<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/03/visibility-intelligence-automation-three-reasons-to-expand-machine-identity-protection-2/</loc>
		<lastmod>2019-03-18T19:24:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/arbitrary-directory-deletion-in-wp-fastest-cache/</loc>
		<lastmod>2019-03-18T20:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/robert-m-lees-jeff-hass-little-bobby-comics-rsa/</loc>
		<lastmod>2019-03-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hack-the-boxhtb-machines-walkthrough-series-tenten/</loc>
		<lastmod>2019-03-18T21:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/evolution-of-the-rsa-conference-and-what-it-means-for-the-future-of-cybersecurity/</loc>
		<lastmod>2019-03-18T21:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/4-inventive-ways-to-combat-the-cybersecurity-skills-shortage/</loc>
		<lastmod>2019-03-18T22:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/todays-malvertising-and-how-to-beat-it-avast/</loc>
		<lastmod>2019-03-19T01:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/our-applying-network-centric-approaches-for-threat-detection-and-response-paper-publishes/</loc>
		<lastmod>2019-03-19T01:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/assumptions-matter-more-than-dependencies/</loc>
		<lastmod>2019-03-19T05:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/best-practices-6-physical-security-measures-every-company-needs/</loc>
		<lastmod>2019-03-19T07:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-cloud-computing-enables-and-threatens-organizations-digital-transformation/</loc>
		<lastmod>2019-03-19T08:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/reputation-equals-revenue-why-data-security-and-compliance-are-crucial-for-ambitious-tech-companies/</loc>
		<lastmod>2019-03-19T08:36:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/visibility-intelligence-automation-three-reasons-to-expand-machine-identity-protection/</loc>
		<lastmod>2019-03-19T10:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/breaking-down-6-cybersecurity-salary-surveys-whats-a-security-pro-worth-in-2019/</loc>
		<lastmod>2019-03-19T11:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-exabeam-retools-siems-applies-credit-card-fraud-detection-tactics-to-network-logs/</loc>
		<lastmod>2019-03-19T12:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nozomi-networks-labs-sharing-valuable-ics-cyber-security-research/</loc>
		<lastmod>2019-03-19T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nozomi-networks-labs-enhances-radamsa-for-safer-ics-software/</loc>
		<lastmod>2019-03-19T12:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/aluminium-plants-hit-by-cyber-attack-global-company-turns-to-manual-operations/</loc>
		<lastmod>2019-03-19T12:36:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/slack-launches-enterprise-key-management-ekm-to-provide-complete-control-over-encryption-keys/</loc>
		<lastmod>2019-03-19T12:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ibm-announces-the-launch-of-blockchain-world-wire-a-global-blockchain-network-for-cross-border-payments/</loc>
		<lastmod>2019-03-19T12:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/insider-threats-is-your-business-at-risk/</loc>
		<lastmod>2019-03-19T12:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dllspy-tighten-your-defense-by-discovering-dll-hijacking-easily/</loc>
		<lastmod>2019-03-19T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-sextortion-scam-tries-to-scare-users-with-fake-cia-investigation/</loc>
		<lastmod>2019-03-19T13:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-roi-an-oxymoron/</loc>
		<lastmod>2019-03-19T13:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/smarter-vendor-security-assessments-tips-to-improve-response-rates/</loc>
		<lastmod>2019-03-19T13:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bots-101-this-is-why-we-cant-have-nice-things/</loc>
		<lastmod>2019-03-19T13:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-future-of-passwords-isnt-looking-bright-but-we-still-have-to-secure-them/</loc>
		<lastmod>2019-03-19T13:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/stronger-access-control-management/</loc>
		<lastmod>2019-03-19T13:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bromium-secure-platform-powers-hp-sure-click-advanced/</loc>
		<lastmod>2019-03-19T14:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hydro-cyber-attack-shuts-down-several-metal-extrusion-plants/</loc>
		<lastmod>2019-03-19T14:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/brain-hacking-part-2-aint-nobody-got-time-for-that/</loc>
		<lastmod>2019-03-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-isaiah-sarjus-how-online-dating-made-me-better-at-threat-modeling/</loc>
		<lastmod>2019-03-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-to-expect-from-the-nist-privacy-framework/</loc>
		<lastmod>2019-03-19T15:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/top-30-security-auditor-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-03-19T15:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/edtech-security-progress-retarded-by-cyber-incidents/</loc>
		<lastmod>2019-03-19T15:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/protecting-against-social-engineering-attacks/</loc>
		<lastmod>2019-03-19T15:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ddos-attacks-101/</loc>
		<lastmod>2019-03-19T15:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-implications-of-californias-privacy-law-ccpa/</loc>
		<lastmod>2019-03-19T15:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/identify-fake-news-and-prevent-its-sharing-avast/</loc>
		<lastmod>2019-03-19T15:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/network-chief-allegedly-tries-to-extort-750000-from-former-employers/</loc>
		<lastmod>2019-03-19T15:43:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/container-security-tips-and-best-practices/</loc>
		<lastmod>2019-03-19T15:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/so-you-just-bought-a-sast-tool-now-what/</loc>
		<lastmod>2019-03-19T16:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-walk-around/</loc>
		<lastmod>2019-03-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/10-mistakes-businesses-make-during-a-crisis/</loc>
		<lastmod>2019-03-19T17:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/introverted-social-engineer/</loc>
		<lastmod>2019-03-19T17:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-craig-stuntzs-what-on-earth-is-quantum-computing-and-will-it-break-all-my-encryption/</loc>
		<lastmod>2019-03-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/breaking-research-lockergoga-ransomware-impacts-norsk-hydro/</loc>
		<lastmod>2019-03-19T20:21:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-space-mission-hearing/</loc>
		<lastmod>2019-03-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-misconfigurations/</loc>
		<lastmod>2019-03-19T21:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/aberdeen-report-reveals-the-need-for-speed-in-phishing-attack-prevention/</loc>
		<lastmod>2019-03-19T21:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/united-states-cybersecurity-and-infrastructure-security-agency-cisa-chinese-malicious-cyber-activity-briefing/</loc>
		<lastmod>2019-03-19T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/more-on-dnsden-biz-swipers-and-radix-obfuscation/</loc>
		<lastmod>2019-03-19T23:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/as-the-cyber-war-grows-is-it-time-to-strike-back/</loc>
		<lastmod>2019-03-20T03:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/prediction-series-7-if-organizations-are-to-increase-their-focus-on-application-security-they-must-move-beyond-rasps/</loc>
		<lastmod>2019-03-20T04:42:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/crafting-the-perfect-pipeline-in-gitlab/</loc>
		<lastmod>2019-03-20T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-get-ready-to-future-proof-cybersecurity-the-race-is-on-to-deliver-post-quantum-crypto/</loc>
		<lastmod>2019-03-20T08:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/office-365-security-features-demystified/</loc>
		<lastmod>2019-03-20T09:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-you-need-trust-integrity-and-control-for-machine-identities-in-hsms/</loc>
		<lastmod>2019-03-20T09:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-norsk-hydro-ransomware-attack-an-in-depth-look/</loc>
		<lastmod>2019-03-20T10:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-norsk-hydro-lockergoga-ransomware-cyber-attack/</loc>
		<lastmod>2019-03-20T10:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/psychoanalyzing-security-cloud-fears/</loc>
		<lastmod>2019-03-20T11:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/is-the-private-or-public-cloud-right-for-your-business/</loc>
		<lastmod>2019-03-20T11:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bad-tidings-phishing-campaign-targeting-saudi-government-agencies/</loc>
		<lastmod>2019-03-20T11:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/your-active-directory-was-compromised-is-it-all-lost-part-2/</loc>
		<lastmod>2019-03-20T11:26:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/eu-ready-to-take-on-cross-border-attack-with-new-europol-protocol/</loc>
		<lastmod>2019-03-20T11:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/misconfiguration-monitoring-101/</loc>
		<lastmod>2019-03-20T12:14:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/now-patched-google-photos-vulnerability-let-hackers-track-your-friends-and-location-history/</loc>
		<lastmod>2019-03-20T13:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-intersections-between-cybersecurity-and-diversity/</loc>
		<lastmod>2019-03-20T13:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/wireless-security-guide-introduction-to-leap-authentication/</loc>
		<lastmod>2019-03-20T13:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/best-packet-tracer-resources/</loc>
		<lastmod>2019-03-20T13:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-many-flavors-of-linux/</loc>
		<lastmod>2019-03-20T13:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-av-and-endpoint-security-are-failing-msps-in-defending-against-attacks/</loc>
		<lastmod>2019-03-20T13:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/brexit-is-coming-dont-get-scammed-avast/</loc>
		<lastmod>2019-03-20T13:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-kevin-gennusos-battling-magecart-the-risks-of-third-party-scripts/</loc>
		<lastmod>2019-03-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/sorting-through-open-source-license-risks/</loc>
		<lastmod>2019-03-20T16:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsac-2019-better-than-what/</loc>
		<lastmod>2019-03-20T16:58:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersecurity-vendor-extortion/</loc>
		<lastmod>2019-03-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/giant-ecommerce-company-exposes-1-5-million-records/</loc>
		<lastmod>2019-03-20T17:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/zipcar-disruption/</loc>
		<lastmod>2019-03-20T17:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/assessing-next-generation-protection/</loc>
		<lastmod>2019-03-20T17:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/marriott-could-have-prevented-privacy-data-breach-with-tokenization/</loc>
		<lastmod>2019-03-20T18:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-brian-olsons-ship-hacking-data-on-the-open-seas/</loc>
		<lastmod>2019-03-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/defensive-strategies-industrial-organizations-can-use-against-cyber-attacks/</loc>
		<lastmod>2019-03-20T19:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-self-service-password-reset-sspr/</loc>
		<lastmod>2019-03-20T19:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/code-makes-the-world-go-round-well-code-and-love-so-love-your-code/</loc>
		<lastmod>2019-03-20T19:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-spotify-and-apples-cacophony/</loc>
		<lastmod>2019-03-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/will-ot-it-convergence-force-a-tcp-ip-transformation/</loc>
		<lastmod>2019-03-20T23:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/health-tech-company-leaks-thousands-of-medical-records/</loc>
		<lastmod>2019-03-21T03:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/guest-essay-why-theres-no-such-thing-as-anonymity-it-this-digital-age/</loc>
		<lastmod>2019-03-21T07:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/how-to-run-effective-security-awareness-training-for-your-organisation/</loc>
		<lastmod>2019-03-21T09:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/with-nine-months-to-go-only-14-percent-of-companies-are-ready-for-californias-new-privacy-law/</loc>
		<lastmod>2019-03-21T09:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/first-look-media-shutting-down-access-to-snowden-nsa-archives/</loc>
		<lastmod>2019-03-21T10:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/when-is-a-data-breach-a-data-breach/</loc>
		<lastmod>2019-03-21T11:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-do-i-check-that-acunetix-crawled-through-the-entire-site/</loc>
		<lastmod>2019-03-21T11:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-conference-2019-highlights/</loc>
		<lastmod>2019-03-21T11:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nicholas-sciberras-on-hack-naked-news/</loc>
		<lastmod>2019-03-21T11:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/all-that-you-need-to-know-about-man-in-the-middle-attacks/</loc>
		<lastmod>2019-03-21T11:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/gif-buffer-content-exposed-by-facebook-messenger/</loc>
		<lastmod>2019-03-21T11:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-local-file-inclusion-lfi/</loc>
		<lastmod>2019-03-21T11:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/eu-hits-google-with-third-antitrust-fine-for-illegal-search-ad-practices/</loc>
		<lastmod>2019-03-21T12:09:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/from-dev-to-infosec-part-5-fortis-fortuna-adiuvat/</loc>
		<lastmod>2019-03-21T12:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberark-named-a-gartner-peer-insights-customers-choice-for-privileged-access-management/</loc>
		<lastmod>2019-03-21T13:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/7-cloud-service-evaluation-criteria-to-help-you-choose-the-right-cloud-service-provider/</loc>
		<lastmod>2019-03-21T13:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-the-difference-between-dnis-and-ani/</loc>
		<lastmod>2019-03-21T13:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/data-analytics-in-cybersecurity/</loc>
		<lastmod>2019-03-21T13:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-and-facebook-scammed-out-of-123-million-by-man-posing-as-hardware-vendor/</loc>
		<lastmod>2019-03-21T13:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-tale-of-three-cisos-and-the-skills-they-bring/</loc>
		<lastmod>2019-03-21T14:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/privacy-threats-and-exploding-sneakers/</loc>
		<lastmod>2019-03-21T14:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-kevin-walls-common-developer-crypto-mistakes-with-illustrations-in-java/</loc>
		<lastmod>2019-03-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dharma-ransomware-recovery-rates-fall-as-ransom-demands-skyrocket/</loc>
		<lastmod>2019-03-21T15:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/</loc>
		<lastmod>2019-03-21T15:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/web-application-exposures-continue-to-bedevil-companies-as-digital-transformation-accelerates/</loc>
		<lastmod>2019-03-21T15:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/imperva-cloud-waf-and-graylog-part-ii-how-to-collect-and-ingest-siem-logs/</loc>
		<lastmod>2019-03-21T15:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/want-to-secure-your-apps-build-security-in-with-the-right-toolchain/</loc>
		<lastmod>2019-03-21T16:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/six-principles-for-securing-sensitive-enterprise-content-in-a-hyper-connected-world/</loc>
		<lastmod>2019-03-21T16:17:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/defining-your-top-security-metrics/</loc>
		<lastmod>2019-03-21T16:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cisos-know-your-enemy-an-industry-wise-look-at-major-bot-threats/</loc>
		<lastmod>2019-03-21T16:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-secure-the-cloud-simply-effectively-and-in-real-time/</loc>
		<lastmod>2019-03-21T16:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-look-at-cyber-security-spending-in-2019-where-budgets-are-increasing-and-why/</loc>
		<lastmod>2019-03-21T17:53:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/iam-vs-ciam-which-solution-is-right-for-you/</loc>
		<lastmod>2019-03-21T18:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nsa-software-can-help-secure-the-supply-chain/</loc>
		<lastmod>2019-03-21T18:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/must-see-webinar-real-time-phishing-threat-intelligence/</loc>
		<lastmod>2019-03-21T18:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/headquarters-of-police-federation-suffered-ransomware-infection/</loc>
		<lastmod>2019-03-21T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-rose-songers-the-overlooked-cyber-security-risk-3rd-party-risk-management/</loc>
		<lastmod>2019-03-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/0day-vulnerability-in-easy-wp-smtp-affects-thousands-of-sites/</loc>
		<lastmod>2019-03-21T19:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-limited-value-for-smes/</loc>
		<lastmod>2019-03-21T19:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/daniel-satoris-sysadmin-reality/</loc>
		<lastmod>2019-03-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/application-isolation-in-the-spotlight/</loc>
		<lastmod>2019-03-21T22:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/adaptive-mfa-using-analytics-and-artificial-intelligence/</loc>
		<lastmod>2019-03-21T22:55:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-password-security-fail/</loc>
		<lastmod>2019-03-21T23:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/zero-day-stored-xss-in-social-warfare/</loc>
		<lastmod>2019-03-22T01:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/simplifying-cybersecurity-for-the-water-sector-a-reminder-on-world-water-day/</loc>
		<lastmod>2019-03-22T07:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/best-practices-how-to-protect-yourself-from-the-enduring-scourge-of-malvertising/</loc>
		<lastmod>2019-03-22T07:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/north-carolinas-orange-county-hit-by-third-ransomware-attack-in-six-years/</loc>
		<lastmod>2019-03-22T08:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/behind-the-scenes-of-onion-services/</loc>
		<lastmod>2019-03-22T10:10:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/millions-of-facebook-passwords-kept-in-plain-text-for-employees-to-access/</loc>
		<lastmod>2019-03-22T11:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-improve-your-office-365-data-protection-and-threat-mitigation-strategies/</loc>
		<lastmod>2019-03-22T11:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/nc-county-government-suffers-third-ransomware-infection-in-6-years/</loc>
		<lastmod>2019-03-22T12:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsoft-announces-microsoft-defender-atp-for-mac-a-fully-automated-dna-data-storage-and-revived-office-assistant-clippy/</loc>
		<lastmod>2019-03-22T13:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securing-your-direct-internet-access-connections/</loc>
		<lastmod>2019-03-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-password-debacle-how-did-this-happen/</loc>
		<lastmod>2019-03-22T13:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fb-password-problem-new-mirai-and-more-avast/</loc>
		<lastmod>2019-03-22T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-business-world-in-the-clouds/</loc>
		<lastmod>2019-03-22T14:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-jerod-brennans-the-path-to-iam-maturity/</loc>
		<lastmod>2019-03-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securelink-named-a-march-2019-gartner-peer-insights-customers-choice-for-privileged-access-management/</loc>
		<lastmod>2019-03-22T15:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/group-policy-editor-6-ways-to-make-it-wayyy-more-powerful/</loc>
		<lastmod>2019-03-22T16:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsoft-fcc-inflating-broadband-availability/</loc>
		<lastmod>2019-03-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tripwire-patch-madness-the-challenge/</loc>
		<lastmod>2019-03-22T17:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-brendan-oconnors-assumed-breach-testing/</loc>
		<lastmod>2019-03-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-devops-can-teach-us-about-cybersecurity/</loc>
		<lastmod>2019-03-22T19:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/alleged-child-porn-lord-faces-us-extradition/</loc>
		<lastmod>2019-03-22T19:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/quiz-how-should-you-deploy-your-siem/</loc>
		<lastmod>2019-03-22T19:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/financial-services-how-to-minimize-vendor-risk-online-in-one-step/</loc>
		<lastmod>2019-03-22T20:19:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-google-trends-maps/</loc>
		<lastmod>2019-03-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-assumptions-dont-make-an-ass-of-u-and-me/</loc>
		<lastmod>2019-03-22T21:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rsa-2019-emerging-threats-zero-trust-devops-and-more-our-view/</loc>
		<lastmod>2019-03-22T22:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-risky-is-your-android-security-app-avast/</loc>
		<lastmod>2019-03-22T23:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/creating-a-more-diverse-cybersecurity-workforce/</loc>
		<lastmod>2019-03-23T00:14:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/an-inside-look-at-new-york-state-government-cybersecurity/</loc>
		<lastmod>2019-03-23T00:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-ingy-youssefs-api-security-tokens-flows-and-the-big-bad-wolf/</loc>
		<lastmod>2019-03-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-panama-canal/</loc>
		<lastmod>2019-03-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-sean-whalens-demystifying-dmarc-a-guide-to-preventing-email-spoofing/</loc>
		<lastmod>2019-03-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-columbus-2019-afternoon-keynote-featuring-craig-hoffman/</loc>
		<lastmod>2019-03-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/robert-m-lees-jeff-hass-little-bobby-comics-teaching/</loc>
		<lastmod>2019-03-24T18:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsides-san-francisco-2019-reed-lodens-opening-remarks/</loc>
		<lastmod>2019-03-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/security-requires-immutability-avoid-dynamic-environments-with-change-management/</loc>
		<lastmod>2019-03-25T03:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/verifications-io-data-breach-capsizing-a-ship-with-a-cyberattack-worlds-most-dangerous-malware/</loc>
		<lastmod>2019-03-25T04:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-passwords-exposed-android-q-privacy-microsoft-office-targeted/</loc>
		<lastmod>2019-03-25T04:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-college-admissions-scandal-dethroning-privilege-2/</loc>
		<lastmod>2019-03-25T10:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fema-improperly-shared-2-3-million-hurricane-survivors-pii-with-contractor/</loc>
		<lastmod>2019-03-25T11:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/consumers-increasingly-leery-of-companies-capitalizing-on-their-private-data/</loc>
		<lastmod>2019-03-25T12:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bss-dow-jones-turbotax-and-indane-data-breaches/</loc>
		<lastmod>2019-03-25T12:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-application-developers-need-to-know-about-tls-early-data-0rtt/</loc>
		<lastmod>2019-03-25T13:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyber-criminals-increasingly-attack-the-human-layer-when-targeting-businesses/</loc>
		<lastmod>2019-03-25T13:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-earn-comptia-security-continuing-education-ce-units/</loc>
		<lastmod>2019-03-25T13:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/overview-of-the-cyberseek-cybersecurity-career-pathway/</loc>
		<lastmod>2019-03-25T13:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/peeling-the-onion-security-onion-os/</loc>
		<lastmod>2019-03-25T13:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/hack-the-box-htb-machines-walkthrough-series-active/</loc>
		<lastmod>2019-03-25T13:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-the-state-of-data-security-in-apac-are-businesses-ready-for-their-transformation/</loc>
		<lastmod>2019-03-25T14:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/popular-family-tracking-app-exposed-real-time-location-data-onto-the-internet-no-password-required/</loc>
		<lastmod>2019-03-25T14:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/kuppingercole-analysts-names-cyberark-an-overall-privileged-access-management-leader/</loc>
		<lastmod>2019-03-25T14:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-pass-the-comptia-security-plus-sy0-501-exam/</loc>
		<lastmod>2019-03-25T14:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/understanding-key-management-policy-part-1/</loc>
		<lastmod>2019-03-25T14:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-anna-westelius-friend-or-replicant-how-attackers-automate-and-disguise-themselves/</loc>
		<lastmod>2019-03-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/web-based-application-security-part-1-open-redirection-vulnerability/</loc>
		<lastmod>2019-03-25T15:25:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-how-can-organizations-close-the-cyber-skills-gap/</loc>
		<lastmod>2019-03-25T16:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fcc-coughs-up-43000-for-hiding-net-neutrality-records/</loc>
		<lastmod>2019-03-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/proposing-state-privacy-legislation-amidst-national-privacy-law-discussions/</loc>
		<lastmod>2019-03-25T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-data-theorem-helps-inventory-sprawling-apis-as-the-first-step-to-securing-them/</loc>
		<lastmod>2019-03-25T17:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-sarah-youngs-how-to-lose-a-container-in-10-minutes/</loc>
		<lastmod>2019-03-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-choose-a-website-security-provider/</loc>
		<lastmod>2019-03-25T19:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/halting-the-lockergoga-ransomware/</loc>
		<lastmod>2019-03-25T20:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-new-robot/</loc>
		<lastmod>2019-03-25T21:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/where-next-for-smart-cities-2/</loc>
		<lastmod>2019-03-26T00:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ncipher-security-chief-strategy-officer-peter-galvin-on-the-instagram-phishing-campaign/</loc>
		<lastmod>2019-03-26T05:07:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/prediction-series-8-gdpr-breach-disclosure-mandate-is-now-global-must-be-timely/</loc>
		<lastmod>2019-03-26T05:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-does-a-vpn-work/</loc>
		<lastmod>2019-03-26T07:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cloud-computing-101-basic-types-and-business-advantages-of-cloud-delivered-services/</loc>
		<lastmod>2019-03-26T07:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/make-no-mistake-microsoft-is-a-security-company-now/</loc>
		<lastmod>2019-03-26T07:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-importance-of-information-security/</loc>
		<lastmod>2019-03-26T08:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/survey-geopolitical-issues-affect-how-two-thirds-of-cybersecurity-professionals-do-business/</loc>
		<lastmod>2019-03-26T08:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/abuse-of-hidden-well-known-directory-in-https-sites/</loc>
		<lastmod>2019-03-26T09:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/exploring-the-what-ifs-of-insider-security-threats/</loc>
		<lastmod>2019-03-26T09:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/misaligned-cybersecurity-policies-and-products-accentuate-the-talent-shortage/</loc>
		<lastmod>2019-03-26T11:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/lockergoga-ransomware-operators-set-sights-on-the-u-s/</loc>
		<lastmod>2019-03-26T11:09:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/asus-servers-hijacked-pushed-backdoor-malware-via-software-updates-potentially-affecting-over-a-million-users/</loc>
		<lastmod>2019-03-26T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/coding-error-could-enable-users-to-halt-lockergoga-ransomware/</loc>
		<lastmod>2019-03-26T12:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-best-protect-applications-in-the-cloud/</loc>
		<lastmod>2019-03-26T12:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/zero-trust-part-ii-the-evolution-of-trust-and-five-key-considerations/</loc>
		<lastmod>2019-03-26T13:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ddos-protection-requires-looking-both-ways/</loc>
		<lastmod>2019-03-26T13:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/oracle-java-license-change-everything-you-need-to-know/</loc>
		<lastmod>2019-03-26T13:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-five-most-startling-statistics-from-this-2019-global-survey-of-1200-cybersecurity-pros-infographic/</loc>
		<lastmod>2019-03-26T13:29:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/national-cybersecurity-education-to-limit-hackers-violation/</loc>
		<lastmod>2019-03-26T13:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/strong-authentication-vs-user-experience/</loc>
		<lastmod>2019-03-26T14:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/provably-secure-operating-systems/</loc>
		<lastmod>2019-03-26T14:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberseek-career-pathway-cybersecurity-specialist-technician-entry-level/</loc>
		<lastmod>2019-03-26T14:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/virtual-machine-introspection-in-malware-analysis-use-case/</loc>
		<lastmod>2019-03-26T14:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/video-inside-the-msrc-blue-team-bug-bounties-ir/</loc>
		<lastmod>2019-03-26T14:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-tips-for-smarter-detection-and-collection-of-digital-risks/</loc>
		<lastmod>2019-03-26T14:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-role-of-it-in-protecting-your-business/</loc>
		<lastmod>2019-03-26T15:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/if-youre-not-first-youre-last-risks-of-delaying-ccpa-compliance/</loc>
		<lastmod>2019-03-26T15:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-rachel-tobacs-the-path-to-infosec-is-not-always-linear/</loc>
		<lastmod>2019-03-26T15:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/avast-business-named-best-antivirus-2018-avast-business/</loc>
		<lastmod>2019-03-26T15:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/router-attacks-can-devastate-your-smart-home-avast/</loc>
		<lastmod>2019-03-26T15:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-to-expect-from-the-imminent-revisions-to-two-of-nists-most-popular-frameworks/</loc>
		<lastmod>2019-03-26T15:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rome-was-not-built-in-a-day-but-widgetcard-was/</loc>
		<lastmod>2019-03-26T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/change-configuration-management-waves-revolutionizing-cybersecurity/</loc>
		<lastmod>2019-03-26T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mind-the-gap-automate-compliance-gap-assessments-to-drive-security/</loc>
		<lastmod>2019-03-26T16:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-airbnb-clears-up-a-few-things/</loc>
		<lastmod>2019-03-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-and-private-communications-a-matter-of-incompatibility/</loc>
		<lastmod>2019-03-26T17:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-james-condons-all-your-containers-are-belong-to-us/</loc>
		<lastmod>2019-03-26T19:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/new-tech-cequence-security-deploys-defense-against-botnets-assault-on-business-logic/</loc>
		<lastmod>2019-03-26T20:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ma-cyber-diligence-talent-shortages-and-the-challenges-facing-cisos-podcast/</loc>
		<lastmod>2019-03-26T20:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/medtronic-defibs-flaws-dhs-issues-alert/</loc>
		<lastmod>2019-03-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/paving-your-way-through-sap-digital-transformation/</loc>
		<lastmod>2019-03-26T21:13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/seven-social-media-scams-to-avoid-avast/</loc>
		<lastmod>2019-03-26T21:38:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/stored-xss-patched-in-wordpress-5-1-1/</loc>
		<lastmod>2019-03-26T22:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/2019-ncaa-madness-phishing-and-streaming-scams-2/</loc>
		<lastmod>2019-03-26T22:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/understanding-microsofts-oauth2-implementation-part-1-endpoints-and-application-types/</loc>
		<lastmod>2019-03-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/microsofts-oauth2-endpoints-and-application-types-2/</loc>
		<lastmod>2019-03-27T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/global-encryption-trends-study-2019-the-biggest-year-yet/</loc>
		<lastmod>2019-03-27T05:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-machine-learning-for-cybersecurity-can-thwart-insider-threats/</loc>
		<lastmod>2019-03-27T08:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/march-madness-and-distracted-employees-bracket-busted/</loc>
		<lastmod>2019-03-27T08:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/washington-d-c-takes-a-leaf-from-gdpr-book-introduces-new-data-privacy-bill/</loc>
		<lastmod>2019-03-27T10:34:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-ftc-issues-orders-to-7-broadband-companies-to-analyze-isp-privacy-practices-given-they-are-also-ad-support-content-platforms/</loc>
		<lastmod>2019-03-27T10:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/identity-and-access-management-on-the-rise-as-environments-grow-in-complexity/</loc>
		<lastmod>2019-03-27T12:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securing-marketo/</loc>
		<lastmod>2019-03-27T13:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/himss-conference-adding-an-s-for-security/</loc>
		<lastmod>2019-03-27T13:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/powershell-for-pentesters-part-5-remoting-with-powershell/</loc>
		<lastmod>2019-03-27T14:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/information-collection-in-cybersecurity/</loc>
		<lastmod>2019-03-27T14:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyberseek-career-pathway-cyber-crime-analyst-investigator-entry-level-position/</loc>
		<lastmod>2019-03-27T14:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/popular-web-browsers-hidden-ability-threatens-500m-google-play-users/</loc>
		<lastmod>2019-03-27T14:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/is-it-legal-to-evaluate-a-ddos-mitigation-service/</loc>
		<lastmod>2019-03-27T15:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-ivan-novikovs-bye-bye-false-positives-using-ai-to-improve-detection/</loc>
		<lastmod>2019-03-27T15:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/asus-pushes-out-urgent-security-update-after-attackers-hacked-its-automatic-live-update-tool/</loc>
		<lastmod>2019-03-27T15:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/kubernetes-security-best-practices-to-protect-your-cloud-containers/</loc>
		<lastmod>2019-03-27T15:55:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-cyber-physical-convergence-is-accelerating-and-so-are-the-risks/</loc>
		<lastmod>2019-03-27T16:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/scaling-the-service-desk/</loc>
		<lastmod>2019-03-27T16:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/wordpress-giribaz-file-manager-vulnerability-actively-exploited-in-the-wild/</loc>
		<lastmod>2019-03-27T16:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/acm-presents-2018-acm-a-m-turing-award-to-deep-learning-pioneers/</loc>
		<lastmod>2019-03-27T17:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/could-facebook-have-prevented-storing-sensitive-data-in-application-logs/</loc>
		<lastmod>2019-03-27T17:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cipher-named-2019-top-100-security-provider-by-crn/</loc>
		<lastmod>2019-03-27T17:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/getting-to-know-the-new-rsac-advisory-board-members-narelle-devine/</loc>
		<lastmod>2019-03-27T17:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/spotlight-on-ai-expert-deepali-garg-avast/</loc>
		<lastmod>2019-03-27T18:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-sacha-fausts-lyft-cartography-automating-security-visibility-and-democratization/</loc>
		<lastmod>2019-03-27T19:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/proposed-texas-bill-would-regulate-vendor-contracts/</loc>
		<lastmod>2019-03-27T20:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/luke-kingma-and-lou-patrick-mackays-futurism-gold-record/</loc>
		<lastmod>2019-03-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ftc-orders-isps-to-disclose-data-practices-avast/</loc>
		<lastmod>2019-03-27T23:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/why-your-incident-response-plan-wont-save-you/</loc>
		<lastmod>2019-03-28T01:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/feature-release-19-1-gcp-billing-visibility-and-more/</loc>
		<lastmod>2019-03-28T02:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/programmers-who-dont-understand-security-are-poor-at-security/</loc>
		<lastmod>2019-03-28T09:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/heres-how-net-neutrality-wearable-devices-can-impact-5g/</loc>
		<lastmod>2019-03-28T09:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-hit-garage-used-by-canadian-internet-registration-authority/</loc>
		<lastmod>2019-03-28T11:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/malware-installed-in-asus-computers-through-hacked-update-process/</loc>
		<lastmod>2019-03-28T11:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/fuzzing-in-the-year-2000/</loc>
		<lastmod>2019-03-28T11:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-blitzkrieg-has-already-cost-norsk-hydro-40-million/</loc>
		<lastmod>2019-03-28T11:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/dissect-cyber-wins-major-dhs-st-award-for-their-bec-work/</loc>
		<lastmod>2019-03-28T12:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/legacy-grc-and-the-sunk-cost-fallacy/</loc>
		<lastmod>2019-03-28T12:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/operation-code-and-sam-bisbee-talk-about-getting-started-in-security/</loc>
		<lastmod>2019-03-28T13:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-dangers-of-rolling-your-own-encryption/</loc>
		<lastmod>2019-03-28T13:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/knowledge-management-in-cybersecurity/</loc>
		<lastmod>2019-03-28T13:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/office-depot-fined-millions-for-tricking-customers-into-believing-their-pcs-were-infected-with-malware/</loc>
		<lastmod>2019-03-28T13:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/data-privacy-protection-requires-extra-regulation/</loc>
		<lastmod>2019-03-28T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/mdr-for-the-smb-a-ceos-perspective/</loc>
		<lastmod>2019-03-28T14:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-better-implement-secure-apis-in-an-open-banking-partnership-part-two/</loc>
		<lastmod>2019-03-28T14:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-clint-giblers-devsecops-state-of-the-union/</loc>
		<lastmod>2019-03-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/detect-business-logic-vulnerabilities-during-development-with-shiftleft-ocular/</loc>
		<lastmod>2019-03-28T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/remote-code-execution-in-blogengine-net/</loc>
		<lastmod>2019-03-28T15:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/enhance-imperva-cloud-waf-with-a-new-management-tool-in-the-imperva-github/</loc>
		<lastmod>2019-03-28T15:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-transformation-of-talent-technology/</loc>
		<lastmod>2019-03-28T15:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/speed-up-incident-investigation-and-resolution-with-network-traffic-analytics/</loc>
		<lastmod>2019-03-28T15:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/sql-injection-in-magento-core/</loc>
		<lastmod>2019-03-28T16:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/march-2019-update-for-netsparker-standard/</loc>
		<lastmod>2019-03-28T16:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/you-need-to-know-how-cybersecurity-affects-mergers-and-acquisitions/</loc>
		<lastmod>2019-03-28T16:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-1921-fact-checker/</loc>
		<lastmod>2019-03-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-protect-sensitive-data-by-managing-your-risk/</loc>
		<lastmod>2019-03-28T17:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/rethinking-your-approach-to-your-enterprise-directory/</loc>
		<lastmod>2019-03-28T17:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/avtex-engage-2019/</loc>
		<lastmod>2019-03-28T17:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-safe-harbor-for-hackers/</loc>
		<lastmod>2019-03-28T17:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/5-keys-to-securing-business-critical-applications-in-an-age-of-digital-transformation-keeping-your-organization-running-at-the-speed-of-business/</loc>
		<lastmod>2019-03-28T17:45:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/protecting-communication-within-the-smart-factory-and-to-the-cloud-infineon-presents-the-worlds-first-tpm-2-0-for-industry-4-0/</loc>
		<lastmod>2019-03-28T18:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/my-take-why-ddos-weapons-will-proliferate-with-the-expansion-of-iot-and-the-coming-of-5g/</loc>
		<lastmod>2019-03-28T18:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-david-scrobonias-hacking-with-a-heads-up-display/</loc>
		<lastmod>2019-03-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/exploiting-browser-extensions-to-compromise-corporate-networks-why-it-teams-need-real-time-protection/</loc>
		<lastmod>2019-03-28T19:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securing-the-internet-of-the-body/</loc>
		<lastmod>2019-03-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/webinar-getting-started-in-digital-forensics/</loc>
		<lastmod>2019-03-28T21:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-zombie-poodle/</loc>
		<lastmod>2019-03-29T01:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-cbc-padding-oracles-in-2019/</loc>
		<lastmod>2019-03-29T01:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-is-goldendoodle-attack/</loc>
		<lastmod>2019-03-29T01:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/making-sense-of-the-california-privacy-law-requirements/</loc>
		<lastmod>2019-03-29T04:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-world-backup-day-means-to-ncipher-security/</loc>
		<lastmod>2019-03-29T05:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/g-suite-security-five-mistakes-every-admin-should-avoid/</loc>
		<lastmod>2019-03-29T06:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/qa-how-cybersecurity-has-become-a-primal-battleground-for-ai-one-upsmanship/</loc>
		<lastmod>2019-03-29T08:11:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/paranoid-or-rightfully-concerned-61-of-cisos-think-staff-leak-data-intentionally/</loc>
		<lastmod>2019-03-29T09:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-introduces-new-2-step-verification-options-for-g-suite-accounts/</loc>
		<lastmod>2019-03-29T11:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/two-decades-later-ex-nsa-contractor-pleads-guilty-to-stealing-classified-data/</loc>
		<lastmod>2019-03-29T12:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-march-madness-can-teach-us-about-handling-a-data-security-breach/</loc>
		<lastmod>2019-03-29T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/turning-data-into-metrics-a-vulnerability-management-story/</loc>
		<lastmod>2019-03-29T14:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/facebook-determined-to-appeal-belgian-tracking-ban/</loc>
		<lastmod>2019-03-29T14:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-caroline-wongs-self-care-for-security-professionals/</loc>
		<lastmod>2019-03-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-attackers-turn-to-google-ads-after-dream-market-take-down/</loc>
		<lastmod>2019-03-29T15:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-operations-protects-your-business/</loc>
		<lastmod>2019-03-29T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-joy-of-tech-apple-tv-has-a-critic/</loc>
		<lastmod>2019-03-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/the-cyber-skills-shortage-continues-to-balloon-and-think-tanks-arent-helping/</loc>
		<lastmod>2019-03-29T17:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bromium-at-infosec-world-april-1-3-2019/</loc>
		<lastmod>2019-03-29T17:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-to-expect-from-next-our-top-5-googlenext/</loc>
		<lastmod>2019-03-29T17:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/google-chrome-group-policy-5-settings-users-will-love/</loc>
		<lastmod>2019-03-29T17:36:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/speaking-at-gartner-security-summit-2019/</loc>
		<lastmod>2019-03-29T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/o-t-cyber-security-accelerated/</loc>
		<lastmod>2019-03-29T18:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-ubani-baloguns-back-to-the-socless-future/</loc>
		<lastmod>2019-03-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/a-month-after-2-million-customer-cards-sold-online-buca-di-beppo-parent-admits-breach/</loc>
		<lastmod>2019-03-29T19:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/stealing-kids-data-and-more-security-news-avast/</loc>
		<lastmod>2019-03-29T20:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/office-depot-support-com-cough-up-35000000-ftc-smackdown-of-scammer-corporations/</loc>
		<lastmod>2019-03-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/man-behind-fatal-swatting-gets-20-years/</loc>
		<lastmod>2019-03-29T22:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/scammer-steals-over-a-million-from-google-and-fb-avast/</loc>
		<lastmod>2019-03-29T23:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-jerry-gamblins-jonathan-crans-automating-web-application-bug-hunting/</loc>
		<lastmod>2019-03-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/xkcd-industry-nicknames/</loc>
		<lastmod>2019-03-30T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-josh-liburdis-beyond-av-detection-oriented-file-analysis/</loc>
		<lastmod>2019-03-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/prediction-series-9-hackers-continue-spending-weeks-months-of-dwell-time-in-networks/</loc>
		<lastmod>2019-03-31T04:55:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/annual-protest-raises-250k-to-cure-krebs/</loc>
		<lastmod>2019-03-31T08:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/password-checkup-from-0-to-650-000-users-in-20-days/</loc>
		<lastmod>2019-03-31T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-reed-lodens-opening-remarks/</loc>
		<lastmod>2019-03-31T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/robert-m-lees-jeff-hass-little-bobby-comics-building/</loc>
		<lastmod>2019-03-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-attacks-becoming-are-more-widespread-destructive-and-expensive/</loc>
		<lastmod>2019-03-31T17:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bens-book-of-the-month-review-of-secure-cloud-transformation-the-cios-journey/</loc>
		<lastmod>2019-03-31T18:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/bsidessf-2019-dylan-ayreys-christian-frichots-offensive-javascript-techniques-for-red-teamers/</loc>
		<lastmod>2019-03-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ftc-shutters-four-robocalling-services-that-made-billions-of-calls-in-2018/</loc>
		<lastmod>2019-03-31T19:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tripwire-patch-priority-index-for-march-2019/</loc>
		<lastmod>2019-04-01T03:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/apple-card-asus-live-update-backdoor-statistics-on-malware-attacks/</loc>
		<lastmod>2019-04-01T04:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/manage-cybersecurity-efforts-to-mitigate-your-enterprise-risks-not-to-established-controls/</loc>
		<lastmod>2019-04-01T09:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-5-cybersecurity-myth-to-leave-behind-in-2018/</loc>
		<lastmod>2019-04-01T09:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/jeff-bezos-phone-allegedly-hacked-by-saudi-arabia-for-link-to-washington-post-jamal-khashoggi/</loc>
		<lastmod>2019-04-01T11:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/performing-concolic-execution-on-cryptographic-primitives/</loc>
		<lastmod>2019-04-01T11:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/typo3-overtakes-wordpress-as-most-attacked-cms-due-to-popularity/</loc>
		<lastmod>2019-04-01T13:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyber-seek-career-path-cybersecurity-analyst/</loc>
		<lastmod>2019-04-01T13:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hcispp-or-cissp-whats-the-difference-and-which-is-best-for-you/</loc>
		<lastmod>2019-04-01T13:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gemaltos-channel-program-receives-a-5-star-rating-in-crns-2019-partner-program-guide/</loc>
		<lastmod>2019-04-01T14:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/imperva-wins-crn-5-star-partner-program-3rd-year-in-a-row-here-are-some-stats-behind-why/</loc>
		<lastmod>2019-04-01T14:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/italian-android-spyware-infected-google-play-store-for-years-researchers-find/</loc>
		<lastmod>2019-04-01T14:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/meet-frankie-keyes-the-most-trusted-expert-in-cybersecurity/</loc>
		<lastmod>2019-04-01T14:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/recovering-smartphone-typing-from-microphone-sounds/</loc>
		<lastmod>2019-04-01T14:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-ido-solomons-adi-ikans-stealing-windows-credentials-via-pdf-files/</loc>
		<lastmod>2019-04-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dns-attack-on-yandex-can-it-happen-to-you/</loc>
		<lastmod>2019-04-01T15:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybercriminals-fall-for-iot-honeypots-avast/</loc>
		<lastmod>2019-04-01T15:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-elearning-learner-levels-streamline-verified-progress/</loc>
		<lastmod>2019-04-01T15:47:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cisco-merely-blacklisted-a-curl-instead-of-actually-fixing-the-vulnerable-code-for-rv320-and-rv325/</loc>
		<lastmod>2019-04-01T16:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-firefox-browser-to-feature-anti-fingerprinting-capabilities/</loc>
		<lastmod>2019-04-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/we-take-security-seriously-and-other-trite-statements/</loc>
		<lastmod>2019-04-01T17:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-good-is-a-backup-if-you-cant-restore/</loc>
		<lastmod>2019-04-01T18:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/comptia-a-exam-changes-900-vs-1000-series/</loc>
		<lastmod>2019-04-01T18:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-ryan-chapmans-implementing-a-kick-butt-training-program-blue-team-go/</loc>
		<lastmod>2019-04-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/do-user-their-own-products/</loc>
		<lastmod>2019-04-01T19:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/local-policy-updates-keep-your-functions-secure-anywhere-even-in-a-closed-vpc/</loc>
		<lastmod>2019-04-01T19:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/best-practices-for-automation-in-cyber-security/</loc>
		<lastmod>2019-04-01T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-the-dark-web-and-why-should-you-care/</loc>
		<lastmod>2019-04-01T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sifting-through-the-hype-of-artificial-intelligence-and-machine-learning/</loc>
		<lastmod>2019-04-01T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/jeff-man-chats-about-his-nsa-origin-story-and-the-state-of-cybersecurity-today/</loc>
		<lastmod>2019-04-01T22:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/biometric-hacking/</loc>
		<lastmod>2019-04-01T22:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/close-to-one-billion-peoples-emails-leaked-in-one-of-the-biggest-hacking-scandals-ever-2/</loc>
		<lastmod>2019-04-01T22:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-the-real-reasons-airpower-was-cancelled/</loc>
		<lastmod>2019-04-01T23:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/erp-breaches-considered-serious-and-catastrophic/</loc>
		<lastmod>2019-04-01T23:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/using-machine-learning-to-reduce-false-positives/</loc>
		<lastmod>2019-04-01T23:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/if-the-data-breach-doesnt-kill-your-business-the-fine-might/</loc>
		<lastmod>2019-04-02T03:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-christopher-anastasios-abusing-wcf-endpoint-for-rce-and-privilege-escalation/</loc>
		<lastmod>2019-04-02T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/day-1-leadership-in-digital-security/</loc>
		<lastmod>2019-04-02T07:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/leadership-in-digital-security/</loc>
		<lastmod>2019-04-02T07:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/myth-busting-why-risk-assessments-shouldnt-be-a-one-time-thing/</loc>
		<lastmod>2019-04-02T07:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/post-brexit-cybersecurity-implications-on-risk-and-uncertainty/</loc>
		<lastmod>2019-04-02T08:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/vulnerability-management-metrics-the-final-frontier/</loc>
		<lastmod>2019-04-02T09:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/swimlane-runner-up-in-microsoft-graph-security-hackathon-2/</loc>
		<lastmod>2019-04-02T09:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/our-microsoft-graph-security-hackathon-submission/</loc>
		<lastmod>2019-04-02T09:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-a-zero-day-attack/</loc>
		<lastmod>2019-04-02T09:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/stark-disconnect-between-strategy-and-execution-as-companies-fail-to-prioritize-protecting-business-critical-apps/</loc>
		<lastmod>2019-04-02T09:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-latest-march-event-roundup/</loc>
		<lastmod>2019-04-02T10:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ransomware-forces-michigan-medical-practice-to-close-shop/</loc>
		<lastmod>2019-04-02T10:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/twitter-mystery-followers-garbot/</loc>
		<lastmod>2019-04-02T10:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/three-triggers-telling-you-its-time-to-reconsider-your-network-security-strategy/</loc>
		<lastmod>2019-04-02T11:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacking-instagram-to-get-free-meals-in-exchange-for-positive-reviews/</loc>
		<lastmod>2019-04-02T11:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/malware-actors-using-new-file-hosting-service-to-launch-attacks/</loc>
		<lastmod>2019-04-02T11:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-many-web-applications-does-your-organization-have-its-more-than-you-think/</loc>
		<lastmod>2019-04-02T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/jenkins-credentials-management-red-vs-blue-2/</loc>
		<lastmod>2019-04-02T14:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/your-guide-to-aws-reinforce-2019/</loc>
		<lastmod>2019-04-02T13:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fighting-the-war-at-home-how-your-employees-are-your-greatest-asset-in-the-battle-against-data-loss-2/</loc>
		<lastmod>2019-04-02T14:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/application-security-is-vital-throughout-sdlc/</loc>
		<lastmod>2019-04-02T14:01:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ca-veracode-dynamic-analysis-reduce-the-risk-of-a-breach/</loc>
		<lastmod>2019-04-02T14:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-reasons-why-your-small-business-should-outsource-it/</loc>
		<lastmod>2019-04-02T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/canadian-police-raid-orcus-rat-author/</loc>
		<lastmod>2019-04-02T14:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-keeps-cmos-up-at-night-in-a-data-driven-world/</loc>
		<lastmod>2019-04-02T14:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/understanding-jvm-soft-references-for-great-good-and-building-a-cache/</loc>
		<lastmod>2019-04-02T15:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-risks-in-education-have-snowballed/</loc>
		<lastmod>2019-04-02T15:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-nuclear-industry-and-communication-lessons-from-three-mile-island/</loc>
		<lastmod>2019-04-02T15:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/carbon-black-report-indicates-industries-most-targeted-for-cyber-attack/</loc>
		<lastmod>2019-04-02T16:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/coding-bootcamps-need-to-get-real-about-secure-coding-practices/</loc>
		<lastmod>2019-04-02T16:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyberseek-career-path-cybersecurity-consultant/</loc>
		<lastmod>2019-04-02T16:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/effective-steps-to-reduce-third-party-risk/</loc>
		<lastmod>2019-04-02T16:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/implementing-ssl-inspection/</loc>
		<lastmod>2019-04-02T16:48:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tracking-illegal-terrorist-funding-campaigns-via-cryptographic-currencies-tools/</loc>
		<lastmod>2019-04-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-10-tools-for-continuous-monitoring/</loc>
		<lastmod>2019-04-02T17:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/scareware-underscores-the-need-for-real-time-phishing-threat-intelligence/</loc>
		<lastmod>2019-04-02T17:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-john-stoners-dont-boil-the-ocean-using-mitre-attck-to-guide-hunting-activity/</loc>
		<lastmod>2019-04-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-security-matters-for-oracle-ebs/</loc>
		<lastmod>2019-04-02T20:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/daniel-storis-depressed-developer-43-in-bedtime-story/</loc>
		<lastmod>2019-04-02T22:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/digital-disinformation-runs-rampant-avast/</loc>
		<lastmod>2019-04-03T01:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/malware-campaigns-sharing-network-resources-r00ts-ninja/</loc>
		<lastmod>2019-04-03T02:13:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/are-the-robots-getting-better-at-image-recognition/</loc>
		<lastmod>2019-04-03T03:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/repost-the-pki-guy-explores-data-encryption-with-cindy-provin-of-ncipher-security/</loc>
		<lastmod>2019-04-03T06:35:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/netsparker-5-3-scan-performance-upgrades/</loc>
		<lastmod>2019-04-03T07:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/what-are-the-benefits-of-security-awareness-training-for-organizations-2/</loc>
		<lastmod>2019-04-03T07:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-skills-and-qualifications-incident-response-professionals-need-to-be-successful/</loc>
		<lastmod>2019-04-03T09:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-strikes-again-now-asks-new-subscribers-for-passwords-to-their-email-accounts/</loc>
		<lastmod>2019-04-03T10:19:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/are-connected-cows-a-hackers-dream/</loc>
		<lastmod>2019-04-03T10:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wicked-fast-accurate-quantiles-using-t-digests-in-r-with-the-tdigest-package/</loc>
		<lastmod>2019-04-03T11:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/social-engineer-newsletter-vol-09-issue-115/</loc>
		<lastmod>2019-04-03T11:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/georgia-tech-data-breach-potentially-exposed-1-3m-users-personal-data/</loc>
		<lastmod>2019-04-03T12:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/prying-eyes-inside-the-enterprise-bitglass-insider-threat-report/</loc>
		<lastmod>2019-04-03T12:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-prevent-cryptojacking-in-universities/</loc>
		<lastmod>2019-04-03T13:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/woman-concealing-malware-lied-her-way-into-trumps-florida-club/</loc>
		<lastmod>2019-04-03T13:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/changes-to-cisa-job-practice-areas/</loc>
		<lastmod>2019-04-03T13:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-use-cyberseek-become-a-penetration-vulnerability-tester/</loc>
		<lastmod>2019-04-03T13:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/peoplesoft-now-and-then/</loc>
		<lastmod>2019-04-03T14:18:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/not-just-for-processing-how-kafka-streams-as-a-distributed-database-boosted-our-reliability-and-reduced-maintenance/</loc>
		<lastmod>2019-04-03T14:28:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-emanuele-cesenas-deploying-two-factor-authentication-to-millions-of-users/</loc>
		<lastmod>2019-04-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/business-email-compromise-attacks-increase-by-nearly-500/</loc>
		<lastmod>2019-04-03T15:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/iot-cybersecurity-and-lawsuits-by-ijay-palansky/</loc>
		<lastmod>2019-04-03T15:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/troubleshooting-its-2019-are-you-still-blaming-the-firewall-admin/</loc>
		<lastmod>2019-04-03T16:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/best-practices-rising-complexities-of-provisioning-identities-has-pushed-iga-to-the-fore/</loc>
		<lastmod>2019-04-03T16:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-manage-web-application-security-with-coverity/</loc>
		<lastmod>2019-04-03T16:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/apparently-there-is-no-longer-clear-and-present-danger/</loc>
		<lastmod>2019-04-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-social-engineering-behind-operation-sharpshooter-rising-sun/</loc>
		<lastmod>2019-04-03T17:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/utah-enacts-new-restrictions-on-law-enforcement-access-to-users-data/</loc>
		<lastmod>2019-04-03T18:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-salesforce-admins-must-be-part-of-business-continuity-planning/</loc>
		<lastmod>2019-04-03T18:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-maya-kaczorowskis-dan-lorencs-you-might-still-need-patches-for-denim/</loc>
		<lastmod>2019-04-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/implementing-a-self-service-portal/</loc>
		<lastmod>2019-04-03T19:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-percentage-styles/</loc>
		<lastmod>2019-04-03T21:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyber-security-roundup-for-march-2019/</loc>
		<lastmod>2019-04-03T22:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/ransomware-attacks-becoming-more-widespread-destructive-expensive/</loc>
		<lastmod>2019-04-03T22:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-security-objectives-for-cdm-compliance/</loc>
		<lastmod>2019-04-03T22:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-takeaways-from-troopers-conference-2019/</loc>
		<lastmod>2019-04-03T22:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/using-swimlane-for-endpoint-detection-and-response/</loc>
		<lastmod>2019-04-04T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-tech-cloudknox-takes-aim-at-securing-identity-privileges-for-humans-and-non-humans/</loc>
		<lastmod>2019-04-04T00:15:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/540m-facebook-records-exposed-on-amazon-servers-avast/</loc>
		<lastmod>2019-04-04T01:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/planet-hollywood-owner-hit-by-data-breach-avast/</loc>
		<lastmod>2019-04-04T01:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/3-stages-to-mounting-a-modern-malware-defense-program/</loc>
		<lastmod>2019-04-04T03:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-exposes-540-million-user-records/</loc>
		<lastmod>2019-04-04T04:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-value-of-hsms-as-a-service-why-organizations-are-moving-to-hsms-as-a-service/</loc>
		<lastmod>2019-04-04T05:33:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/whats-it-like-to-be-a-help-desk-manager/</loc>
		<lastmod>2019-04-04T08:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/are-you-ready-for-a-career-in-cybersecurity/</loc>
		<lastmod>2019-04-04T08:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/introduction-to-penetration-testing/</loc>
		<lastmod>2019-04-04T08:49:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/penetration-testing-of-an-aws-based-application-what-you-need-to-know/</loc>
		<lastmod>2019-04-04T08:50:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/healthcare-industry-remains-cybersecurity-laggard/</loc>
		<lastmod>2019-04-04T08:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/mapping-out-a-malware-distribution-network/</loc>
		<lastmod>2019-04-04T09:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/application-sla-knowing-is-half-the-battle-2/</loc>
		<lastmod>2019-04-04T10:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/windows-10-admx-4-tips-for-super-awesome-settings/</loc>
		<lastmod>2019-04-04T11:12:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bayer-reveals-its-detection-and-containment-of-digital-attack/</loc>
		<lastmod>2019-04-04T11:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/elite-us-universities-including-mit-and-stanford-break-off-partnerships-with-huawei-and-zte-amidst-investigations-in-the-us/</loc>
		<lastmod>2019-04-04T11:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/adversarial-machine-learning-against-teslas-autopilot/</loc>
		<lastmod>2019-04-04T11:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-new-leader-in-data-protection/</loc>
		<lastmod>2019-04-04T11:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-things-to-consider-for-your-ics-security-proof-of-concept/</loc>
		<lastmod>2019-04-04T11:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hack-the-box-htb-machines-walkthrough-series-grandpa/</loc>
		<lastmod>2019-04-04T13:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/pmp%ef%b8%8f-study-resources/</loc>
		<lastmod>2019-04-04T13:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/unsecured-databases-found-leaking-half-a-billion-resumes-on-the-net/</loc>
		<lastmod>2019-04-04T13:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cisos-latest-dilemma-how-to-make-the-most-out-of-your-endpoint-security-solutions-with-understaffed-teams/</loc>
		<lastmod>2019-04-04T13:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/georgia-tech-suffers-second-data-breach-exposing-data-of-1-3-million-people/</loc>
		<lastmod>2019-04-04T14:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-musings-super-villains-are-they-really-that-super-by-raj-samani/</loc>
		<lastmod>2019-04-04T14:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-new-era-for-data-protection/</loc>
		<lastmod>2019-04-04T14:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-david-m-n-bryans-goldilocks-and-the-three-atm-attacks/</loc>
		<lastmod>2019-04-04T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-professionals-experience-no-gender/</loc>
		<lastmod>2019-04-04T15:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ceos-do-you-know-where-that-infosec-report-came-from/</loc>
		<lastmod>2019-04-04T15:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/announcing-the-deobfuscating-javascript-white-paper/</loc>
		<lastmod>2019-04-04T15:35:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gdpr-breach-notification-by-country-59000-incidents-reported-2/</loc>
		<lastmod>2019-04-04T16:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/experts-talk-application-security-at-rsa/</loc>
		<lastmod>2019-04-04T16:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-deathknell-of-facebook-nope-nothing-to-see-here-except-another-540-million-users-exposed/</loc>
		<lastmod>2019-04-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-fedramp-criticism-fair/</loc>
		<lastmod>2019-04-04T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-evolution-of-application-security-in-the-serverless-world/</loc>
		<lastmod>2019-04-04T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/internal-audit-and-it-joining-the-same-cybersecurity-team/</loc>
		<lastmod>2019-04-04T18:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-hackers-like-targeting-the-terminally-ill/</loc>
		<lastmod>2019-04-04T18:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-joakim-kennedys-a-deep-dive-into-go-malware-using-metadata-to-empower-the-analyst/</loc>
		<lastmod>2019-04-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/apache-server-bug-coughs-up-root/</loc>
		<lastmod>2019-04-04T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-zuckerbergs-joke-on-us/</loc>
		<lastmod>2019-04-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-evolution-of-phishing-kits/</loc>
		<lastmod>2019-04-04T21:27:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-identify-an-online-scam-avast/</loc>
		<lastmod>2019-04-04T21:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/phishing-attacks-are-prevalent-during-march-madness/</loc>
		<lastmod>2019-04-04T22:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/alleged-chief-of-romanian-atm-skimming-gang-arrested-in-mexico/</loc>
		<lastmod>2019-04-04T22:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/will-the-next-war-be-cyber/</loc>
		<lastmod>2019-04-05T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/vulnerability-management-myths-misconceptions-and-mitigating-risk/</loc>
		<lastmod>2019-04-05T03:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/senator-elizabeth-warren-proposes-holding-negligent-executives-criminally-liable-for-data-breaches/</loc>
		<lastmod>2019-04-05T07:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-political-campaigns-use-personal-data/</loc>
		<lastmod>2019-04-05T07:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/norsk-hydro-shares-a-4-minute-video-on-how-its-employees-stood-up-for-the-firm-post-an-extensive-cyberattack/</loc>
		<lastmod>2019-04-05T12:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/malware-hiding-in-got-torrents-avast/</loc>
		<lastmod>2019-04-05T13:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/scientists-advance-quantum-key-distribution-tech-to-strengthen-cyber-security/</loc>
		<lastmod>2019-04-05T13:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/join-us-for-cocktails-during-iapp/</loc>
		<lastmod>2019-04-05T14:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-melanie-mastersons-how-to-orchestrate-a-cyber-security-incident-tabletop-exercise/</loc>
		<lastmod>2019-04-05T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-the-massachusetts-data-breach-notification-law-and-how-should-you-prepare-for-it/</loc>
		<lastmod>2019-04-05T15:14:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/my-take-how-casbs-are-evolving-to-close-the-security-gaps-arising-from-digital-transformation/</loc>
		<lastmod>2019-04-05T15:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ladies-and-gentlemen-let-the-throttling-and-blockage-commence/</loc>
		<lastmod>2019-04-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-cybersecurity-workforce-shortage-is-a-big-problem-you-can-help-girl-scouts-solve-it/</loc>
		<lastmod>2019-04-05T17:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-deeper-look-at-gartners-hype-cycle-for-application-security/</loc>
		<lastmod>2019-04-05T17:45:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-jerry-gamblins-how-to-build-an-application-security-program/</loc>
		<lastmod>2019-04-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trusted-computing-enters-new-frontiers/</loc>
		<lastmod>2019-04-05T19:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-eu-cookie-consent-recommendation-from-advocate-general/</loc>
		<lastmod>2019-04-05T20:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/akamais-adaptive-media-player-advances-for-nab-2019-adding-header-bidding-and-ultra-low-latency/</loc>
		<lastmod>2019-04-05T20:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gobrut-botnet-elf-variant-and-new-c2-discovered/</loc>
		<lastmod>2019-04-05T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-eht-black-hole-picture/</loc>
		<lastmod>2019-04-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/zero-trust-is-a-pipe-dream/</loc>
		<lastmod>2019-04-05T21:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-other-security-chasm/</loc>
		<lastmod>2019-04-05T22:24:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sql-injection-in-duplicate-page-wordpress-plugin/</loc>
		<lastmod>2019-04-05T22:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-moses-schwartzs-security-automation-simplified/</loc>
		<lastmod>2019-04-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/no-tel-mo-tel-motel-6-settles-state-of-washington-lawsuit-with-12000000-payment/</loc>
		<lastmod>2019-04-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-simon-roses-femerlings-conquer-the-enterprise-from-inside/</loc>
		<lastmod>2019-04-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/luke-kingma-and-lou-patrick-mackays-futurism-who-the-hell-are-you/</loc>
		<lastmod>2019-04-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/making-our-security-portfolio-simpler-and-better/</loc>
		<lastmod>2019-04-07T08:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/expanding-the-puresec-api-secure-your-functions-programmatically/</loc>
		<lastmod>2019-04-07T10:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-sarah-harveys-anti-privacy-anti-patterns/</loc>
		<lastmod>2019-04-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-limited-but-functional-couchbase-free-text-search-retrieval-un-package-or-how-i-abused-couchbase-r-to-perform-bulk-ip-whois-full-text-searches-a-cobblers-tale/</loc>
		<lastmod>2019-04-07T15:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robert-m-lees-jeff-hass-little-bobby-comics-big-words/</loc>
		<lastmod>2019-04-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/digital-identity-management-and-communications-services/</loc>
		<lastmod>2019-04-07T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-panel-justin-calmus-rachel-black-vivienne-pustell-niru-ragupathy-kyle-tobener-wendy-zenone-vendor-security-where-our-data-goes-we-follow/</loc>
		<lastmod>2019-04-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebooks-bad-week-stalkerware-tax-season-scams/</loc>
		<lastmod>2019-04-08T04:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-evade-detection-hiding-in-the-registry/</loc>
		<lastmod>2019-04-08T04:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/prediction-series-10-reports-of-china-chip-hacking-should-be-a-warning-to-us-supply-chain/</loc>
		<lastmod>2019-04-08T06:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ncipher-securitys-regional-sales-director-philip-schreiber-interviewed-by-emirates-news/</loc>
		<lastmod>2019-04-08T08:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/my-take-what-fake-news-really-is-digital-disinformation-intended-to-disrupt-manipulate/</loc>
		<lastmod>2019-04-08T08:59:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyberspaces-weapons-of-mass-deconstruction/</loc>
		<lastmod>2019-04-08T10:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/planetary-ransomware-victims-can-now-recover-their-files-for-free/</loc>
		<lastmod>2019-04-08T11:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/card-scraping-malware-compromised-aerogrow-customer-payment-data/</loc>
		<lastmod>2019-04-08T11:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/user-friendly-fuzzing-with-sienna-locomotive/</loc>
		<lastmod>2019-04-08T11:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/lookout-for-tax-scams/</loc>
		<lastmod>2019-04-08T12:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-security-myth-vs-fact-1-my-provider-protects-my-data-2/</loc>
		<lastmod>2019-04-08T12:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/here-we-go-again-third-party-app-leaks-sensitive-facebook-data-through-aws-s3/</loc>
		<lastmod>2019-04-08T12:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/consumer-beware-protect-your-privacy-when-installing-new-apps/</loc>
		<lastmod>2019-04-08T14:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dod-rmf-revision-2-new-updates-and-their-impact-on-cybersecurity/</loc>
		<lastmod>2019-04-08T14:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/4-ways-to-get-a-virus/</loc>
		<lastmod>2019-04-08T14:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/equifax-breach-leads-u-s-senate-to-propose-america-draft-its-own-gdpr/</loc>
		<lastmod>2019-04-08T14:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-rob-ragans-kelly-albrinks-ferris-buellers-guide-to-abuse-domain-permutations/</loc>
		<lastmod>2019-04-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/migrating-acunetix-on-premise-to-another-server/</loc>
		<lastmod>2019-04-08T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tls-security-1-what-is-ssl-tls/</loc>
		<lastmod>2019-04-08T15:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-remote-file-inclusion-rfi/</loc>
		<lastmod>2019-04-08T15:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-security-5-establishing-a-tls-connection/</loc>
		<lastmod>2019-04-08T15:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-security-4-ssl-tls-certificates/</loc>
		<lastmod>2019-04-08T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-security-3-ssl-tls-terminology-and-basics/</loc>
		<lastmod>2019-04-08T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-security-6-examples-of-tls-vulnerabilities-and-attacks/</loc>
		<lastmod>2019-04-08T15:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/tls-security-2-a-brief-history-of-ssl-tls/</loc>
		<lastmod>2019-04-08T15:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/how-to-prevent-sql-injection-vulnerabilities-in-php-applications/</loc>
		<lastmod>2019-04-08T15:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/forrester-recognizes-synopsys-as-a-leader-in-software-composition-analysis/</loc>
		<lastmod>2019-04-08T15:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-best-way-to-encrypt-email-in-outlook/</loc>
		<lastmod>2019-04-08T16:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gps-the-rollover/</loc>
		<lastmod>2019-04-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-importance-of-channel-partners-for-cybersecurity/</loc>
		<lastmod>2019-04-08T17:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-maksim-shudraks-fuzzing-malware-for-fun-profit/</loc>
		<lastmod>2019-04-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/people-spent-more-time-with-their-mom-this-mothers-day-in-the-u-k/</loc>
		<lastmod>2019-04-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-year-later-cybercrime-groups-still-rampant-on-facebook/</loc>
		<lastmod>2019-04-08T19:39:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-security-evolution-taking-security-beyond-siem-with-gurucul-security-analytics-2/</loc>
		<lastmod>2019-04-08T19:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sans-threat-hunting-and-incident-response-summit-2019-call-for-speakers-deadline-5-6/</loc>
		<lastmod>2019-04-08T20:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-too-much-talking/</loc>
		<lastmod>2019-04-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/jack-danahy-shares-insight-on-endpoint-protection-and-simplifying-cybersecurity/</loc>
		<lastmod>2019-04-08T21:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/lockergoga-ransomware-slams-industrial-firms-in-europe-could-hit-anyone/</loc>
		<lastmod>2019-04-08T23:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ddos-targeting-wordpress-search/</loc>
		<lastmod>2019-04-08T23:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-swimlane-shaped-the-company-culture-2/</loc>
		<lastmod>2019-04-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dont-ask-founders-about-culture-theyre-biased/</loc>
		<lastmod>2019-04-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/security-culture-questions-to-consider-2/</loc>
		<lastmod>2019-04-09T01:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/secureworld-philadelphia-visit-bromium-at-booth-600/</loc>
		<lastmod>2019-04-09T02:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/avoid-the-dangerous-irs-phishing-scams-during-tax-season/</loc>
		<lastmod>2019-04-09T05:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-cloud-security-steps-every-business-needs-to-keep-up-with-the-evolution-of-security/</loc>
		<lastmod>2019-04-09T05:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tripwire-patch-insanity-the-results/</loc>
		<lastmod>2019-04-09T05:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/every-organisation-is-affected-by-cyber-risk/</loc>
		<lastmod>2019-04-09T07:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/think-your-business-is-too-small-to-get-hacked-wake-up/</loc>
		<lastmod>2019-04-09T08:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/de-scoping-the-contact-center-mitigates-staff-security-threat/</loc>
		<lastmod>2019-04-09T08:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-success-story-about-implementation-of-iso-27001-and-9001-how-online-platform-doccle-did-it/</loc>
		<lastmod>2019-04-09T08:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/out-of-the-shadows-into-the-network/</loc>
		<lastmod>2019-04-09T10:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/considerations-for-planning-structuring-and-deploying-a-new-network-security-strategy/</loc>
		<lastmod>2019-04-09T11:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/aerogrow-discloses-data-breach-of-customers-payment-card-information/</loc>
		<lastmod>2019-04-09T11:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/announcing-querycon-2019/</loc>
		<lastmod>2019-04-09T11:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/look-at-risk-as-more-of-a-compass-than-a-watch-2/</loc>
		<lastmod>2019-04-09T12:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/attacks-against-iot-devices-through-apis-how-to-prevent-them/</loc>
		<lastmod>2019-04-09T12:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/google-cloud-identity-and-cyberark-supercharging-beyondcorp-2/</loc>
		<lastmod>2019-04-09T13:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/agentless-workload-security-with-gravityzone-and-nsx-t-2-4-data-center/</loc>
		<lastmod>2019-04-09T13:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/management-guide-for-cisos-responsibilities-strategies-and-best-practices/</loc>
		<lastmod>2019-04-09T13:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-become-a-cybersecurity-engineer/</loc>
		<lastmod>2019-04-09T13:44:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-secret-to-ciso-success-dont-be-a-roadblock-to-business-growth/</loc>
		<lastmod>2019-04-09T13:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacking-educational-organizations-are-you-game/</loc>
		<lastmod>2019-04-09T14:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/malware-debugs-itself-to-prevent-analysis/</loc>
		<lastmod>2019-04-09T14:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-tejas-dharamshis-building-identity-for-an-open-perimeter/</loc>
		<lastmod>2019-04-09T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wordpress-xss-vulnerability-can-result-in-remote-code-execution-rce/</loc>
		<lastmod>2019-04-09T15:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tips-on-tech-support-scams-avast/</loc>
		<lastmod>2019-04-09T16:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/airbnbs-webcam-problems-violations-of-guest-privacy-state-law/</loc>
		<lastmod>2019-04-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/complex-but-helpful-negotiating-fda-guidance-to-build-a-cybersecurity-program/</loc>
		<lastmod>2019-04-09T17:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/avast-pc-trends-report-2019-average-pc-is-6-years-old/</loc>
		<lastmod>2019-04-09T17:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-your-token-a-security-the-sec-wants-to-help-you-figure-that-out/</loc>
		<lastmod>2019-04-09T18:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/better-api-penetration-testing-with-postman-part-3/</loc>
		<lastmod>2019-04-10T13:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/april-2019-patch-tuesday-74-vulns-16-critical-2-actively-attacked-1-poc-exploit-adobe-vulns/</loc>
		<lastmod>2019-04-09T18:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-ivona-alexandra-chilis-radrat-an-all-in-one-toolkit-for-complex-espionage-ops/</loc>
		<lastmod>2019-04-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/incident-response-in-the-oil-and-natural-gas-industry-its-all-about-communications/</loc>
		<lastmod>2019-04-09T19:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-top-4-reasons-why-hotels-keep-getting-hacked/</loc>
		<lastmod>2019-04-09T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/avoid-getting-rained-on-keep-your-data-secure-in-your-cloud/</loc>
		<lastmod>2019-04-09T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/3-ways-cisos-enable-big-data-innovation/</loc>
		<lastmod>2019-04-09T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securdps-enterprise-honored-in-sc-medias-30th-anniversary-awards/</loc>
		<lastmod>2019-04-09T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/whats-the-point-of-a-national-consumer-protection-week/</loc>
		<lastmod>2019-04-09T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/are-we-a-thumbs-up-or-a-thumbs-down/</loc>
		<lastmod>2019-04-09T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/gdpr-biggest-fail-of-2018/</loc>
		<lastmod>2019-04-09T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/5-countries-with-gdpr-like-data-privacy-laws/</loc>
		<lastmod>2019-04-09T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nydfs-implementation-grace-period-marks-strengthening-of-vendor-security/</loc>
		<lastmod>2019-04-09T20:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cybersaint-at-rsac-2019/</loc>
		<lastmod>2019-04-09T20:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hardware-hacking-101-lesson-3-abusing-uart-u-are-root/</loc>
		<lastmod>2019-04-09T20:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-everyone-hates-social-media/</loc>
		<lastmod>2019-04-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sap-security-notes-april-19-sap-expands-xxe-critical-patch-to-java-and-hana/</loc>
		<lastmod>2019-04-09T22:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/vert-threat-alert-april-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-04-09T22:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/patch-tuesday-lowdown-april-2019-edition/</loc>
		<lastmod>2019-04-10T00:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsegmentation-look-before-you-leap/</loc>
		<lastmod>2019-04-10T03:43:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/offering-customers-trusted-digital-security/</loc>
		<lastmod>2019-04-10T07:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/before-you-dive-into-iot-do-these-three-things/</loc>
		<lastmod>2019-04-10T07:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/critical-infrastructure-reps-fear-what-hackers-might-do-to-them-in-2019/</loc>
		<lastmod>2019-04-10T09:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/retail-sector-feature-retail-data-security-and-rebuilding-trust/</loc>
		<lastmod>2019-04-10T10:10:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/anatomy-of-a-cloud-native-data-breach/</loc>
		<lastmod>2019-04-10T10:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/enemy-unknown-handling-customised-targeted-attacks/</loc>
		<lastmod>2019-04-10T11:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/lost-in-sql-translation-charting-dbplyr-mapped-sql-function-support-across-all-backends/</loc>
		<lastmod>2019-04-10T11:57:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/triton-framework-leveraged-at-a-second-critical-infrastructure-facility/</loc>
		<lastmod>2019-04-10T12:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/passwordping-enters-a-new-era-as-enzoic/</loc>
		<lastmod>2019-04-10T12:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/us-senate-to-end-deceptive-practices-and-dark-patterns-on-online-platforms/</loc>
		<lastmod>2019-04-10T12:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-save-ransomware-encrypted-files-for-decryption/</loc>
		<lastmod>2019-04-10T12:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyberark-named-a-5-star-security-vendor-in-2019-crn-partner-program-guide-2/</loc>
		<lastmod>2019-04-10T13:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/better-api-penetration-testing-with-postman-part-2/</loc>
		<lastmod>2019-04-10T13:31:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/better-api-penetration-testing-with-postman-part-1/</loc>
		<lastmod>2019-04-10T13:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/mozilla-developers-have-built-bugbug-which-uses-machine-learning-to-triage-firefox-bugs/</loc>
		<lastmod>2019-04-10T13:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dns-tools-queries-for-wordpress-users-administrators/</loc>
		<lastmod>2019-04-10T13:58:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/mozilla-adds-protection-against-fingerprinting-and-cryptomining-scripts-in-firefox-nightly-and-beta/</loc>
		<lastmod>2019-04-10T13:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/u-s-senators-introduce-a-bipartisan-bill-that-bans-social-media-platforms-from-using-dark-patterns-to-trick-its-users/</loc>
		<lastmod>2019-04-10T13:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/as-the-connectivity-of-trucking-fleets-grows-so-do-cybersecurity-risks/</loc>
		<lastmod>2019-04-10T13:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/career-guide-for-data-protection-officers/</loc>
		<lastmod>2019-04-10T13:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-family-affair-personalizing-the-customer-experience/</loc>
		<lastmod>2019-04-10T14:38:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-rated-threat-intelligence-for-businesses-and-security-operations-centers/</loc>
		<lastmod>2019-04-10T14:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-safe-is-your-smb-from-web-threats-avast-business/</loc>
		<lastmod>2019-04-10T14:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-security-myth-vs-fact-2-is-encryption-the-best-security-for-data-at-risk-2/</loc>
		<lastmod>2019-04-10T14:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/archived-cloud-security-myth-vs-fact-2-is-encryption-the-best-security-for-data-at-risk/</loc>
		<lastmod>2019-04-10T14:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-scott-behrens-ian-hakens-cats-in-my-certificate-transparency-logs/</loc>
		<lastmod>2019-04-10T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/do-high-vanity-bitrates-choke-your-live-ott-service-out-of-the-gate/</loc>
		<lastmod>2019-04-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/go-behind-the-scenes-of-a-docker-cryptojacking-attack/</loc>
		<lastmod>2019-04-10T15:18:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/web-based-application-security-part-2-cross-site-forgery/</loc>
		<lastmod>2019-04-10T16:02:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/my-take-account-hijackers-follow-small-banks-credit-unions-over-to-mobile-banking-apps/</loc>
		<lastmod>2019-04-10T16:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/understanding-the-past-to-prepare-for-the-future-what-cybersecurity-can-learn-from-captain-marvel/</loc>
		<lastmod>2019-04-10T16:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/print-provider-extends-service-offerings-to-include-it-cybersecurity-to-address-changing-customer-needs-2/</loc>
		<lastmod>2019-04-10T17:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/get-your-head-out-of-the-clouds-embrace-a-hybrid-approach-to-identity/</loc>
		<lastmod>2019-04-10T16:55:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/arizona-beverages-ransomware-attack-halts-sales-for-days/</loc>
		<lastmod>2019-04-10T16:59:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nope-no-snakes-on-the-plane-but-there-are-cameras/</loc>
		<lastmod>2019-04-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/application-security-survey-at-rsa-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2019-04-10T18:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-kelly-anns-slack-app-security-securing-your-workspaces-from-a-bot-uprising/</loc>
		<lastmod>2019-04-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/attacks-on-closed-wordpress-plugins/</loc>
		<lastmod>2019-04-10T19:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/luke-kingma-and-lou-patrick-mackays-futurism-virtually-secured/</loc>
		<lastmod>2019-04-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/7-reasons-to-adopt-a-policy-centric-approach-to-security-and-it-operations/</loc>
		<lastmod>2019-04-10T22:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/paving-your-way-through-sap-digital-transformation-part-2/</loc>
		<lastmod>2019-04-11T00:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-risk-of-credential-stuffing-to-the-smart-home/</loc>
		<lastmod>2019-04-11T03:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-build-an-effective-ics-security-program/</loc>
		<lastmod>2019-04-11T03:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-identify-iot-pitfalls-and-adopt-technology-with-confidence/</loc>
		<lastmod>2019-04-11T06:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/paranoia-reigns-among-security-pros/</loc>
		<lastmod>2019-04-11T08:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-tech-network-traffic-analysis-gets-to-ground-truth-about-data-moving-inside-the-perimeter/</loc>
		<lastmod>2019-04-11T08:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/avast-cleanup-premium-end-of-support-for-xp-avast/</loc>
		<lastmod>2019-04-11T08:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-discussions-with-the-eu-resulted-in-changes-in-its-terms-and-services-for-users/</loc>
		<lastmod>2019-04-11T11:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/muddywater-group-using-spam-campaign-to-hijack-victims-computers/</loc>
		<lastmod>2019-04-11T12:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/github-repositories-leak-thousands-of-secrets-study-shows-2/</loc>
		<lastmod>2019-04-11T13:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/can-you-crack-the-hack/</loc>
		<lastmod>2019-04-11T13:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/digital-immune-system-demands-cybersecurity-vitamins/</loc>
		<lastmod>2019-04-11T13:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/decrypt-ryuk-ransomware-how-to-recover-ryuk-encrypted-files/</loc>
		<lastmod>2019-04-11T13:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fireeye-reports-infrastructure-crippling-triton-malware-linked-to-russian-government-tech-institute/</loc>
		<lastmod>2019-04-11T13:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/high-rolling-hacker-jailed-after-launching-malware-attacks-via-websites/</loc>
		<lastmod>2019-04-11T14:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-do-linux-system-administrators-need-to-know-about-the-gdpr/</loc>
		<lastmod>2019-04-11T14:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-31-threat-hunting-interview-questions-and-answers-for-2019/</loc>
		<lastmod>2019-04-11T14:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-chlo-messdaghis-how-to-fix-the-diversity-gap-in-cybersecurity/</loc>
		<lastmod>2019-04-11T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dhs-fbi-alert-north-korean-backdoor-trojan-hoplight-detected-in-the-wild-linked-to-lazarus/</loc>
		<lastmod>2019-04-11T15:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/worst-and-best-cybersecurity-questions-ever/</loc>
		<lastmod>2019-04-11T15:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-ping-is-the-thing-popular-html5-feature-used-to-trick-chinese-mobile-users-into-joining-latest-ddos-attack/</loc>
		<lastmod>2019-04-11T16:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/android-7-0-phones-can-now-double-as-google-security-keys/</loc>
		<lastmod>2019-04-11T16:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/protect-your-ip-with-complete-visibility-into-every-sensitive-file-exchange/</loc>
		<lastmod>2019-04-11T16:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/penetration-testing-as-a-service/</loc>
		<lastmod>2019-04-11T16:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/connected-cars-security-and-privacy-are-both-trust-hurdles/</loc>
		<lastmod>2019-04-11T16:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/typhoon-1-02-ctf-walkthrough/</loc>
		<lastmod>2019-04-11T16:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nato-ccdcoe-locked-shields-2019/</loc>
		<lastmod>2019-04-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/integrating-owasp-zap-in-devsecops-pipeline/</loc>
		<lastmod>2019-04-11T17:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/contextualize-quantified-cyber-risk-with-a-risk-appetite-statement/</loc>
		<lastmod>2019-04-11T17:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/email-scam-threatens-wannacry-ddos-attack-avast/</loc>
		<lastmod>2019-04-11T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hidden-cameras-at-your-airbnb-avast/</loc>
		<lastmod>2019-04-11T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-new-banking-regulations-are-changing-risk-management/</loc>
		<lastmod>2019-04-11T18:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/81-of-cios-and-cisos-defer-critical-updates-or-patches/</loc>
		<lastmod>2019-04-11T18:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-tech-critical-start-delivers-managed-security-services-with-radical-transparency/</loc>
		<lastmod>2019-04-11T18:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-connor-gilberts-connor-gormans-containers-your-ally-in-improving-security/</loc>
		<lastmod>2019-04-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sql-injection-in-advance-contact-form-7-db/</loc>
		<lastmod>2019-04-11T20:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-m87-black-hole-size-comparison/</loc>
		<lastmod>2019-04-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-true-cost-of-free-apps-and-saas-tools-freemium-vs-free-there-is-a-difference/</loc>
		<lastmod>2019-04-11T22:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/does-fake-cloud-matter/</loc>
		<lastmod>2019-04-11T22:27:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/assange-indicted-for-breaking-a-password/</loc>
		<lastmod>2019-04-12T00:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-healthcare-cybersecurity-can-enable-innovation/</loc>
		<lastmod>2019-04-12T08:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/will-facebook-enforce-its-updated-remove-reduce-and-inform-policy-to-curb-fake-news-and-manage-problematic-content/</loc>
		<lastmod>2019-04-12T10:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/march-release-qa-with-ari-weil/</loc>
		<lastmod>2019-04-12T13:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bayrob-malware-gang-convicted-of-infecting-over-400000-computers-worldwide-stealing-millions-through-online-auction-fraud/</loc>
		<lastmod>2019-04-12T13:36:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/get-a-grip-on-your-cloud/</loc>
		<lastmod>2019-04-12T13:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-malware-tajmahal-is-scary-sophisticated-avast/</loc>
		<lastmod>2019-04-12T14:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-rick-ramgatties-journey-to-command-injection-hacking-the-lenovo-ix4-300d/</loc>
		<lastmod>2019-04-12T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/qa-how-cutting-out-buzzwords-could-actually-ease-implementation-of-powerful-security-tools/</loc>
		<lastmod>2019-04-12T15:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fcc-fails-to-mandate-signaling-system-7-remediation-effort-nothing-to-see-here-move-along/</loc>
		<lastmod>2019-04-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-note-to-our-community-on-how-to-hide-your-content-from-search-engines/</loc>
		<lastmod>2019-04-12T17:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bens-book-review-the-linux-command-line-a-complete-introduction/</loc>
		<lastmod>2019-04-12T17:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wp3-flaws-allow-password-stealing-avast/</loc>
		<lastmod>2019-04-12T17:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-security-myth-3-the-best-security-keeps-threat-actors-from-getting-in/</loc>
		<lastmod>2019-04-12T17:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-privileged-access-management-pam/</loc>
		<lastmod>2019-04-12T18:25:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-panel-zach-powers-rachel-black-chris-dorros-daed-latrope-kyle-tobener-xiaoran-wang-career-mutation-a-panel-on-the-evolution-to-management-in-security/</loc>
		<lastmod>2019-04-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ease-me-into-cryptography-part-4-tls-applied-cryptographic-foundations/</loc>
		<lastmod>2019-04-12T19:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-picture-of-a-black-hole/</loc>
		<lastmod>2019-04-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/here-we-go-again-sensitive-facebook-data-leaked-by-third-party-app-through-aws-s3/</loc>
		<lastmod>2019-04-12T21:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/2019-tax-season-phishing-scams-2/</loc>
		<lastmod>2019-04-12T23:15:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-arkadiy-tetelmans-concrete-steps-to-create-a-security-culture/</loc>
		<lastmod>2019-04-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-election-commentary/</loc>
		<lastmod>2019-04-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-aaron-rosenmunds-collect-all-the-data-protect-all-the-things/</loc>
		<lastmod>2019-04-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/insider-threat-survey-report-rsa-2019-2/</loc>
		<lastmod>2019-04-14T07:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/social-engineering-hacks-the-way-you-think-avast/</loc>
		<lastmod>2019-04-14T13:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-j-wolfgang-goerlichs-shall-we-play-a-game/</loc>
		<lastmod>2019-04-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/luke-kingma-and-lou-patrick-mackays-futurism-peak-work-life-balance/</loc>
		<lastmod>2019-04-14T17:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/howto-install-wireguard-in-an-unprivileged-container-proxmox/</loc>
		<lastmod>2019-04-14T18:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/land-lordz-service-powers-airbnb-scams/</loc>
		<lastmod>2019-04-14T18:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-joakim-kennedys-whois-calling-the-80s-to-get-their-finger-back/</loc>
		<lastmod>2019-04-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-cyber-security-is-key-to-enterprise-risk-management-for-all-organizations/</loc>
		<lastmod>2019-04-15T03:14:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-path-to-cyber-resilience-takeaways-from-the-scalar-2019-security-study/</loc>
		<lastmod>2019-04-15T03:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/amazon-echo-recording-controversy-new-mobile-phone-scam-hotels-leaking-data/</loc>
		<lastmod>2019-04-15T04:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gdpr-and-penetration-testing/</loc>
		<lastmod>2019-04-15T07:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/penetration-testing-at-devsecops-speed/</loc>
		<lastmod>2019-04-15T07:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-become-a-certified-ethical-hacker-ceh/</loc>
		<lastmod>2019-04-15T08:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/china-spying-on-undersea-internet-cables/</loc>
		<lastmod>2019-04-15T11:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsoft-reveals-certain-outlook-com-user-accounts-were-hacked-for-months/</loc>
		<lastmod>2019-04-15T11:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robbinhood-ransomware-demands-grow-10k-per-day-after-fourth-day/</loc>
		<lastmod>2019-04-15T11:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bitglass-rocks-the-casb-at-oktane-19/</loc>
		<lastmod>2019-04-15T13:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/instant-12-question-pci-dss-assessment/</loc>
		<lastmod>2019-04-15T13:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/come-and-see-the-latest-clearswift-technology-in-action-at-cyberuk-2019-2/</loc>
		<lastmod>2019-04-15T13:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hackers-could-read-users-outlook-hotmail-and-msn-email-via-compromised-microsoft-support-account/</loc>
		<lastmod>2019-04-15T13:37:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/understanding-key-management-policy-part-2/</loc>
		<lastmod>2019-04-15T14:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/current-trends-in-ai-based-threat-prevention/</loc>
		<lastmod>2019-04-15T14:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/information-security-careers-in-the-wireless-communications-industry/</loc>
		<lastmod>2019-04-15T14:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hack-the-boxhtb-machines-walkthrough-series-devel/</loc>
		<lastmod>2019-04-15T14:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/you-better-think-twice-before-you-disable-uac-windows-10/</loc>
		<lastmod>2019-04-15T14:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/are-enterprise-and-consumer-interests-aligned-2/</loc>
		<lastmod>2019-04-15T14:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-zainab-danishs-nicolas-kseibs-making-sense-of-unstructured-threat-data/</loc>
		<lastmod>2019-04-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/automation-business-ally-and-security-adversary/</loc>
		<lastmod>2019-04-15T16:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/url-ping-tracking-the-exponential-evil-of-tracking/</loc>
		<lastmod>2019-04-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/unauthenticated-remote-code-execution-in-kentico-cms/</loc>
		<lastmod>2019-04-15T18:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-joseph-binghams-owning-the-smart-home-with-logitech-harmony-hub/</loc>
		<lastmod>2019-04-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/vulnerabilities-in-the-wpa3-wi-fi-security-protocol/</loc>
		<lastmod>2019-04-15T19:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/identity-management-beyond-the-basics/</loc>
		<lastmod>2019-04-15T19:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/automating-your-aws-landing-zone-2/</loc>
		<lastmod>2019-04-15T20:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ceo-interview-todays-threat-landscape-demands-conditional-access-everywhere/</loc>
		<lastmod>2019-04-15T20:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robert-m-lees-jeff-hass-little-bobby-comics-esp/</loc>
		<lastmod>2019-04-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/experts-breach-at-it-outsourcing-giant-wipro/</loc>
		<lastmod>2019-04-15T21:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/third-party-security-risks-to-consider-and-manage/</loc>
		<lastmod>2019-04-15T22:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/from-tk-redirects-to-pushka-browser-notification-scam/</loc>
		<lastmod>2019-04-15T22:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/analyzing-the-acronyms-moving-target-defense-vs-av-ngav-edr-epp/</loc>
		<lastmod>2019-04-15T23:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/morphisec-gets-best-midmarket-software-solution-award-among-others/</loc>
		<lastmod>2019-04-15T23:11:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/introducing-morphisecs-2019-healthcare-cyber-threat-index/</loc>
		<lastmod>2019-04-15T23:11:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/inside-the-asus-supply-chain-attack/</loc>
		<lastmod>2019-04-15T23:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/morphisec-to-launch-its-first-ctf-competition-in-israels-cyber-capital/</loc>
		<lastmod>2019-04-15T23:11:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/morphisecs-annual-women-in-cybersecurity-scholarship-supporting-women-in-cyber/</loc>
		<lastmod>2019-04-15T23:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/threat-alert-ave-maria-infostealer-on-the-rise-with-new-stealthier-delivery/</loc>
		<lastmod>2019-04-15T23:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/new-global-attack-on-point-of-sale-systems/</loc>
		<lastmod>2019-04-15T23:11:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/five-questions-to-ask-endpoint-security-vendors-at-rsac-2019/</loc>
		<lastmod>2019-04-15T23:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/explore-the-new-morphisec/</loc>
		<lastmod>2019-04-15T23:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/converged-infrastructure-the-cyber-security-stakes-are-higher-than-ever/</loc>
		<lastmod>2019-04-15T23:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/pki-why-its-as-relevant-today-as-it-was-10-years-ago/</loc>
		<lastmod>2019-04-16T05:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/reflections-on-femas-data-sharing/</loc>
		<lastmod>2019-04-16T07:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/in-2019-dont-forget-about-phishing-2/</loc>
		<lastmod>2019-04-16T08:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/asynchronous-warfare-part-2-strategy-and-phases/</loc>
		<lastmod>2019-04-16T08:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cisco-publishes-its-data-privacy-benchmark-study-2/</loc>
		<lastmod>2019-04-16T08:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/inside-scranos-a-cross-platform-rootkit-enabled-spyware-operation/</loc>
		<lastmod>2019-04-16T08:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/avast-secure-browser-updates-to-aspen-avast/</loc>
		<lastmod>2019-04-16T08:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-data-protection-by-design-and-by-default/</loc>
		<lastmod>2019-04-16T09:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/qa-how-ai-digital-transformation-are-shaking-up-revenue-management-in-high-tech-life-sciences/</loc>
		<lastmod>2019-04-16T09:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/6-ways-modern-threat-detection-keeps-the-enterprise-ahead-of-cybersecurity-trends/</loc>
		<lastmod>2019-04-16T11:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-sdp-would-have-prevented-the-citrix-hack/</loc>
		<lastmod>2019-04-16T11:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ransom-amounts-rise-90-in-q1-as-ryuk-increases/</loc>
		<lastmod>2019-04-16T12:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/heres-how-you-can-better-mitigate-a-cyberattack/</loc>
		<lastmod>2019-04-16T12:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/privileged-account-management-best-practices-for-social-media-security/</loc>
		<lastmod>2019-04-16T13:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/using-secure-by-design-power-systems-to-prevent-cyberattacks/</loc>
		<lastmod>2019-04-16T13:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/spear-phishing-campaign-targeted-ukraine-government-entities/</loc>
		<lastmod>2019-04-16T13:59:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-ransomware-continues-to-be-an-immensely-profitable-business-for-bad-actors/</loc>
		<lastmod>2019-04-16T13:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-the-security-of-virtual-reality-and-augmented-reality-virtual-insanity/</loc>
		<lastmod>2019-04-16T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyberwarfare-security-solutions-for-large-enterprises/</loc>
		<lastmod>2019-04-16T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/keybases-new-proof-system-is-now-available-for-all-mastodon-servers/</loc>
		<lastmod>2019-04-16T14:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wanna-skip-exam-proven-young-hackers-methods/</loc>
		<lastmod>2019-04-16T14:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-ivona-alexandra-chilis-operation-pzchao/</loc>
		<lastmod>2019-04-16T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/map-your-cyber-risks-to-business-outcomes-with-kris/</loc>
		<lastmod>2019-04-16T15:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-every-leadership-meeting-should-include-a-cybersecurity-update/</loc>
		<lastmod>2019-04-16T15:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-minute-guide-the-nydfs-500-cybersecurity-regulations/</loc>
		<lastmod>2019-04-16T15:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/separating-subdomains-from-third-party-hosted-www-domains/</loc>
		<lastmod>2019-04-16T15:51:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/want-to-stress-out-your-ciso-heres-how/</loc>
		<lastmod>2019-04-16T15:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-few-ghidra-tips-for-ida-users-part-1-the-decompiler-unreachable-code/</loc>
		<lastmod>2019-04-16T16:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-few-ghidra-tips-for-ida-users-part-0-automatic-comments-for-api-call-parameters/</loc>
		<lastmod>2019-04-16T16:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-why-what-and-how-of-migrating-from-g-suite-to-office-365/</loc>
		<lastmod>2019-04-16T16:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robocalling-a-litany-of-telecom-and-government-incompetence/</loc>
		<lastmod>2019-04-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/treating-security-like-safety-what-the-fdas-recognition-of-ul-2900-2-12018-means-for-developers/</loc>
		<lastmod>2019-04-16T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/credential-stealing-phishing-attacks-gaining-momentum/</loc>
		<lastmod>2019-04-16T17:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/2019-phishing-trends-intelligence-report-the-growing-social-engineering-threat/</loc>
		<lastmod>2019-04-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebooks-shift-to-private-communications-makes-no-sense/</loc>
		<lastmod>2019-04-16T18:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-pranjal-jumdes-kaizhe-huangs-two-faces-of-wasm-security/</loc>
		<lastmod>2019-04-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-game-of-thrones-versus-star-wars/</loc>
		<lastmod>2019-04-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/when-i-was-the-target-of-a-social-engineer/</loc>
		<lastmod>2019-04-16T22:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/yahoo-and-verizon-sweeten-their-settlement-offer-by-30-million-staffing-budget-commitments/</loc>
		<lastmod>2019-04-17T03:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/managed-vulnerability-management-yes-you-read-that-right/</loc>
		<lastmod>2019-04-17T03:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-emotional-impact-of-data-breaches/</loc>
		<lastmod>2019-04-17T08:26:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyber-risk-management-safeguarding-your-organisation/</loc>
		<lastmod>2019-04-17T09:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/navicent-health-discloses-data-breach-as-the-result-of-a-digital-attack/</loc>
		<lastmod>2019-04-17T11:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/it-doesnt-matter-if-you-dont-use-internet-explorer-you-could-still-be-at-risk-from-this-ie-zero-day-vulnerability/</loc>
		<lastmod>2019-04-17T12:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bot-managers-are-a-cash-back-program-for-your-company/</loc>
		<lastmod>2019-04-17T12:14:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bitglass-security-spotlight-facebook-stores-countless-passwords-in-plaintext/</loc>
		<lastmod>2019-04-17T12:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/lock-it-down-password-security-dos-and-donts/</loc>
		<lastmod>2019-04-17T13:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/key-education-for-information-security-careers-a-computer-science-degree/</loc>
		<lastmod>2019-04-17T13:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/your-supply-chain-may-be-a-trojan-horse/</loc>
		<lastmod>2019-04-17T13:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/you-cant-protect-what-you-cant-see/</loc>
		<lastmod>2019-04-17T13:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/malicious-bot-detection-through-a-complex-proxy-network/</loc>
		<lastmod>2019-04-17T14:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/morphisecs-q1-2019-u-s-citizen-threat-index/</loc>
		<lastmod>2019-04-17T14:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/verodin-recognized-by-cyber-defense-magazines-infosec-awards-for-its-innovation-and-security-validation-by-mark-bagley/</loc>
		<lastmod>2019-04-17T14:59:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-mark-hillicks-do-you-even-tech-anymore-management-leadership-in-security/</loc>
		<lastmod>2019-04-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/part-two-how-healthcare-cybersecurity-can-enable-innovation/</loc>
		<lastmod>2019-04-17T15:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gartner-market-guide-calls-memory-protection-a-mandatory-capability/</loc>
		<lastmod>2019-04-17T16:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/education-sector-peoplesoft-critical-patch-update-april-2019/</loc>
		<lastmod>2019-04-17T16:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-4-deadly-technology-sins-of-a-small-business/</loc>
		<lastmod>2019-04-17T16:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/traffic-management-for-peace-of-mind/</loc>
		<lastmod>2019-04-17T16:50:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-synopsys-cybersecurity-research-center-cyrc-advancing-the-state-of-software-security/</loc>
		<lastmod>2019-04-17T16:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/puresec-enables-easier-migration-to-serverless-with-unified-function-container-and-host-security/</loc>
		<lastmod>2019-04-17T16:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fcc-chairman-pai-front-loads-fcc-consumer-advisory-panel-with-anti-consumer-functionaries/</loc>
		<lastmod>2019-04-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-not-to-acknowledge-a-data-breach/</loc>
		<lastmod>2019-04-17T17:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/qa-researchers-find-evidence-of-emerging-market-for-stolen-spoofed-machine-identities/</loc>
		<lastmod>2019-04-17T18:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/that-looks-odd-securing-your-workspace/</loc>
		<lastmod>2019-04-17T18:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/kubernetes-security-how-to-automate-microsegmentation-policy-generation/</loc>
		<lastmod>2019-04-17T18:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tax-fraud-and-the-dark-web-in-2019/</loc>
		<lastmod>2019-04-17T18:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wipro-compromised-and-clients-hit-by-supply-chain-cyber-attack/</loc>
		<lastmod>2019-04-17T18:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-security-architectures-lifting-the-fog-from-the-cloud/</loc>
		<lastmod>2019-04-17T18:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/quantifying-cyber-risk-for-your-bod-and-c-suite-colleagues/</loc>
		<lastmod>2019-04-17T18:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-masha-sedovas-surfing-the-motivation-wave-to-create-security-behavior-change/</loc>
		<lastmod>2019-04-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/thinkphp-5-x-remote-code-execution/</loc>
		<lastmod>2019-04-17T20:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-text-entry/</loc>
		<lastmod>2019-04-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/evernote-omnifocus-and-my-productivity/</loc>
		<lastmod>2019-04-17T21:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-type-of-encrypted-email-is-right-for-your-enterprise/</loc>
		<lastmod>2019-04-17T22:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-safe-is-budget-tracking-software-avast/</loc>
		<lastmod>2019-04-17T23:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsofts-oauth2-implementation-registering-an-app-2/</loc>
		<lastmod>2019-04-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsofts-oauth2-implimentation-registering-an-app/</loc>
		<lastmod>2019-04-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/understanding-microsofts-oauth2-implementation-part-2-registering-an-application/</loc>
		<lastmod>2019-04-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/these-vpn-configurations-could-be-your-weak-spot/</loc>
		<lastmod>2019-04-18T00:48:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/establishing-information-security-in-project-management/</loc>
		<lastmod>2019-04-18T03:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/so-your-third-party-has-been-breached/</loc>
		<lastmod>2019-04-18T03:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/from-third-party-android-store-to-sms-trojan/</loc>
		<lastmod>2019-04-18T06:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-cross-site-scripting-xss-vulnerability-definition-and-prevention/</loc>
		<lastmod>2019-04-18T07:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/can-smart-lighting-beat-a-hacker-how-machine-learning-can-boost-iot-security/</loc>
		<lastmod>2019-04-18T08:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-tech-brinqa-takes-a-graph-database-approach-to-vulnerability-management-app-security/</loc>
		<lastmod>2019-04-18T08:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ukccf-executive-club-event-2019-pci-compliance/</loc>
		<lastmod>2019-04-18T09:52:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ransomware-attack-targeted-data-intelligence-firm-verint/</loc>
		<lastmod>2019-04-18T11:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/puresec-recognized-as-a-gartner-cool-vendor/</loc>
		<lastmod>2019-04-18T11:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-confessed-another-data-breach-says-it-unintentionally-uploaded-1-5-million-email-contacts-without-consent/</loc>
		<lastmod>2019-04-18T12:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/midwest-leads-country-in-cybersecurity-standardization/</loc>
		<lastmod>2019-04-18T12:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dragonblood-vulnerabilities-discovered-in-wpa3-wifi-standard/</loc>
		<lastmod>2019-04-18T12:39:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-gartner-report-made-available-by-cyberark-best-practices-for-privileged-access-management-through-the-four-pillars-of-pam/</loc>
		<lastmod>2019-04-18T13:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-prevent-real-time-api-abuse/</loc>
		<lastmod>2019-04-18T13:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-strategies-that-will-really-grow-your-instagram-audience/</loc>
		<lastmod>2019-04-18T13:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/chipotle-customers-report-fraudulent-orders-charged-to-their-accounts/</loc>
		<lastmod>2019-04-18T14:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-the-wendys-data-breach-settlement-may-be-the-worst-one-yet-and-how-the-ftc-may-be-expanding-its-breach-governance-approach/</loc>
		<lastmod>2019-04-18T14:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/protecting-the-secret-sauce-what-you-need-to-know-about-intellectual-property-ip/</loc>
		<lastmod>2019-04-18T14:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fowsniff-1-ctf-walkthrough/</loc>
		<lastmod>2019-04-18T14:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/man-fried-over-50-college-computers-with-weaponized-usb-stick/</loc>
		<lastmod>2019-04-18T14:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-toshiro-nishimuras-attacking-deep-learning-based-nlp-systems/</loc>
		<lastmod>2019-04-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-dns-hijacking-attacks/</loc>
		<lastmod>2019-04-18T15:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyberattacks-in-higher-ed/</loc>
		<lastmod>2019-04-18T15:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/no-cloud-one-cloud-multicloud-how-do-you-secure-big-data-analytics/</loc>
		<lastmod>2019-04-18T15:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cyber-incident-response-plan-it-wont-be-any-worse-off/</loc>
		<lastmod>2019-04-18T16:06:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-your-development-team-should-care-about-software-compliance/</loc>
		<lastmod>2019-04-18T16:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/announcing-the-community-oriented-osquery-fork-osql/</loc>
		<lastmod>2019-04-18T16:24:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/casino-goes-all-in-and-wins-big-with-imperva-security/</loc>
		<lastmod>2019-04-18T16:31:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sub-vocalization-aware-smart-speakers-little-brother-has-arrived/</loc>
		<lastmod>2019-04-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wipro-intruders-targeted-other-major-it-firms/</loc>
		<lastmod>2019-04-18T17:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/aprils-oracle-cpu-fixes-critical-bugs-reported-by-onapsis/</loc>
		<lastmod>2019-04-18T17:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/this-old-reg-ftc-proposes-major-updates-to-the-safeguards-rule/</loc>
		<lastmod>2019-04-18T18:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/50-best-kubernetes-architecture-tutorials/</loc>
		<lastmod>2019-04-18T18:06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5-reasons-to-embrace-secure-communications-for-senior-living/</loc>
		<lastmod>2019-04-18T18:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-stina-ehrensvards-securing-online-identities-with-simple-secure-open-standards/</loc>
		<lastmod>2019-04-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-a-disturbing-parallel/</loc>
		<lastmod>2019-04-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebook-imports-info-without-user-consent-avast/</loc>
		<lastmod>2019-04-18T21:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/my-take-most-companies-blissfully-ignorant-of-rising-attacks-on-most-used-endpoint-mobile-devices/</loc>
		<lastmod>2019-04-18T22:19:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-you-still-need-pen-testing-in-2019/</loc>
		<lastmod>2019-04-18T22:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-thwart-an-attackers-attempt-to-compromise-credentials-and-move-around-a-network/</loc>
		<lastmod>2019-04-18T22:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/risk-management-and-understanding-what-matters-most/</loc>
		<lastmod>2019-04-19T00:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ai-and-automation-seen-as-silver-bullet-in-overcoming-cybersecurity-skill-gap-survey-finds/</loc>
		<lastmod>2019-04-19T09:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-fips-140-2-and-why-its-important/</loc>
		<lastmod>2019-04-19T10:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-weather-channel-suffers-ransomware-attack/</loc>
		<lastmod>2019-04-19T10:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trustedsignal-blog-2019-04-19-084600/</loc>
		<lastmod>2019-04-19T12:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-mark-nesbitts-guarding-against-protocol-subversion-at-coinbase/</loc>
		<lastmod>2019-04-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/social-media-platforms-bring-the-dark-web-closer-than-you-think/</loc>
		<lastmod>2019-04-19T15:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/windows-10-block-websites-across-multiple-browsers/</loc>
		<lastmod>2019-04-19T16:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebookery-the-hoovering/</loc>
		<lastmod>2019-04-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/pci-for-smb-requirement-12-maintain-an-information-security-policy/</loc>
		<lastmod>2019-04-19T18:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-cristinel-ionel-anichiteis-raul-tosas-high-performance-vm-introspection/</loc>
		<lastmod>2019-04-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/companies-must-develop-more-precise-cybersecurity-road-maps-and-strategies/</loc>
		<lastmod>2019-04-19T19:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/welcome-to-the-new-secureideas-com/</loc>
		<lastmod>2019-04-19T20:35:20+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->