge-of-cybersecurity/</loc>
		<lastmod>2019-03-06T05:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/imperva-wins-awards-for-best-database-security-coolest-cloud-security-vendor/</loc>
		<lastmod>2019-03-06T06:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/researchers-discover-spectre-like-new-speculative-flaw-spoiler-in-intel-cpus/</loc>
		<lastmod>2019-03-06T07:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nsa-releases-ghidra-a-free-software-reverse-engineering-sre-framework-at-the-rsa-security-conference/</loc>
		<lastmod>2019-03-06T07:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-cloud-can-be-a-dangerous-place-are-your-public-cloud-workloads-safe/</loc>
		<lastmod>2019-03-06T08:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/thwarting-gandcrab-in-the-new-era-of-agile-computer-jackers/</loc>
		<lastmod>2019-03-06T09:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/say-goodbye-to-passwords-webauthn-specification-now-an-official-standard/</loc>
		<lastmod>2019-03-06T10:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/edguards-recognized-as-the-winner-in-2019-cybersecurity-excellence-awards/</loc>
		<lastmod>2019-03-06T10:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ntt-security-corporation-acquires-whitehat-security/</loc>
		<lastmod>2019-03-06T12:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/collection-1-data-breach/</loc>
		<lastmod>2019-03-06T13:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shifting-left-is-a-lie-sort-of/</loc>
		<lastmod>2019-03-06T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/various-membership-plans-offered-by-jokeroo-ransomware-as-a-service/</loc>
		<lastmod>2019-03-06T13:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-election-fix-upgrading-georgias-electronic-voting-machines/</loc>
		<lastmod>2019-03-06T13:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-opening-keynote-inspires/</loc>
		<lastmod>2019-03-06T14:31:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/scammers-use-cheap-and-squatted-domains-to-create-fake-sites-2/</loc>
		<lastmod>2019-03-06T14:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/happy-birthday-notifiable-data-breaches/</loc>
		<lastmod>2019-03-06T15:25:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/q4-threat-landscape-report-2018-attacks-highlighted-the-need-for-advanced-threat-intelligence/</loc>
		<lastmod>2019-03-06T15:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/iot-expands-the-botnet-universe/</loc>
		<lastmod>2019-03-06T15:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2019-the-year-of-ics-cyber-security-nozomi-networks/</loc>
		<lastmod>2019-03-06T15:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-sandra-gorkas-jacob-millers-kinder-garten-security-teaching-the-pre-college-crowd/</loc>
		<lastmod>2019-03-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/avast-presents-on-ai-iot-privacy-at-sxsw-avast/</loc>
		<lastmod>2019-03-06T16:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-economic-impact-of-threat-stack-a-forrester-research-study/</loc>
		<lastmod>2019-03-06T16:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ssl-tls-certificate-toolkits-a-hot-commodity-on-the-dark-web/</loc>
		<lastmod>2019-03-06T16:39:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/in-a-software-driven-world-who-is-responsible-for-the-risks/</loc>
		<lastmod>2019-03-06T16:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-protect-files-with-canary-tokens/</loc>
		<lastmod>2019-03-06T16:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/secure-coding-resources/</loc>
		<lastmod>2019-03-06T16:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/network-segmentation-secure-your-network-and-enable-attack-containment/</loc>
		<lastmod>2019-03-06T17:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/seeker-bringing-security-testing-to-qa/</loc>
		<lastmod>2019-03-06T17:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/windows-10-iot-core-test-subsystem-permits-device-control-seizure/</loc>
		<lastmod>2019-03-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/leveraging-ueba-to-address-insider-threats/</loc>
		<lastmod>2019-03-06T18:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-stealth-worker-campaign-creates-a-multi-platform-army-of-brute-forcers/</loc>
		<lastmod>2019-03-06T18:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gurucul-risk-analytics-7-0-uses-machine-learning-models-for-real-time-threat-detection-2/</loc>
		<lastmod>2019-03-06T18:37:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/podcast-addressing-credential-compromise-and-insider-threats-requires-a-new-security-approach/</loc>
		<lastmod>2019-03-06T19:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-nicole-schwartz-specialists-versus-jack-of-all-trades/</loc>
		<lastmod>2019-03-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/social-engineer-newsletter-vol-09-issue-114/</loc>
		<lastmod>2019-03-06T21:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-video-orientation/</loc>
		<lastmod>2019-03-06T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/two-factor-authentication-2fa-is-just-one-part-of-a-layered-phishing-defense/</loc>
		<lastmod>2019-03-06T23:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/driving-toward-safety-automotive-industry-struggles-with-security-in-rolling-out-connected-vehicles/</loc>
		<lastmod>2019-03-06T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-add-ssl-move-wordpress-from-http-to-https/</loc>
		<lastmod>2019-03-06T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ciam-continues-to-draw-attention-as-akamai-acquires-janrain/</loc>
		<lastmod>2019-03-06T23:15:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/1-reason-to-visit-us-at-rsa-2019/</loc>
		<lastmod>2019-03-07T00:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/time-to-end-the-cloud-o-phobia/</loc>
		<lastmod>2019-03-07T00:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/day-3-recap-keynote-highlights-early-stage-expo-ciso-boot-camp-and-more/</loc>
		<lastmod>2019-03-07T02:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-does-the-near-future-of-cyber-security-look-like-a-roomful-of-rsac-attendees-considered-that-and-here-are-the-takeaways/</loc>
		<lastmod>2019-03-07T02:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/7-tips-for-a-successful-office-365-adoption/</loc>
		<lastmod>2019-03-07T02:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nevada-leads-by-example-in-state-and-local-government-cyber-security-practices/</loc>
		<lastmod>2019-03-07T07:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/international-womens-day-supporting-gender-diversity-in-cybersecurity-putting-the-skills-gap-into-the-history-books/</loc>
		<lastmod>2019-03-07T08:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fbi-boss-warns-businesses-of-chinese-hackers-stealing-their-intellectual-property/</loc>
		<lastmod>2019-03-07T08:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/highlights-from-rsa-2019/</loc>
		<lastmod>2019-03-07T07:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-inside-the-msrc-blue-team-bug-bounties-ir/</loc>
		<lastmod>2019-03-07T08:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/update-your-chrome-browser-now-0-day-actively-exploited-in-the-wild/</loc>
		<lastmod>2019-03-07T10:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-releases-a-fix-for-the-zero-day-vulnerability-in-its-chrome-browser-while-it-was-under-active-attack/</loc>
		<lastmod>2019-03-07T11:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/thousands-of-patients-impacted-by-ransomware-attack-at-medical-billing-company/</loc>
		<lastmod>2019-03-07T11:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cisco-rolls-out-patches-for-high-risk-vulnerabilities-in-fxos-and-nx-os-software/</loc>
		<lastmod>2019-03-07T13:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/pci-pal-discusses-how-consumer-demand-is-driving-pci-compliance-at-call-contact-centre-expo-2019/</loc>
		<lastmod>2019-03-07T13:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-understand-your-attackers-mindset/</loc>
		<lastmod>2019-03-07T14:31:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-sophia-the-social-humanoid-robot/</loc>
		<lastmod>2019-03-07T14:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-talent-opportunities-know-no-limits/</loc>
		<lastmod>2019-03-07T14:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/huawei-takes-us-to-court-over-ban-cyberespionage-accusations/</loc>
		<lastmod>2019-03-07T15:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/adapting-application-security-to-the-new-world-of-bots/</loc>
		<lastmod>2019-03-07T15:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/international-womens-day-brexit-skills-gap-and-balanceforbetter-in-the-cybersecurity-industry/</loc>
		<lastmod>2019-03-07T15:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/report-80-of-it-security-pros-think-the-skills-gap-has-worsened-since-2017/</loc>
		<lastmod>2019-03-07T15:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-tarah-wheelers-roy-iversens-quipe-rouge-the-ethics-of-prosecuting-an-offensive-security-campaign/</loc>
		<lastmod>2019-03-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/machine-identity-protection-gains-momentum-in-2018/</loc>
		<lastmod>2019-03-07T16:18:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/modernizing-siem-with-managed-detection-and-response/</loc>
		<lastmod>2019-03-07T16:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-30-information-technology-it-manager-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-03-07T16:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hack-the-box-htb-machines-walkthrough-series-mirai/</loc>
		<lastmod>2019-03-07T16:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-impact-does-the-autocomplete-feature-have-on-web-security/</loc>
		<lastmod>2019-03-07T17:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tricks-and-comfoolery-how-ursnif-evades-detection/</loc>
		<lastmod>2019-03-07T17:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-configure-acunetix-with-kenna-security/</loc>
		<lastmod>2019-03-07T17:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/remote-code-execution-possible-in-drupal/</loc>
		<lastmod>2019-03-07T17:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-build-checks-for-drupal-rce-thinkphp-rce-vbulletin-lfi-and-typo3-restler-lfi/</loc>
		<lastmod>2019-03-07T17:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/critical-csrf-vulnerability-on-facebook/</loc>
		<lastmod>2019-03-07T17:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/pauls-security-weekly-episode-web-app-scanning-with-authentication/</loc>
		<lastmod>2019-03-07T17:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/what-is-server-side-request-forgery-ssrf/</loc>
		<lastmod>2019-03-07T17:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/setting-up-a-self-signed-tls-ssl-certificate-on-apache/</loc>
		<lastmod>2019-03-07T17:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/alleged-peoples-republic-of-china-hack-targets-27-universities-us-canadian-maritime-military-secrets-ostensibly-the-loot/</loc>
		<lastmod>2019-03-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/global-traffic-management-for-cloud-data-centers-and-cdns/</loc>
		<lastmod>2019-03-07T18:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mapping-communication-between-facebook-accounts-using-a-browser-based-side-channel-attack/</loc>
		<lastmod>2019-03-07T19:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-many-smartphone-sensors-can-you-name/</loc>
		<lastmod>2019-03-07T19:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/pci-dss-compliance-for-wordpress-ecommerce-business-sites/</loc>
		<lastmod>2019-03-07T19:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gdpr-not-heavy-handed-yet-but-driving-data-breaches-into-the-open/</loc>
		<lastmod>2019-03-07T19:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-andrew-wongs-phil-vachons-social-network-analysis-a-scary-primer/</loc>
		<lastmod>2019-03-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/deriving-value-from-the-mitre-attck-threat-model/</loc>
		<lastmod>2019-03-07T20:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-in-a-world-changed-by-software-make-security-your-competitive-advantage/</loc>
		<lastmod>2019-03-07T20:26:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/unique-benefits-to-attract-and-retain-strong-and-diverse-candidates/</loc>
		<lastmod>2019-03-07T20:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/do-good-with-your-data-at-rsa-with-tinfoil-security-2/</loc>
		<lastmod>2019-03-07T20:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-future-of-iot-security-is-in-your-hands-avast/</loc>
		<lastmod>2019-03-07T20:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/at-rsa-it-is-clear-encryption-divide-is-as-wide-as-ever/</loc>
		<lastmod>2019-03-07T20:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/beyond-basic-waf-coverage-new-threatx-capabilities/</loc>
		<lastmod>2019-03-07T21:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-facebook-stress-disorder/</loc>
		<lastmod>2019-03-07T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-panel-agrees-building-a-diverse-staff-isnt-that-hard-but-it-requires-intention/</loc>
		<lastmod>2019-03-08T02:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/day-4-recap-keynote-highlights-capture-the-flag-public-interest-tech-and-more/</loc>
		<lastmod>2019-03-08T02:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-the-vastly-improved-moscone-center-will-help-the-future-of-cyber-security/</loc>
		<lastmod>2019-03-08T02:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/as-the-rsa-conference-rages-on-equifax-faces-the-music-again/</loc>
		<lastmod>2019-03-08T02:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/qa-international-womens-day/</loc>
		<lastmod>2019-03-08T08:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsoft-phishing-attacks-increased-250-from-january-to-december-2018/</loc>
		<lastmod>2019-03-08T08:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2019-cloud-security-research-take-the-survey-and-get-the-free-report/</loc>
		<lastmod>2019-03-08T09:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/prediction-series-6-alert-fatigue-undermines-security-exhausts-soc-teams/</loc>
		<lastmod>2019-03-08T08:58:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vpns-and-the-ongoing-battle-for-privacy/</loc>
		<lastmod>2019-03-08T10:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-highlights-top-5-cybersecurity-products-announced/</loc>
		<lastmod>2019-03-08T12:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vulnerabilities-in-two-smart-car-alarm-systems-affected-3m-vehicles/</loc>
		<lastmod>2019-03-08T12:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-better-secure-apis-in-an-open-banking-partnership-part-one/</loc>
		<lastmod>2019-03-08T12:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hackable-car-alarms-leave-three-million-cars-at-risk-of-hijack/</loc>
		<lastmod>2019-03-08T13:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/coinhive-shuts-down-avast/</loc>
		<lastmod>2019-03-08T14:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/backstory-revealed-ghidra-announced-and-more-avast/</loc>
		<lastmod>2019-03-08T14:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cdn-tuning-for-ott-why-doesnt-it-already-do-that/</loc>
		<lastmod>2019-03-08T14:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/us-senate-to-take-legal-steps-to-prevent-a-repeat-of-equifax-marriot-security-negligence/</loc>
		<lastmod>2019-03-08T14:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-diversity-and-inclusion/</loc>
		<lastmod>2019-03-08T14:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-thats-a-wrap/</loc>
		<lastmod>2019-03-08T15:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-end-of-coinhive-and-the-rise-of-cryptojacking/</loc>
		<lastmod>2019-03-08T15:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-evan-jensens-rudy-cuevas-iphone-surgery-for-the-practically-paranoid/</loc>
		<lastmod>2019-03-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/myequifax-com-bypasses-credit-freeze-pin/</loc>
		<lastmod>2019-03-08T16:12:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-do-encryption-protocols-work/</loc>
		<lastmod>2019-03-08T16:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/spotlight-on-ai-expert-galina-alperovich-avast/</loc>
		<lastmod>2019-03-08T17:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/live-from-rsa-coolest-things-to-see-on-the-expo-floor/</loc>
		<lastmod>2019-03-08T17:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/international-womens-day-a-time-to-reflect-back-and-peer-forward/</loc>
		<lastmod>2019-03-08T17:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dark-web-two-step/</loc>
		<lastmod>2019-03-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/idaptive-delivers-seamless-access-and-automated-account-provisioning-to-box/</loc>
		<lastmod>2019-03-08T17:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-one-simple-concept-found-its-way-into-just-about-every-rsa-conference-keynote/</loc>
		<lastmod>2019-03-08T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/spotlight-on-women-in-cybersecurity/</loc>
		<lastmod>2019-03-08T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/an-open-letter-to-the-cybersecurity-industry-on-international-womens-day/</loc>
		<lastmod>2019-03-08T19:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-matt-blazes-its-2019-and-special-agent-johnny-still-cant-encrypt/</loc>
		<lastmod>2019-03-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-a-recap/</loc>
		<lastmod>2019-03-08T20:20:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tanya-janca-at-rsa-on-better-appsec-play-nice-with-devops/</loc>
		<lastmod>2019-03-08T20:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/two-doors-to-soar-visual/</loc>
		<lastmod>2019-03-08T21:05:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-putins-sovereign-internet/</loc>
		<lastmod>2019-03-08T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-watering-hole-attacks-target-the-financial-sector-and-government-agencies/</loc>
		<lastmod>2019-03-08T22:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/getting-ready-for-swarm-as-a-service/</loc>
		<lastmod>2019-03-08T23:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/day-5-recap-rsac-college-day-girl-scouting-for-talent-tina-fey-and-looking-ahead/</loc>
		<lastmod>2019-03-08T23:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-from-helen-mirren-to-a-1792-penny-cybersecurity-lessons-were-everywhere/</loc>
		<lastmod>2019-03-08T23:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-keynote-impressions-the-voice-of-cybersecurity-is-changing-along-with-the-industry-and-she-has-a-lot-to-say/</loc>
		<lastmod>2019-03-08T23:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-security-researcher-reveals-his-discovery-on-800-million-leaked-emails-available-online/</loc>
		<lastmod>2019-03-09T15:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/chacha20-poly1305-vulnerability-issue-affects-openssl-1-1-1-and-1-1-0/</loc>
		<lastmod>2019-03-09T15:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-christian-paquins-post-quantum-crypto-todays-defense-against-tomorrows-quantum-hacker/</loc>
		<lastmod>2019-03-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-brain-hemispheres/</loc>
		<lastmod>2019-03-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/idaptive-19-2-is-now-available/</loc>
		<lastmod>2019-03-09T18:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-signs-your-business-could-be-facing-an-it-disaster/</loc>
		<lastmod>2019-03-09T20:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-quick-lesson-in-confirmation-bias/</loc>
		<lastmod>2019-03-09T20:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-wendy-knox-everettes-incident-response-and-the-attorney-client-privilege/</loc>
		<lastmod>2019-03-09T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-death-of-passwords/</loc>
		<lastmod>2019-03-10T04:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-adam-everspaughs-un-fing-cloud-storage-encryption/</loc>
		<lastmod>2019-03-10T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-airpod-senescence/</loc>
		<lastmod>2019-03-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/wrangling-content-security-policies-in-r/</loc>
		<lastmod>2019-03-10T17:10:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-ariel-zelivanskys-writing-a-fuzzer-for-any-language-with-american-fuzzy-lop/</loc>
		<lastmod>2019-03-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/insert-skimmer-camera-cover-pin-stealer/</loc>
		<lastmod>2019-03-11T03:41:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-chrome-zero-day-facebook-phone-number-privacy-nsa-phone-data-collection-program/</loc>
		<lastmod>2019-03-11T04:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/threat-forwarding-augments-threat-intelligence-with-automated-triage-and-categorization/</loc>
		<lastmod>2019-03-11T06:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-pick-the-right-solution-for-fisma-si-7-compliance/</loc>
		<lastmod>2019-03-11T10:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybercrime-costs-climb-12-to-13-million-per-company-in-2018/</loc>
		<lastmod>2019-03-11T10:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-nut-worth-cracking-2/</loc>
		<lastmod>2019-03-11T11:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/stop-ransomware-variant-installing-azorult-infostealer/</loc>
		<lastmod>2019-03-11T11:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/resecurity-reports-iriduim-behind-citrix-data-breach-200-government-agencies-oil-and-gas-companies-and-technology-companies-also-targeted/</loc>
		<lastmod>2019-03-11T11:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/flickr-says-creative-commons-photos-wont-be-subject-to-1000-picture-limit/</loc>
		<lastmod>2019-03-11T11:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-many-benefits-of-a-cloud-access-security-broker/</loc>
		<lastmod>2019-03-11T11:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/pci-london-july-2019/</loc>
		<lastmod>2019-03-11T12:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/jackson-county-pays-ransomware-operators-400k-to-regain-access-to-computers/</loc>
		<lastmod>2019-03-11T12:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/columbia-surgical-specialists-pays-almost-15k-ransom-following-ransomware-attack/</loc>
		<lastmod>2019-03-11T12:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-sues-quiz-app-developers-who-allegedly-stole-users-private-data-through-browser-plugins/</loc>
		<lastmod>2019-03-11T13:44:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-4-things-to-tell-new-hires-about-cybersecurity/</loc>
		<lastmod>2019-03-11T13:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/accused-onecoin-scam-orchestrator-arrested-in-los-angeles/</loc>
		<lastmod>2019-03-11T14:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-adir-abrahams-reversing-sr-iov-for-fun-and-profit/</loc>
		<lastmod>2019-03-11T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/three-romanians-plead-guilty-in-multi-million-dollar-vishing-and-smishing-scheme/</loc>
		<lastmod>2019-03-11T15:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-the-cybersec-first-responder-cfr-certification/</loc>
		<lastmod>2019-03-11T15:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fortinet-recognized-as-best-security-company-at-2019-sc-magazine-awards/</loc>
		<lastmod>2019-03-11T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/multi-cloud-complicates-security/</loc>
		<lastmod>2019-03-11T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-trust-landscape/</loc>
		<lastmod>2019-03-11T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/api-security-awareness-and-moderation-are-key/</loc>
		<lastmod>2019-03-11T16:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hackers-and-carding/</loc>
		<lastmod>2019-03-11T16:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-zero-day-initiative/</loc>
		<lastmod>2019-03-11T16:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/medieval-diseases-find-new-vector-in-united-states-the-homeless/</loc>
		<lastmod>2019-03-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/oh-how-i-love-my-hashi-vault/</loc>
		<lastmod>2019-03-11T17:07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-hygiene-not-a-dirty-little-secret-for-long/</loc>
		<lastmod>2019-03-11T17:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/soc-2-audit-explained-for-saas-companies/</loc>
		<lastmod>2019-03-11T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/raven-1-ctf-walkthrough/</loc>
		<lastmod>2019-03-11T18:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/analysis-of-the-new-modules-that-emotet-spreads/</loc>
		<lastmod>2019-03-11T18:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-john-oneils-five-sigma-network-events-and-how-to-find-them/</loc>
		<lastmod>2019-03-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-deploy-a-graylog-siem-server-in-aws-and-integrate-with-imperva-cloud-waf/</loc>
		<lastmod>2019-03-11T19:25:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mac-malware-resource-from-checkpoint/</loc>
		<lastmod>2019-03-11T19:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-iso-27001-and-tisax-are-related/</loc>
		<lastmod>2019-03-11T19:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dow-jones-exposes-data-joins-the-list-of-2019-elasticsearch-leaks/</loc>
		<lastmod>2019-03-11T20:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/an-unprotected-mongodb-database-exposed-809-million-records/</loc>
		<lastmod>2019-03-11T20:39:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/pci-for-smb-requirement-10-11-regularly-monitor-and-test-networks/</loc>
		<lastmod>2019-03-11T21:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/from-coin-flip-dlp-to-next-gen-casb/</loc>
		<lastmod>2019-03-11T21:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/learning-from-the-big-data-breaches-of-2018/</loc>
		<lastmod>2019-03-11T21:39:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/public-key-infrastructure-explained/</loc>
		<lastmod>2019-03-11T22:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/robert-m-lees-jeff-hass-little-bobby-comics-yubikeys-for-underwear/</loc>
		<lastmod>2019-03-11T22:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2018-summary-data-breaches-and-phishing-attacks-increase-in-severity/</loc>
		<lastmod>2019-03-11T22:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/our-team-is-hiring-new-position-open-north-america/</loc>
		<lastmod>2019-03-11T23:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/its-time-manufacturers-assemble-a-sound-cybersecurity-effort/</loc>
		<lastmod>2019-03-12T07:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-long-does-an-iso-27001-risk-assessment-take/</loc>
		<lastmod>2019-03-12T09:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/misconfigured-enterprise-box-accounts-leak-terabytes-of-sensitive-internal-data/</loc>
		<lastmod>2019-03-12T10:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-you-need-to-align-your-cloud-strategy-to-your-business-goals/</loc>
		<lastmod>2019-03-12T11:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/announcing-dtrace-for-windows-insider/</loc>
		<lastmod>2019-03-12T12:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/62-articles-blog-posts-and-links-that-summarize-the-2019-rsa-conference/</loc>
		<lastmod>2019-03-12T13:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/zero-trust-part-i-the-evolution-of-perimeter-security/</loc>
		<lastmod>2019-03-12T13:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-track-agent-based-user-activity/</loc>
		<lastmod>2019-03-12T13:58:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/majority-of-organizations-still-report-a-lack-of-cyber-security-budget/</loc>
		<lastmod>2019-03-12T13:59:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hackers-easily-can-reach-education-data-breach/</loc>
		<lastmod>2019-03-12T14:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/will-we-ever-see-the-end-of-account-theft/</loc>
		<lastmod>2019-03-12T14:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-30-vulnerability-researcher-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-03-12T14:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-orchestration-automation-and-response-soar/</loc>
		<lastmod>2019-03-12T14:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-conor-patricks-building-and-selling-solo-an-open-source-secure-hardware-token/</loc>
		<lastmod>2019-03-12T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-what-the-ethiopian-737-max-8-crash-should-tell-us-about-the-safety-of-smart-jetliners/</loc>
		<lastmod>2019-03-12T16:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gmail-recovery-made-easy-get-lost-gmail-back-in-just-a-few-clicks/</loc>
		<lastmod>2019-03-12T16:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/win-win-policies-that-simplify-your-machine-identity-protection/</loc>
		<lastmod>2019-03-12T16:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-2019-happily-not-over-aid/</loc>
		<lastmod>2019-03-12T16:58:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-days-and-nights-of-an-always-on-sales-engineer/</loc>
		<lastmod>2019-03-12T16:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hard-disks-as-microphones-the-newest-privacy-intrusion-vector/</loc>
		<lastmod>2019-03-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/password-protection-in-the-enterprise-secure-way-to-communicate-and-protect/</loc>
		<lastmod>2019-03-12T17:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/sap-security-notes-march-19-critical-bug-affecting-sap-hana-xsa/</loc>
		<lastmod>2019-03-12T18:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-sextortion-scam-says-adult-sites-infected-victims-with-malware/</loc>
		<lastmod>2019-03-12T18:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-christopher-graysons-marc-newlins-ipv666-address-of-the-beast/</loc>
		<lastmod>2019-03-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-dashboards-that-empower-decision-making/</loc>
		<lastmod>2019-03-12T19:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-zuckerbergs-new-privacy-bit-hes-one-stand-up-guy/</loc>
		<lastmod>2019-03-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vpns-and-desktop-sharing-slow-you-down-and-put-you-at-risk/</loc>
		<lastmod>2019-03-12T21:33:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/some-notes-on-the-raspberry-pi/</loc>
		<lastmod>2019-03-12T22:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/e-crime-cybersecurity-congress-cloud-security-fundamentals/</loc>
		<lastmod>2019-03-12T23:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-apple-godaddy-mis-issue-over-1-million-faulty-certificates/</loc>
		<lastmod>2019-03-13T01:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ios-phishing-scam-steals-facebook-logins-avast/</loc>
		<lastmod>2019-03-13T02:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/patch-tuesday-march-2019-edition/</loc>
		<lastmod>2019-03-13T04:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vert-threat-alert-march-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-03-13T04:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ncipher-security-ceo-cindy-provin-on-the-verifications-io-breach/</loc>
		<lastmod>2019-03-13T06:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/guest-blog-end-to-end-data-encryption-with-data-reduction-from-thales-pure-storage/</loc>
		<lastmod>2019-03-13T07:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberthreats-your-business-isnt-prepared-for/</loc>
		<lastmod>2019-03-13T07:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/closed-loop-automation-what-it-means-for-csps-allot/</loc>
		<lastmod>2019-03-13T07:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/protecting-business-logic-and-use-cases-around-codesafe/</loc>
		<lastmod>2019-03-13T08:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hybrid-identity-protection-comes-in-many-shapes-meet-azure-ad-connect-health/</loc>
		<lastmod>2019-03-13T09:24:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/clinic-hit-by-ransomware-recovers-in-hours-thanks-to-solid-incident-response-plan/</loc>
		<lastmod>2019-03-13T11:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/lets-encrypt-acme-protocol-is-now-standardized-by-the-ietf/</loc>
		<lastmod>2019-03-13T11:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/judging-facebooks-privacy-shift/</loc>
		<lastmod>2019-03-13T11:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/man-arrested-for-selling-one-million-netflix-spotify-hulu-passwords/</loc>
		<lastmod>2019-03-13T11:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-renew-a-comptia-network-certification/</loc>
		<lastmod>2019-03-13T12:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-why-consumers-are-destined-to-play-a-big-role-in-securing-the-internet-of-things/</loc>
		<lastmod>2019-03-13T12:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/kathmandu-notifies-customers-of-security-incident-involving-its-website/</loc>
		<lastmod>2019-03-13T12:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cloudflare-raises-150m-with-franklin-templeton-leading-the-latest-round-of-funding/</loc>
		<lastmod>2019-03-13T13:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-long-road-toward-building-secure-software-at-enterprise-scale/</loc>
		<lastmod>2019-03-13T13:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cr1ptt0r-ransomware-targets-nas-devices-with-old-firmware/</loc>
		<lastmod>2019-03-13T13:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/assessing-your-organizations-cybersecurity-practices-with-homeland-securitys-cyber-resilience-review/</loc>
		<lastmod>2019-03-13T13:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bitglass-security-spotlight-500px-card-dumps-and-uw-medicine/</loc>
		<lastmod>2019-03-13T13:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-ai-battleground-explained-by-an-expert-avast/</loc>
		<lastmod>2019-03-13T14:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/are-your-devops-your-biggest-security-risks/</loc>
		<lastmod>2019-03-13T14:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/local-government-news-feature-is-your-council-compliant/</loc>
		<lastmod>2019-03-13T14:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/slashnext-introduces-industrys-first-real-time-phishing-threat-intelligence-service/</loc>
		<lastmod>2019-03-13T14:22:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/understanding-vulnerability-scoring-to-help-measure-risk/</loc>
		<lastmod>2019-03-13T14:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-power-of-vulnerability-management-are-you-maximizing-its-value/</loc>
		<lastmod>2019-03-13T14:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vulnerability-dashboard-measure-your-progress-to-deliver-secure-apps/</loc>
		<lastmod>2019-03-13T14:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-votiro-takes-white-listing-approach-to-defusing-weaponized-documents/</loc>
		<lastmod>2019-03-13T14:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/shmoocon-2019-jessica-zhanna-malekos-smiths-the-beginners-guide-to-the-musical-scales-of-cyberwar/</loc>
		<lastmod>2019-03-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tracking-caa-usage/</loc>
		<lastmod>2019-03-13T15:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bug-bounties-a-good-tool-but-dont-make-them-the-only-tool-in-security/</loc>
		<lastmod>2019-03-13T16:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-build-a-microsoft-flow-custom-connector-to-spanning-api/</loc>
		<lastmod>2019-03-13T16:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/disturbing-new-tracking-revelations-the-latest-culprit-foursquare/</loc>
		<lastmod>2019-03-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/is-gdpr-the-new-hacker-scare-tactic/</loc>
		<lastmod>2019-03-13T18:04:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/united-states-k9-veterans-day-march-13th-2019/</loc>
		<lastmod>2019-03-13T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/insufficient-privilege-validation-in-siteground-optimizer-caldera-forms-pro/</loc>
		<lastmod>2019-03-13T18:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-opening-presentation/</loc>
		<lastmod>2019-03-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebooks-adoption-of-end-to-end-encryption-has-changed-the-world/</loc>
		<lastmod>2019-03-13T20:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ad-network-sizmek-probes-account-breach/</loc>
		<lastmod>2019-03-13T20:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-light-pollution/</loc>
		<lastmod>2019-03-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-good-the-bad-and-the-ugly-of-our-rsa-2019-survey/</loc>
		<lastmod>2019-03-13T21:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/using-soar-for-automated-malware-analysis/</loc>
		<lastmod>2019-03-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/automated-malware-analysis-and-reverse-engineering-with-soar/</loc>
		<lastmod>2019-03-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/verizon-study-shows-mobile-devices-among-top-entry-points-for-hackers-ransomware-remains-most-successful-attack/</loc>
		<lastmod>2019-03-14T07:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-buzz-at-rsac-2019-has-ai-been-reduced-to-snake-oil/</loc>
		<lastmod>2019-03-14T08:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-cybergrx-seeks-to-streamline-morass-of-third-party-cyber-risk-assessments/</loc>
		<lastmod>2019-03-14T08:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/immortal-information-stealer/</loc>
		<lastmod>2019-03-14T11:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-road-to-five-nines/</loc>
		<lastmod>2019-03-14T12:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/us-senators-say-it-shouldnt-be-a-secret-when-theyve-been-hacked/</loc>
		<lastmod>2019-03-14T12:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hotel-networks-protected-with-avast-business-avast-business/</loc>
		<lastmod>2019-03-14T13:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/apklab-io-flags-3-fake-apps-on-google-play-avast/</loc>
		<lastmod>2019-03-14T13:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bricata-included-as-a-representative-vendor-in-the-inaugural-market-guide-for-network-traffic-analysis-by-gartner-inc/</loc>
		<lastmod>2019-03-14T13:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-takes-down-2-3-billion-ads-almost-60-million-phishing-scams/</loc>
		<lastmod>2019-03-14T13:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-pros-and-perils-of-serverless-architecture/</loc>
		<lastmod>2019-03-14T14:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/attackers-sending-out-fake-cdc-flu-warnings-to-distribute-gandcrab/</loc>
		<lastmod>2019-03-14T14:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-morning-keynote-featuring-runa-sandvik/</loc>
		<lastmod>2019-03-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/collecting-content-security-policy-violation-reports-in-s3-effortlessly-freely/</loc>
		<lastmod>2019-03-14T15:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dont-be-trapped-close-cybersecurity-holes/</loc>
		<lastmod>2019-03-14T15:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/masstlc-2019-dc-fly-in-takes-tech-advocacy-to-a-higher-plane/</loc>
		<lastmod>2019-03-14T15:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-achieve-full-stack-multi-cloud-security-observability/</loc>
		<lastmod>2019-03-14T15:42:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-30-chief-technology-officer-cto-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-03-14T16:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/quantum-computation-and-its-effects-on-cryptography/</loc>
		<lastmod>2019-03-14T16:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/transforming-self-xss-into-exploitable-xss/</loc>
		<lastmod>2019-03-14T16:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/videos-and-links-from-the-public-interest-technology-track-at-the-rsa-conference/</loc>
		<lastmod>2019-03-14T16:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/on-surveillance-in-the-workplace/</loc>
		<lastmod>2019-03-14T16:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/secure-communications-in-the-age-of-digital-footprints/</loc>
		<lastmod>2019-03-14T16:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/digital-risk-management-where-do-i-start/</loc>
		<lastmod>2019-03-14T16:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-what-elizabeth-warren-can-do-for-tech/</loc>
		<lastmod>2019-03-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-choose-between-enterprise-and-open-source-static-analysis/</loc>
		<lastmod>2019-03-14T17:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hack-the-box-htb-machines-walkthrough-series-solidstate/</loc>
		<lastmod>2019-03-14T17:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-our-threat-analytics-multi-region-data-lake-on-aws-stores-more-slashes-costs/</loc>
		<lastmod>2019-03-14T17:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-artificial-intelligence-is-crucial-for-effective-cybersecurity/</loc>
		<lastmod>2019-03-14T17:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/end-users-from-weak-link-to-security-enabler/</loc>
		<lastmod>2019-03-14T17:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/darpa-is-developing-an-open-source-voting-system/</loc>
		<lastmod>2019-03-14T18:20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-brian-contos-hackers-hooligans-heists-history/</loc>
		<lastmod>2019-03-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/serial-entropy-issues-invalidate-22000-tls-certificates-on-dutch-government-pki/</loc>
		<lastmod>2019-03-14T19:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/location-aware-malware-targets-japanese-and-korean-endpoints/</loc>
		<lastmod>2019-03-14T20:10:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mits-attack-detection-via-super-computing/</loc>
		<lastmod>2019-03-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gdpr-and-brexit/</loc>
		<lastmod>2019-03-14T21:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bad-biometrics-samsungs-new-s10-phone/</loc>
		<lastmod>2019-03-14T23:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/deep-dive-on-jenkins-pipeline-plugin-remote-code-execution/</loc>
		<lastmod>2019-03-15T02:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facing-the-trust-issue-head-on/</loc>
		<lastmod>2019-03-15T05:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/recapping-rsa-conference-2019-no-silver-bullet-for-security/</loc>
		<lastmod>2019-03-15T07:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/addressing-the-human-error-causes-of-security-breaches/</loc>
		<lastmod>2019-03-15T09:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-easy-is-it-to-spoof-a-caller-id/</loc>
		<lastmod>2019-03-15T11:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/chinese-government-falls-victim-to-gandcrab-5-2-ransomware/</loc>
		<lastmod>2019-03-15T11:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-microsofts-active-directory-lurks-as-a-hackers-gateway-in-enterprise-networks/</loc>
		<lastmod>2019-03-15T13:02:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-two-keys-to-changing-organizational-culture/</loc>
		<lastmod>2019-03-15T13:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ice-privacy-concerns-and-box-data-leaks-avast/</loc>
		<lastmod>2019-03-15T13:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/romanian-vishing-smishing-threat-actors-plead-guilty/</loc>
		<lastmod>2019-03-15T13:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/get-set-election-go-preparing-for-the-2019-elections-chapter-two/</loc>
		<lastmod>2019-03-15T13:36:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/darpa-to-develop-10-million-open-source-voting-system/</loc>
		<lastmod>2019-03-15T14:09:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/critical-flaw-in-swiss-internet-voting-system/</loc>
		<lastmod>2019-03-15T14:44:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-virtual-coffee-on-cyber-attacks-with-jayson-dudley-from-mazars-llp/</loc>
		<lastmod>2019-03-15T14:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-ryan-wisniewskis-scrapping-for-pennies-how-to-implement-security-without-a-budget/</loc>
		<lastmod>2019-03-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-skills-needed-to-combat-todays-cybersecurity-threats/</loc>
		<lastmod>2019-03-15T16:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-size-venn-diagram/</loc>
		<lastmod>2019-03-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/conditional-access-establishes-trust-in-the-network/</loc>
		<lastmod>2019-03-15T17:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/uncommon-radixes-used-in-malware-obfuscation/</loc>
		<lastmod>2019-03-15T18:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-kate-broussards-check-your-privilege-escalation/</loc>
		<lastmod>2019-03-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/i-was-cited-in-a-court-decision/</loc>
		<lastmod>2019-03-15T19:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-what-you-need-to-know-2/</loc>
		<lastmod>2019-03-15T20:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/governors-focus-on-infrastructure-offer-technology-and-security-priorities-2/</loc>
		<lastmod>2019-03-15T20:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-many-organizations-still-dont-understand-security-2/</loc>
		<lastmod>2019-03-15T20:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/to-understand-iot-security-look-to-the-clouds-2/</loc>
		<lastmod>2019-03-15T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/how-can-we-improve-trust-in-technology-2/</loc>
		<lastmod>2019-03-15T20:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/corporate-best-practices-in-security-awareness-and-training-programs-2/</loc>
		<lastmod>2019-03-15T20:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/cyber-hijacking-campaign-sets-off-global-government-alarm-bells-2/</loc>
		<lastmod>2019-03-15T20:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-19-security-predictions-for-2019-2/</loc>
		<lastmod>2019-03-15T20:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-improve-cyberstrategy-by-learning-nfl-defensive-tactics-2/</loc>
		<lastmod>2019-03-15T20:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/blackberry-moves-to-strengthen-ties-with-the-us-government-thank-god/</loc>
		<lastmod>2019-03-15T20:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fcc-to-auction-wireless-spectrum-that-will-interfere-with-weather-data-collection/</loc>
		<lastmod>2019-03-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/vpn-a-big-misunderstanding/</loc>
		<lastmod>2019-03-15T21:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/take-control-of-your-infosec-career-with-cyberseek/</loc>
		<lastmod>2019-03-15T21:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/canned-playbooks-are-they-realistic/</loc>
		<lastmod>2019-03-15T22:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/attackers-sending-fake-copyright-infringement-notices-to-instagram-users/</loc>
		<lastmod>2019-03-15T22:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2019-university-cyber-attacks-how-can-you-protect-your-organization/</loc>
		<lastmod>2019-03-15T22:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gearbest-data-breach-puts-millions-at-risk-avast/</loc>
		<lastmod>2019-03-15T23:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/phishing-scams-to-watch-out-this-tax-season-avast/</loc>
		<lastmod>2019-03-16T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-cody-smiths-wow-it-really-is-always-dns-becoming-a-part-of-the-ddos-problem-on-purpose/</loc>
		<lastmod>2019-03-16T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-meta-collecting/</loc>
		<lastmod>2019-03-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-adam-comptons-david-boyds-unix-the-other-white-meat/</loc>
		<lastmod>2019-03-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/data-breaches-what-do-the-numbers-mean-2/</loc>
		<lastmod>2019-03-17T02:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dast-vs-sast-a-case-for-dynamic-application-security-testing/</loc>
		<lastmod>2019-03-17T07:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-erich-krons-puppet-masters-how-social-engineers-continue-to-pull-our-strings/</loc>
		<lastmod>2019-03-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/luke-kingma-and-lou-patrick-mackays-futurism-mining/</loc>
		<lastmod>2019-03-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-kyle-westhaus-e-zhack-an-update-on-sdr-and-toll-booth-reverse-engineering/</loc>
		<lastmod>2019-03-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-social-media-platforms-and-the-cybercrime-economy/</loc>
		<lastmod>2019-03-17T22:07:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-phone-numbers-stink-as-identity-proof/</loc>
		<lastmod>2019-03-17T23:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/equifax-and-marriott-data-breach-updates-facial-recognition-at-the-airport-citrix-password-spraying-attack/</loc>
		<lastmod>2019-03-18T04:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/abcs-of-ueba-d-is-for-data-2/</loc>
		<lastmod>2019-03-18T08:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-syncdog-vanquishes-byod-risk-by-isolating-company-assets-on-a-secure-mobile-app/</loc>
		<lastmod>2019-03-18T09:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/run-applications-and-scripts-using-acers-runcmd/</loc>
		<lastmod>2019-03-18T09:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/spam-campaign-uses-recent-boeing-737-max-crashes-to-push-malware/</loc>
		<lastmod>2019-03-18T11:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-faces-criminal-investigation-over-data-handling-partnerships/</loc>
		<lastmod>2019-03-18T12:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bitglass-at-rsa-2019-casbs-and-cocktails/</loc>
		<lastmod>2019-03-18T12:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-greatest-of-rewards-working-with-integrity/</loc>
		<lastmod>2019-03-18T13:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/like-football-your-cybersecurity-defense-needs-a-strong-offense/</loc>
		<lastmod>2019-03-18T13:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cio-applications-names-threatx-in-top-25-cyber-security-companies-in-2019/</loc>
		<lastmod>2019-03-18T13:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ccna-versus-ccnp-difficulty/</loc>
		<lastmod>2019-03-18T14:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/secure-coding-top-15-code-analysis-tools/</loc>
		<lastmod>2019-03-18T14:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/still-using-sha-1-for-internal-certificates-its-almost-too-late-to-update/</loc>
		<lastmod>2019-03-18T14:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/two-boeing-737-max-air-crashes-within-six-months-the-authorityfaa-or-softwaremcas-at-fault/</loc>
		<lastmod>2019-03-18T14:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-aaa-framework-for-identity-access-security/</loc>
		<lastmod>2019-03-18T14:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-ray-kellys-mobile-app-vulnerabilities-the-bad-the-worse-and-the-ugly/</loc>
		<lastmod>2019-03-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/successful-convergence-of-it-and-operational-technology-will-be-vital-for-strong-cyber-security/</loc>
		<lastmod>2019-03-18T15:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-play-is-flooded-with-hundreds-of-unsafe-anti-virus-products/</loc>
		<lastmod>2019-03-18T15:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/idaptive-delivers-appen-increased-functionality-improved-productivity-and-simplified-lifecycle-management-with-workday/</loc>
		<lastmod>2019-03-18T15:53:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/conferences/</loc>
		<lastmod>2019-03-18T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/another-appalling-privacy-failure-from-the-fcc/</loc>
		<lastmod>2019-03-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/getting-to-know-the-new-rsac-advisory-board-members-dr-dena-haritos-tsamitis/</loc>
		<lastmod>2019-03-18T17:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/march-2019-patch-tuesday-65-vulns-18-critical-rces-in-dhcp-client-adobe-vulns/</loc>
		<lastmod>2019-03-18T18:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-bill-sempfs-mixing-and-baking-a-new-appsec-person/</loc>
		<lastmod>2019-03-18T19:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->