<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/04/webinar-cloud-based-research-platform-for-threat-hunters/</loc>
		<lastmod>2019-04-19T20:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-wanna-see-the-code/</loc>
		<lastmod>2019-04-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sea-turtle-dns-hijacking-and-more-weekly-news-avast/</loc>
		<lastmod>2019-04-19T21:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/marcus-malwaretech-hutchins-pleads-guilty-to-writing-selling-banking-malware/</loc>
		<lastmod>2019-04-19T21:58:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-american-data-dissemination-act-ftc-adda-2/</loc>
		<lastmod>2019-04-19T22:51:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-battle-cry-for-oracle-ebs-security/</loc>
		<lastmod>2019-04-19T23:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-igal-gofmans-yaron-shanis-treat-the-problems-not-the-symptoms/</loc>
		<lastmod>2019-04-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/paypal-netflix-gmail-and-uber-users-among-targets-in-new-wave-of-dns-hijacking-attacks/</loc>
		<lastmod>2019-04-20T16:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/alison-gopnik-phd-sums-up-artificial-intelligence/</loc>
		<lastmod>2019-04-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-tyler-paxtons-the-secure-metamorphosis-streaming-logs-with-kafka-and-tls/</loc>
		<lastmod>2019-04-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/prediction-series-11-servers-and-endpoints-differ-vastly-from-each-other-cannot-be-protected-by-the-same-means/</loc>
		<lastmod>2019-04-21T04:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-brandon-weeks-do-androids-dream-of-electric-fences/</loc>
		<lastmod>2019-04-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-email-settings/</loc>
		<lastmod>2019-04-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-victor-clarks-strangeways-here-we-come/</loc>
		<lastmod>2019-04-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/was-it-a-chinese-spy-or-confused-tourist/</loc>
		<lastmod>2019-04-21T21:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/programming-languages-infosec-professionals-should-learn/</loc>
		<lastmod>2019-04-21T23:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/abcs-of-ueba-e-is-for-entity/</loc>
		<lastmod>2019-04-22T00:17:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/six-myths-people-still-believe-about-gdpr/</loc>
		<lastmod>2019-04-22T03:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsoft-email-hacked-instagram-nasty-list-phishing-scam-facebook-third-party-data-deals/</loc>
		<lastmod>2019-04-22T04:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacker-destroys-iranian-cyber-espionage-data-leaks-source-code-of-apt34s-hacking-tools-on-telegram/</loc>
		<lastmod>2019-04-22T06:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacker-exposes-confidential-files-correspondence-from-mexican-embassy-in-guatemala/</loc>
		<lastmod>2019-04-22T06:53:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ransomware-takes-weather-channel-live-broadcast-offline/</loc>
		<lastmod>2019-04-22T07:02:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/iot-adopters-still-concerned-about-deployment-and-security-in-their-ecosystem/</loc>
		<lastmod>2019-04-22T07:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-few-ghidra-tips-for-ida-users-part-2-strings-and-parameters/</loc>
		<lastmod>2019-04-22T11:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/123456-remains-the-worlds-most-breached-password/</loc>
		<lastmod>2019-04-22T11:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ch4inrulz-1-0-1-ctf-walkthrough-part-1/</loc>
		<lastmod>2019-04-22T13:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-become-an-it-auditor/</loc>
		<lastmod>2019-04-22T13:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-oscp-certification-and-exam/</loc>
		<lastmod>2019-04-22T13:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/california-consumer-privacy-act/</loc>
		<lastmod>2019-04-22T13:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/online-secuirty-and-privacy-with-a-virtual-private-network/</loc>
		<lastmod>2019-04-22T14:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/liz-fong-jones-on-how-to-secure-ssh-with-two-factor-authentication-2fa/</loc>
		<lastmod>2019-04-22T14:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/wannacry-hero-marcus-hutchins-pleads-guilty-to-malware-charges-may-face-upto-10-years-in-prison/</loc>
		<lastmod>2019-04-22T14:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-rod-sotos-joseph-zadehs-xiodan-lis-profiling-vip-accounts-access-patterns-in-user-centric-data-streams/</loc>
		<lastmod>2019-04-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/brian-krebs-x-graham-cluley-the-wipro-lassitude-or-how-not-to-execute-incident-response/</loc>
		<lastmod>2019-04-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/facebooks-ongoing-security-challenges-are-a-cautionary-statement-for-all-companies/</loc>
		<lastmod>2019-04-22T17:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-secure-is-your-wi-fi-network-at-home-avast/</loc>
		<lastmod>2019-04-22T17:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-kelley-robinson-contact-center-authentication/</loc>
		<lastmod>2019-04-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/whos-behind-the-revcode-webmonitor-rat/</loc>
		<lastmod>2019-04-22T19:43:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/reset-email-account-passwords-after-a-website-malware-infection/</loc>
		<lastmod>2019-04-22T20:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robert-m-lees-jeff-hass-little-bobby-comics-dedicated/</loc>
		<lastmod>2019-04-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/rocke-group-hackers-target-cloud-administrative-infrastructure-2/</loc>
		<lastmod>2019-04-23T00:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/addiction-rehabilitation-centers-expose-150k-patient-records-2/</loc>
		<lastmod>2019-04-23T02:15:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/drones-as-cyber-weapons-a-reality-not-a-hyperbole/</loc>
		<lastmod>2019-04-23T03:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/effectively-discussing-security-risks-with-the-board/</loc>
		<lastmod>2019-04-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/banking-building-trust-in-an-age-of-disruption/</loc>
		<lastmod>2019-04-23T07:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/my-best-hires-had-30-of-the-wrong-stuff/</loc>
		<lastmod>2019-04-23T08:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-business-can-address-the-security-concerns-of-online-shoppers/</loc>
		<lastmod>2019-04-23T09:23:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/researchers-uncover-threat-actor-supergroup-linked-to-stuxnet-flame-duqu/</loc>
		<lastmod>2019-04-23T09:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/security-metrics-and-teslas-safety-statistics/</loc>
		<lastmod>2019-04-23T10:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/application-delivery-use-cases-for-cloud-and-on-premise-applications/</loc>
		<lastmod>2019-04-23T10:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-people-who-protect-others-need-to-be-at-their-best-tackling-mental-health-in-cybersecurity-qa-with-dr-ryan-louie-md-ph-d/</loc>
		<lastmod>2019-04-23T11:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-brexit-backlash-how-uncertainty-is-prompting-uk-businesses-to-bolster-cyber-security-defenses/</loc>
		<lastmod>2019-04-23T11:53:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/winning-the-data-game-banks-must-view-fintech-and-data-security-as-stepping-stones-not-obstacles/</loc>
		<lastmod>2019-04-23T11:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/teen-sues-apple-for-1-billion-saying-facial-recognition-mistook-him-for-a-thief/</loc>
		<lastmod>2019-04-23T12:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/repost-what-is-ethical-hacking-and-what-is-it-doing-for-cybersecurity/</loc>
		<lastmod>2019-04-23T12:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bodybuilding-com-suffered-security-incident-potentially-involving-customer-info/</loc>
		<lastmod>2019-04-23T12:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/arkcon-2019-welcomes-top-researchers-with-a-cybersecurity-challenge/</loc>
		<lastmod>2019-04-23T13:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/eu-parliament-votes-to-amass-the-largest-biometric-database-on-earth/</loc>
		<lastmod>2019-04-23T13:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/who-last-accessed-or-attempted-to-access-your-shared-folders/</loc>
		<lastmod>2019-04-23T13:26:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/beware-of-the-drone-privacy-and-security-issues-with-drones/</loc>
		<lastmod>2019-04-23T13:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-become-an-incident-responder/</loc>
		<lastmod>2019-04-23T13:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dont-pay-the-price-is-your-company-prepared-for-invoice-fraud/</loc>
		<lastmod>2019-04-23T14:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybercrime-victims-report-2-71-billion-in-damages-to-the-ic3-in-2018/</loc>
		<lastmod>2019-04-23T14:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/grcs-complexity-bias-do-complex-programs-need-complex-solutions/</loc>
		<lastmod>2019-04-23T14:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/adware-plagues-google-play-store-avast/</loc>
		<lastmod>2019-04-23T14:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/selecting-enterprise-email-security-introduction/</loc>
		<lastmod>2019-04-23T14:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-ask-the-electronic-frontier-foundation/</loc>
		<lastmod>2019-04-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/veracode-is-named-a-leader-for-sixth-time-in-gartner-magic-quadrant-for-application-security-testing/</loc>
		<lastmod>2019-04-23T15:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-services-for-k-12-school-districts-2/</loc>
		<lastmod>2019-04-23T15:06:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cisos-must-help-not-hinder-business-success/</loc>
		<lastmod>2019-04-23T15:24:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/4-phishing-attacks-that-exploit-two-factor-authentication-2fa/</loc>
		<lastmod>2019-04-23T15:24:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/advanced-prevention-embedded-edr-the-next-generation-of-protection-with-microsoft-defender-atp-and-morphisec/</loc>
		<lastmod>2019-04-23T15:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/synopsys-named-a-leader-in-the-2019-gartner-mq-for-application-security-testing-3-years-running/</loc>
		<lastmod>2019-04-23T15:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/national-supply-chain-integrity-month-understanding-third-party-cyber-risk/</loc>
		<lastmod>2019-04-23T16:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/pre-installed-apps-on-android-show-why-privacy-is-no-longer-guaranteed/</loc>
		<lastmod>2019-04-23T16:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/president-theodore-roosevelts-citizenship-in-a-republic-oratorical-masterpiece-the-109th-anniversary/</loc>
		<lastmod>2019-04-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/look-out-students-learn-how-to-raise-cybersecurity-skills/</loc>
		<lastmod>2019-04-23T17:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsidessf-2019-reed-lodens-closing-ceremony/</loc>
		<lastmod>2019-04-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-your-login-success-rate-says-about-your-threat-surface/</loc>
		<lastmod>2019-04-23T19:19:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-huawei-makes-a-pitch/</loc>
		<lastmod>2019-04-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/active-exploitation-of-confluence-vulnerability-cve-2019-3396-dropping-gandcrab-ransomware/</loc>
		<lastmod>2019-04-23T22:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/understanding-microsofts-oauth2-implementation-part-3-using-microsoft-graph-api/</loc>
		<lastmod>2019-04-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsofts-oauth2-implementation-using-microsoft-graph-api-2/</loc>
		<lastmod>2019-04-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/microsofts-oauth2-implimentation-using-microsoft-graph-api/</loc>
		<lastmod>2019-04-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/connecting-the-dots-on-ot-it-convergence/</loc>
		<lastmod>2019-04-24T00:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-beginners-guide-to-pci-compliance/</loc>
		<lastmod>2019-04-24T03:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/prediction-series-12-moving-wafs-to-the-cloud-means-dialing-down-app-security/</loc>
		<lastmod>2019-04-24T05:59:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/novaloader-yet-another-brazilian-banking-malware-family-2/</loc>
		<lastmod>2019-04-24T06:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/engineering-secure-systems/</loc>
		<lastmod>2019-04-24T07:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/eternalblue-still-infecting-endpoints-as-businesses-fail-to-upgrade-systems-or-apply-patches/</loc>
		<lastmod>2019-04-24T07:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nice-interactions-emea-2019/</loc>
		<lastmod>2019-04-24T10:09:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nice-incontact-interactions-2019-in-review/</loc>
		<lastmod>2019-04-24T11:38:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/financial-services-counting-on-casbs/</loc>
		<lastmod>2019-04-24T12:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/think-cybersecurity-insurance-will-save-you-think-again/</loc>
		<lastmod>2019-04-24T13:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/disk-encryption-101/</loc>
		<lastmod>2019-04-24T13:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sucuris-10th-anniversary/</loc>
		<lastmod>2019-04-24T14:29:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-the-ceo-stands-alone-after-a-breach/</loc>
		<lastmod>2019-04-24T14:59:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/joe-armstrongs-the-mess-were-in/</loc>
		<lastmod>2019-04-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hackers-can-use-dicom-bug-to-hide-malware-in-medical-images/</loc>
		<lastmod>2019-04-24T15:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/greater-transparency-leads-to-better-cybersecurity/</loc>
		<lastmod>2019-04-24T16:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bodybuilders-beware-one-of-the-worlds-largest-online-fitness-stores-hit-by-security-breach/</loc>
		<lastmod>2019-04-24T16:58:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-geomagnetic-jerk/</loc>
		<lastmod>2019-04-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-win-the-application-security-arms-race/</loc>
		<lastmod>2019-04-24T17:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-jason-scott-s-the-annihilation/</loc>
		<lastmod>2019-04-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-open-pdf-files-in-windows-10-without-going-crazy/</loc>
		<lastmod>2019-04-24T19:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/online-platform-design-issues-lead-to-certified-false-advertising-class/</loc>
		<lastmod>2019-04-24T20:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-reinvent-the-wheel/</loc>
		<lastmod>2019-04-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/three-levels-of-change-the-good-the-bad-and-the-approved/</loc>
		<lastmod>2019-04-25T03:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-state-of-cybersecurity-training-and-certifications-with-kevin-johnson/</loc>
		<lastmod>2019-04-25T04:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/banking-on-customer-trust/</loc>
		<lastmod>2019-04-25T06:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-future-of-payments-frictionless/</loc>
		<lastmod>2019-04-25T07:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/five-high-profile-watering-hole-attacks-highlight-importance-of-network-security/</loc>
		<lastmod>2019-04-25T08:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/5g-you-can-have-your-slice-and-security-too/</loc>
		<lastmod>2019-04-25T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/women-now-constitute-24-of-the-cybersecurity-workforce/</loc>
		<lastmod>2019-04-25T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/penetration-testing-for-the-cloud-how-it-is-different/</loc>
		<lastmod>2019-04-25T10:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/amazon-shoppers-can-now-pay-with-bitcoin-on-the-platform/</loc>
		<lastmod>2019-04-25T11:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/web-application-firewalls-101-keywords-to-bookmark/</loc>
		<lastmod>2019-04-25T11:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/washington-state-legislature-passes-new-data-breach-law/</loc>
		<lastmod>2019-04-25T11:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gandcrab-ransomware-claims-another-healthcare-firm/</loc>
		<lastmod>2019-04-25T11:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacker-could-locate-thousands-of-cars-and-kill-their-engines-remotely-via-poorly-secured-gps-tracking-apps/</loc>
		<lastmod>2019-04-25T12:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/qa-threat-analytics-detection-and-response-in-the-cloud/</loc>
		<lastmod>2019-04-25T13:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/finally-a-clear-starting-place-for-nist-csf-adoption/</loc>
		<lastmod>2019-04-25T13:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/penetration-testing-for-saas-companies/</loc>
		<lastmod>2019-04-25T13:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/itil-4-the-main-itsm-methodology-gets-agile-and-integrated-with-the-most-modern-business-practices/</loc>
		<lastmod>2019-04-25T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-internet-control-message-protocol-icmp/</loc>
		<lastmod>2019-04-25T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/guide-three-pillars-of-preventing-business-email-compromise-and-wire-fraud/</loc>
		<lastmod>2019-04-25T14:36:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/congress-asks-google-to-explain-why-it-tracks-users-whole-pattern-of-life/</loc>
		<lastmod>2019-04-25T14:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-most-common-types-of-reported-emails/</loc>
		<lastmod>2019-04-25T14:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bromium-at-fs-isac-april-28-may-1/</loc>
		<lastmod>2019-04-25T14:55:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-robert-c-seafords-jackson-deserialization-vulnerabilities/</loc>
		<lastmod>2019-04-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-credit-unions-can-optimize-secure-the-mobile-app-experience/</loc>
		<lastmod>2019-04-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-comprehensive-saas-backup-checklist/</loc>
		<lastmod>2019-04-25T15:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/developers-versus-automation-engineers-how-we-ended-the-fighting-with-the-right-ci-process/</loc>
		<lastmod>2019-04-25T15:44:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ron-gula-talks-about-the-importance-of-getting-out-of-the-cybersecurity-bubble/</loc>
		<lastmod>2019-04-25T16:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/aws-hipaa-compliance-best-practices-checklist/</loc>
		<lastmod>2019-04-25T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/event-driven-detection-blind-spots-the-work-around/</loc>
		<lastmod>2019-04-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/operation-shadowhammer-hackers-planted-malware-code-in-video-games/</loc>
		<lastmod>2019-04-25T17:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-fix-rate-and-why-does-it-matter/</loc>
		<lastmod>2019-04-25T17:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/defense-alone-wont-stop-cyber-threat-to-u-s-finance/</loc>
		<lastmod>2019-04-25T17:29:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/youve-got-the-swagger-weve-got-the-saas/</loc>
		<lastmod>2019-04-25T18:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/seen-and-heard-notes-on-diversity-equity-inclusion-in-cybersecurity-from-the-rsa-2019-conference/</loc>
		<lastmod>2019-04-25T18:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-matt-wright-phd-using-deep-learning-to-undermine-tor/</loc>
		<lastmod>2019-04-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/browser-security-the-worst-code-injections-and-how-they-work/</loc>
		<lastmod>2019-04-25T20:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-simplified-approach-to-network-segmentation/</loc>
		<lastmod>2019-04-25T20:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/working-with-channel-partners-for-better-cybersecurity/</loc>
		<lastmod>2019-04-25T20:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-samsung-folds/</loc>
		<lastmod>2019-04-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/plugins-added-to-malicious-campaign/</loc>
		<lastmod>2019-04-25T23:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/using-visibility-to-navigate-the-evolving-role-of-ics-security/</loc>
		<lastmod>2019-04-26T06:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/security-opportunities-and-demands-of-digital-transformation/</loc>
		<lastmod>2019-04-26T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/focusing-on-users-is-the-only-way-to-improve-cybersecurity/</loc>
		<lastmod>2019-04-26T07:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/stripe-updates-its-product-stack-to-prepare-european-businesses-for-sca-compliance/</loc>
		<lastmod>2019-04-26T07:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-security-precautions-one-should-take-when-migrating-a-cms/</loc>
		<lastmod>2019-04-26T08:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/towards-an-information-operations-kill-chain/</loc>
		<lastmod>2019-04-26T11:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/p2p-weakness-exposes-millions-of-iot-devices/</loc>
		<lastmod>2019-04-26T13:17:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-find-forgotten-online-accounts-avast/</loc>
		<lastmod>2019-04-26T13:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/listen-we-discuss-what-it-means-to-be-a-hacker-with-adrian-pruteanu-podcast/</loc>
		<lastmod>2019-04-26T13:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/insider-threats-how-can-enterprises-better-protect-against-this-growing-danger/</loc>
		<lastmod>2019-04-26T14:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-knowledge-gap-no-longer-an-excuse/</loc>
		<lastmod>2019-04-26T14:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fbi-reports-cost-of-cybercrime-doubled-to-2-7b-in-2018/</loc>
		<lastmod>2019-04-26T14:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-jeff-mans-more-tales-from-the-cryptanalyst/</loc>
		<lastmod>2019-04-26T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybersecurity-tips-for-insanely-busy-it-managers/</loc>
		<lastmod>2019-04-26T16:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/rsa-conference-2019-questions-comments-concerns/</loc>
		<lastmod>2019-04-26T16:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/connected-cars-drive-privacy-concerns-avast/</loc>
		<lastmod>2019-04-26T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/information-security-hubris-the-cruft-of-wipro/</loc>
		<lastmod>2019-04-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-amber-welchs-data-access-rights-exploits-under-new-privacy-laws/</loc>
		<lastmod>2019-04-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-role-will-blockchain-have-in-cyber-security-and-risk-management/</loc>
		<lastmod>2019-04-26T19:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/typo-3-spam-infection/</loc>
		<lastmod>2019-04-26T20:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-ui-vs-ux/</loc>
		<lastmod>2019-04-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-to-include-in-an-iso-27001-remote-access-policy-2/</loc>
		<lastmod>2019-04-26T21:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/uk-considers-huawei-for-5g-avast/</loc>
		<lastmod>2019-04-26T22:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hacker-can-kill-car-engines-around-the-world-avast/</loc>
		<lastmod>2019-04-27T13:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-francis-lees-pwning-a-cheap-ip-camera-for-fun-but-not-profit/</loc>
		<lastmod>2019-04-27T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/on-cyber-security-whats-next-for-the-u-s-department-of-homeland-security/</loc>
		<lastmod>2019-04-27T15:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/xkcd-dangerous-fields/</loc>
		<lastmod>2019-04-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/quick-hit-scraping-javascript-enabled-sites-with-htmlunit/</loc>
		<lastmod>2019-04-27T18:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-chloe-messdaghis-how-to-fix-the-diversity-gap-in-cybersecurity/</loc>
		<lastmod>2019-04-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/on-cybersecurity-whats-next-for-the-u-s-department-of-homeland-security/</loc>
		<lastmod>2019-04-28T10:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/10-ransomware-attacks-you-should-know-about-in-2019/</loc>
		<lastmod>2019-04-28T12:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-zach-bevilacquas-threat-hunting-and-other-arcane-magic/</loc>
		<lastmod>2019-04-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/robert-m-lees-jeff-hass-little-bobby-comics-help-desk/</loc>
		<lastmod>2019-04-28T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/rsac-2019-predictions-container-security-application-security-ai-and-more-2/</loc>
		<lastmod>2019-04-28T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/a-good-defense-wins-every-game-2/</loc>
		<lastmod>2019-04-28T18:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-jack-hulto-mckennas-goofkit-getting-goofy-with-kernel-functions/</loc>
		<lastmod>2019-04-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/online-safety-tips-for-mom-avast/</loc>
		<lastmod>2019-04-29T00:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ode-to-kasiski/</loc>
		<lastmod>2019-04-29T03:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-can-league-of-legends-teach-us-about-cybersecurity/</loc>
		<lastmod>2019-04-29T03:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-does-tripwire-map-to-the-nist-si-07-control/</loc>
		<lastmod>2019-04-29T03:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/all-about-vpns-with-gaya-polat-from-vpnmentor/</loc>
		<lastmod>2019-04-29T04:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-great-cyber-security-talent-shortage-continues/</loc>
		<lastmod>2019-04-29T07:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/fraudster-posed-as-jason-statham-to-prey-upon-star-struck-users/</loc>
		<lastmod>2019-04-29T11:14:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/psyinnovations-achieves-serverless-governance-with-puresec/</loc>
		<lastmod>2019-04-29T11:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-build-an-authentication-platform/</loc>
		<lastmod>2019-04-29T12:31:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/commonly-confused-security-topics/</loc>
		<lastmod>2019-04-29T13:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/hack-the-box-htb-machines-walkthrough-series-sunday/</loc>
		<lastmod>2019-04-29T13:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-cept-certification-and-exam/</loc>
		<lastmod>2019-04-29T13:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/romance-fraud-is-a-top-cybercrime-the-fbi-says/</loc>
		<lastmod>2019-04-29T14:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/docker-hub-database-breached-as-many-as-190000-accounts-affected/</loc>
		<lastmod>2019-04-29T14:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-rochester-2019-jeff-foleys-owasp-amass-beyond-subdomain-enumeration/</loc>
		<lastmod>2019-04-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-are-the-benefits-of-the-least-privileged-principle/</loc>
		<lastmod>2019-04-29T16:09:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/4-common-phishing-lies-exposed/</loc>
		<lastmod>2019-04-29T16:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/big-data-analytics-the-top-3-security-and-compliance-challenges-of-2019/</loc>
		<lastmod>2019-04-29T16:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/put-a-couple-of-zeroes-on-it/</loc>
		<lastmod>2019-04-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/insufficient-privilege-validation-in-woocommerce-checkout-manager/</loc>
		<lastmod>2019-04-29T18:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-veracode-security-program-managers-benefit-your-appsec-program/</loc>
		<lastmod>2019-04-29T18:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-nova-2019-track-1-chris-roberts-keynote/</loc>
		<lastmod>2019-04-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/most-cloud-breaches-are-due-to-misconfigurations-2/</loc>
		<lastmod>2019-04-29T19:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/luke-kingma-and-lou-patrick-mackays-futurism-add-ons/</loc>
		<lastmod>2019-04-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/offline-autoruns-revisited-auditing-malware-persistence/</loc>
		<lastmod>2019-04-29T23:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/71-of-u-s-businesses-plan-to-use-more-ai-ml-in-2019/</loc>
		<lastmod>2019-04-30T00:10:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/securelink-exceeds-expectations-for-2018-with-48-yoy-growth/</loc>
		<lastmod>2019-04-30T00:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/sentinelone-and-automox-partner-to-automate-patching-within-autonomous-endpoint-protection/</loc>
		<lastmod>2019-04-30T00:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/data-center-security-market-expected-to-grow-at-11-1-cagr-by-2028/</loc>
		<lastmod>2019-04-30T00:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tufin-announces-launch-of-initial-public-offering/</loc>
		<lastmod>2019-04-30T00:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/aqua-security-closes-62m-in-funding-to-cement-its-leadership-in-cloud-native-security/</loc>
		<lastmod>2019-04-30T00:11:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trend-micro-releases-innovations-that-increase-security-for-google-cloud-platform-kubernetes-and-g-suite-gmail/</loc>
		<lastmod>2019-04-30T00:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/meta-networks-recognized-by-451-research-for-zero-trust-software-defined-perimeter/</loc>
		<lastmod>2019-04-30T00:12:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/capsule8-supports-google-cloud-security-command-center-with-security-partner-integration/</loc>
		<lastmod>2019-04-30T00:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/flashpoint-strengthens-intelligence-platform-with-new-dashboards-and-analytics-expanded-collections-and-tailored-alerting-by-industry/</loc>
		<lastmod>2019-04-30T00:12:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/neustar-research-shows-large-attacks-growing-as-multi-vector-exploits-increasingly-become-the-norm/</loc>
		<lastmod>2019-04-30T00:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/like-the-night-king-perimeter-defense-is-dead/</loc>
		<lastmod>2019-04-30T00:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/more-cowbell-baby/</loc>
		<lastmod>2019-04-30T00:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/detecting-suspicious-and-malicious-activity-on-your-network/</loc>
		<lastmod>2019-04-30T00:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-api-security-challenges-and-how-to-address-them-today/</loc>
		<lastmod>2019-04-30T04:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/prediction-series-13-final-for-defending-against-2019-application-security-threats-virsec-has-you-covered/</loc>
		<lastmod>2019-04-30T05:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/training-wheels-are-off-nys-dfs-transitional-period-finished-2/</loc>
		<lastmod>2019-04-30T08:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/asynchronous-warfare-part-3-how-conventional-strategies-and-tactics-are-applied-to-cyberwarfare/</loc>
		<lastmod>2019-04-30T08:05:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cloud-security-myth-4-security-slows-down-your-ability-to-get-insights/</loc>
		<lastmod>2019-04-30T08:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/study-highlights-key-cloud-security-considerations-as-hybrid-environments-add-complexity-to-enterprise-networks/</loc>
		<lastmod>2019-04-30T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dockerhub-database-breach-exposes-190k-customer-data-including-tokens-for-github-and-bitbucket-repositories/</loc>
		<lastmod>2019-04-30T11:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bot-management-a-business-opportunity-for-service-providers/</loc>
		<lastmod>2019-04-30T11:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/unprotected-database-exposed-details-of-over-80-million-u-s-households/</loc>
		<lastmod>2019-04-30T11:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trust-financial-institutions-and-also-beware/</loc>
		<lastmod>2019-04-30T11:54:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/defending-democracies-against-information-attacks/</loc>
		<lastmod>2019-04-30T11:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/this-ddos-attack-unleashed-the-most-packets-per-second-ever-heres-why-thats-important/</loc>
		<lastmod>2019-04-30T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/slack-to-investors-we-might-be-the-target-of-organized-crime-nation-sponsored-hackers/</loc>
		<lastmod>2019-04-30T12:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ghost-users-and-non-expiring-passwords-a-major-security-issue-for-most-businesses/</loc>
		<lastmod>2019-04-30T12:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bitglass-security-spotlight-ransomware-infects-aebi-schmidt/</loc>
		<lastmod>2019-04-30T12:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/biometric-authentication-our-unique-human-identities-under-attack/</loc>
		<lastmod>2019-04-30T13:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/your-appsec-program-can-make-your-developers-and-your-cfo-happy/</loc>
		<lastmod>2019-04-30T13:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ic3-gov-bec-compromises-and-romance-fraud-2018/</loc>
		<lastmod>2019-04-30T13:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-your-contact-centre-bleeding-why-older-dtmf-deployments-may-be-leaving-the-back-door-ajar/</loc>
		<lastmod>2019-04-30T13:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/42-of-used-drives-sold-on-ebay-hold-sensitive-data-researchers-find/</loc>
		<lastmod>2019-04-30T13:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/learning-from-the-vodafone-huawei-backdoor-scandal/</loc>
		<lastmod>2019-04-30T14:40:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-nova-2019-track-1-jeff-mans-spies-ciphers-symbols-secret-writings/</loc>
		<lastmod>2019-04-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/ai-in-cybersecurity-101/</loc>
		<lastmod>2019-04-30T15:13:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/vendor-specific-versus-vendor-neutral-certifications/</loc>
		<lastmod>2019-04-30T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/guide-your-business-to-safe-harbor-in-the-cybersecurity-storm/</loc>
		<lastmod>2019-04-30T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/cybercrime-in-higher-education-hope-for-the-best/</loc>
		<lastmod>2019-04-30T15:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bens-book-of-the-month-review-of-cyber-smart-five-habits-to-protect-your-family-money-and-identity-from-cyber-criminals/</loc>
		<lastmod>2019-04-30T16:59:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/courts-cant-put-their-finger-on-how-to-handle-compelled-unlocking-of-devices-with-biometrics/</loc>
		<lastmod>2019-04-30T17:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/right-hand-doesnt-know-what-the-others-done-the-danish-passport-fiasco/</loc>
		<lastmod>2019-04-30T17:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/nozomi-networks-labs-finds-new-rockwell-plc-vulnerability/</loc>
		<lastmod>2019-04-30T17:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-vulnerable-is-the-internet-of-things-avast/</loc>
		<lastmod>2019-04-30T17:44:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/video-safe-harbor-for-hackers/</loc>
		<lastmod>2019-04-30T17:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bsides-nova-2019-track-1-megan-fergusons-commas-kill-writing-better-for-analysts/</loc>
		<lastmod>2019-04-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/emotet-catch-me-if-you-can-part-2-of-3/</loc>
		<lastmod>2019-04-30T19:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/is-the-nist-csf-replacing-hipaa-in-healthcare/</loc>
		<lastmod>2019-04-30T19:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/data-e-retail-hacks-more-lucrative-than-ever/</loc>
		<lastmod>2019-04-30T20:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/post-quantum-cryptography-series/</loc>
		<lastmod>2019-04-30T20:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-joy-of-tech-the-mobile-experience/</loc>
		<lastmod>2019-04-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/rule-based-detection/</loc>
		<lastmod>2019-04-30T22:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/applocker-pros-cons-and-alternatives/</loc>
		<lastmod>2019-04-30T23:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/general-availability-of-swimlane-4-1/</loc>
		<lastmod>2019-05-01T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/on-cybersecurity-whats-next-for-homeland-security/</loc>
		<lastmod>2019-05-01T00:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/tripwire-patch-priority-index-for-april-2019/</loc>
		<lastmod>2019-05-01T04:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/federal-cybersecurity-breaking-down-the-barriers-to-adoption/</loc>
		<lastmod>2019-05-01T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/do-you-need-a-waf-or-something-better-than-a-waf/</loc>
		<lastmod>2019-05-01T07:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/where-in-the-world-is-peter-carlisle-hong-kong-edition-episode-1/</loc>
		<lastmod>2019-05-01T08:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-build-a-better-cyber-security-program-for-your-university/</loc>
		<lastmod>2019-05-01T09:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/4-emerging-challenges-in-securing-modern-applications/</loc>
		<lastmod>2019-05-01T10:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/on-security-tokens/</loc>
		<lastmod>2019-05-01T11:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/9-8m-settlement-to-eddie-bauer-data-breach-filed-in-federal-court/</loc>
		<lastmod>2019-05-01T13:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/strengthening-passwords-on-world-password-day-avast/</loc>
		<lastmod>2019-05-01T13:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/howto-visualize-your-water-meter-and-get-alerted-if-too-much-water-is-used/</loc>
		<lastmod>2019-05-01T14:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-andy-applebaums-attck-by-numbers/</loc>
		<lastmod>2019-05-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-protect-your-business-website-from-formjacking/</loc>
		<lastmod>2019-05-01T15:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/peoplesoft-cpu-for-april-2019-university-choices/</loc>
		<lastmod>2019-05-01T15:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-security-training-for-staff-getting-it-right-2/</loc>
		<lastmod>2019-05-01T15:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/enable-employee-workflows-while-preventing-costly-data-breaches/</loc>
		<lastmod>2019-05-01T15:49:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-choose-a-java-experts-things-to-consider-before-hiring-java-developers/</loc>
		<lastmod>2019-05-01T16:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/common-causes-of-large-breaches-q1-2019/</loc>
		<lastmod>2019-05-01T16:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyberseek-career-path-cybersecurity-engineer/</loc>
		<lastmod>2019-05-01T16:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/trends-in-cyber-attacks-over-the-last-15-years-by-bill-crowell/</loc>
		<lastmod>2019-05-01T16:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/maintaining-privacy-in-the-cloud-by/</loc>
		<lastmod>2019-05-01T16:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-protect-sensitive-data-with-pci-dss-compliance/</loc>
		<lastmod>2019-05-01T16:44:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/divvycloud-raises-19-million-to-automate-cloud-security-and-compliance-2/</loc>
		<lastmod>2019-05-01T16:45:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/latest-data-loss-outrage/</loc>
		<lastmod>2019-05-01T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ccpa-amendments-advance-out-of-committees/</loc>
		<lastmod>2019-05-01T18:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-ciso-speaks-adps-roland-cloutier-on-contending-with-the-security-challenges-introduced-by-emerging-technologies/</loc>
		<lastmod>2019-05-01T18:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-security-roundup-for-april-2019/</loc>
		<lastmod>2019-05-01T18:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/announcing-new-veracode-language-coverage-apex-go-and-plsql/</loc>
		<lastmod>2019-05-01T18:47:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-jeffrey-blevins-communicating-just-like-captain-picard/</loc>
		<lastmod>2019-05-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/introducing-zeronorth-security-orchestration-has-a-new-direction/</loc>
		<lastmod>2019-05-01T19:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-stolen-ecommerce-data-is-sold-on-the-darknet/</loc>
		<lastmod>2019-05-01T20:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-disk-usage/</loc>
		<lastmod>2019-05-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/office-365-sspr-vs-dedicated-sspr-solutions/</loc>
		<lastmod>2019-05-01T21:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/malvertising-bypasses-security-with-straight-to-browser-attacks/</loc>
		<lastmod>2019-05-01T23:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mitigating-risks-in-cloud-migration/</loc>
		<lastmod>2019-05-02T03:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/inside-the-government-cybersecurity-landscape-federal-vs-state-level-challenges/</loc>
		<lastmod>2019-05-02T03:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-handle-secret-management-for-serverless-applications/</loc>
		<lastmod>2019-05-02T06:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tale-of-a-wormable-twitter-xss/</loc>
		<lastmod>2019-05-02T07:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/i-dont-like-dogs-i-need-a-dog/</loc>
		<lastmod>2019-05-02T08:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-infamous-password/</loc>
		<lastmod>2019-05-02T08:14:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/providing-assurances-about-customers-data-security/</loc>
		<lastmod>2019-05-02T11:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/does-size-matter-capacity-considerations-when-selecting-a-ddos-mitigation-service/</loc>
		<lastmod>2019-05-02T11:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/upcoming-vulnerability-management-research/</loc>
		<lastmod>2019-05-02T12:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/beyond-checkboxes-6-cloud-security-measures-all-healthcare-organizations-should-take/</loc>
		<lastmod>2019-05-02T13:14:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/phishing-volume-continues-to-rise/</loc>
		<lastmod>2019-05-02T14:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-sense/</loc>
		<lastmod>2019-05-02T14:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-advantages-of-at-your-own-pace-cybersecurity-training/</loc>
		<lastmod>2019-05-02T14:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-ian-coldwater-pm-keynote/</loc>
		<lastmod>2019-05-02T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/japan-is-developing-a-computer-virus-to-fight-cyberattacks-claim-reports/</loc>
		<lastmod>2019-05-02T15:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/unprotected-database-exposed-13-7m-users-employment-information/</loc>
		<lastmod>2019-05-02T15:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/saving-the-worlds-data/</loc>
		<lastmod>2019-05-02T15:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-critical-public-exploits-put-sap-applications-at-risk/</loc>
		<lastmod>2019-05-02T16:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/network-operators-offer-more-parental-controls-to-families-avast/</loc>
		<lastmod>2019-05-02T16:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whos-really-testing-at-microsoft/</loc>
		<lastmod>2019-05-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/four-ways-cspi-can-help-take-your-siem-security-solutions-effectiveness-to-the-next-level/</loc>
		<lastmod>2019-05-02T17:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/do-smbs-need-a-ciso/</loc>
		<lastmod>2019-05-02T18:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/feds-seek-to-up-their-cybersecurity-game/</loc>
		<lastmod>2019-05-02T18:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-culture-of-communication-emergency-response-in-the-oil-and-gas-industry/</loc>
		<lastmod>2019-05-02T18:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-road-to-an-internet-of-things-security-framework/</loc>
		<lastmod>2019-05-02T18:59:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-bryson-borts-no-ious-with-iot/</loc>
		<lastmod>2019-05-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-takeaways-on-cloud-security/</loc>
		<lastmod>2019-05-02T20:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-if-apple-made-pasta/</loc>
		<lastmod>2019-05-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/emerging-threat-remote-code-execution-flaw-in-oracle-weblogic/</loc>
		<lastmod>2019-05-02T21:59:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-customer-profiling-drives-growth-for-your-business/</loc>
		<lastmod>2019-05-02T22:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/from-my-gartner-blog-considering-remediation-approaches-for-vulnerability-prioritization/</loc>
		<lastmod>2019-05-02T22:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ransomware-first-response-guide-what-to-do-in-the-oh-t-moment/</loc>
		<lastmod>2019-05-03T00:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-not-lose-your-password/</loc>
		<lastmod>2019-05-03T06:51:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/testing-cve-mitigation-in-web-apps/</loc>
		<lastmod>2019-05-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/benefits-and-challenges-of-securing-your-cloud-data/</loc>
		<lastmod>2019-05-03T07:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/scranos-rootkit-operation-turns-global-enterprises-to-improve-security-posture/</loc>
		<lastmod>2019-05-03T07:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-for-the-public-interest-2/</loc>
		<lastmod>2019-05-03T09:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dast-things-you-should-know/</loc>
		<lastmod>2019-05-03T10:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/president-trump-signs-eo-to-bolster-federal-digital-security-workforce/</loc>
		<lastmod>2019-05-03T11:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/it-service-provider-refuses-to-pay-ransom-hackers-publish-stolen-data-online/</loc>
		<lastmod>2019-05-03T13:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/itil-v3-vs-itil-v4-what-changed/</loc>
		<lastmod>2019-05-03T14:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/credit-union-sues-fintech-giant-fiserv-over-security-claims/</loc>
		<lastmod>2019-05-03T14:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-matthew-georges-domain-fronting-ftw/</loc>
		<lastmod>2019-05-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/western-us-power-grid-hit-by-cyber-event/</loc>
		<lastmod>2019-05-03T15:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-does-the-second-us-cert-alert-of-2019-mean-for-you/</loc>
		<lastmod>2019-05-03T15:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/feds-bust-up-dark-web-hub-wall-street-market/</loc>
		<lastmod>2019-05-03T16:48:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/webinar-2019-open-source-security-report-persistent-challenges-and-forward-progress/</loc>
		<lastmod>2019-05-03T17:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/information-gathering-updated-2019/</loc>
		<lastmod>2019-05-03T18:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-the-california-consumer-privacy-act/</loc>
		<lastmod>2019-05-03T18:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-brandon-mitchells-containing-security-vulnerabilities-with-containers/</loc>
		<lastmod>2019-05-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-state-sponsored-attacks-can-teach-us-about-conditional-access/</loc>
		<lastmod>2019-05-03T20:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/meanwhile-in-iran-a-doxing-story/</loc>
		<lastmod>2019-05-03T20:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/morphisec-microsoft-defender-av-advanced-threat-protection-made-easy/</loc>
		<lastmod>2019-05-03T20:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/federal-tech-talk-secure-web-browsing/</loc>
		<lastmod>2019-05-03T21:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cronjob-backdoors/</loc>
		<lastmod>2019-05-03T21:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-adjusting-a-chair/</loc>
		<lastmod>2019-05-03T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/popular-job-site-exposed-13-million-user-records-2/</loc>
		<lastmod>2019-05-03T22:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-security-controls-primary-objective/</loc>
		<lastmod>2019-05-04T12:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/group-policy-loopback-problems-and-solutions/</loc>
		<lastmod>2019-05-04T13:50:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-1-allan-bruce-liskas-hanlons-razor-bgp-hijacking/</loc>
		<lastmod>2019-05-04T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/daniel-storis-type-chmod/</loc>
		<lastmod>2019-05-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/credential-stuffing-becomes-constant-threat-avast/</loc>
		<lastmod>2019-05-04T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track2-alan-stacilauskas-hunting-more-than-a-buzzword-applying-scientific-research-method-to-hunting/</loc>
		<lastmod>2019-05-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/3-opensource-tools-for-dast/</loc>
		<lastmod>2019-05-05T13:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-martin-hrons-the-fresh-smell-of-ransomed-coffee-altering-not-so-smart-devices/</loc>
		<lastmod>2019-05-05T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/luke-kingma-and-lou-patrick-mackays-futurism-clonage/</loc>
		<lastmod>2019-05-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-chris-foulons-understanding-cyber-resilience-people-process-technology-and-facilities/</loc>
		<lastmod>2019-05-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyberpatriot-competitions-offer-answers-to-americas-cybersecurity-workforce-challenges/</loc>
		<lastmod>2019-05-05T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-end-of-password-expiration-policies-seat-back-cameras-on-airplanes-unknown-data-breach/</loc>
		<lastmod>2019-05-06T04:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/spring-cleaning-your-cloud-security-strategy/</loc>
		<lastmod>2019-05-06T05:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cloud-still-requires-some-blue-sky-thinking/</loc>
		<lastmod>2019-05-06T05:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/titus-talks-dataguise-detect-data-regardless-of-where-it-lives-or-when-its-created/</loc>
		<lastmod>2019-05-06T05:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/titus-and-virtru-address-the-need-for-true-end-to-end-encryption/</loc>
		<lastmod>2019-05-06T05:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/titus-talks-machine-learning-how-does-it-actually-work-in-your-environment/</loc>
		<lastmod>2019-05-06T05:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/titus-talks-ai-machine-learning-and-deep-learning/</loc>
		<lastmod>2019-05-06T05:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/titus-intelligent-protection-is-a-cybersecurity-excellence-awards-finalist/</loc>
		<lastmod>2019-05-06T05:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/titus-talks-machine-learning/</loc>
		<lastmod>2019-05-06T05:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/data-protection-leadership-forum-breaking-down-the-challenges/</loc>
		<lastmod>2019-05-06T05:46:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/is-your-data-getting-out-of-hand/</loc>
		<lastmod>2019-05-06T05:46:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/are-enterprises-becoming-more-complacent-about-data-breaches/</loc>
		<lastmod>2019-05-06T05:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/unsettling-math-calculating-the-costs-of-a-data-breach/</loc>
		<lastmod>2019-05-06T05:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-security-compliance-controls-what-does-it-all-mean-rick/</loc>
		<lastmod>2019-05-06T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyberwarfare-yes-cyber-insurance-no/</loc>
		<lastmod>2019-05-06T10:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/government-data-at-risk-as-agencies-fail-to-comply-with-standards/</loc>
		<lastmod>2019-05-06T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/protecting-yourself-from-identity-theft/</loc>
		<lastmod>2019-05-06T12:08:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-tackle-device-authentication-and-data-security-in-the-healthcare-industry/</loc>
		<lastmod>2019-05-06T12:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/women-in-cybersecurity-a-mini-whos-who/</loc>
		<lastmod>2019-05-06T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-cpt-certification-and-exam/</loc>
		<lastmod>2019-05-06T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-death-knell-for-class-arbitration/</loc>
		<lastmod>2019-05-06T14:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-beth-lancasters-multitasking-host-forensics/</loc>
		<lastmod>2019-05-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/thales-channel-program-recognized-in-crns-2019-mobility-100-list/</loc>
		<lastmod>2019-05-06T15:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/imposter-syndrome-why-you-cant-separate-the-good-guys-from-the-bad-guys/</loc>
		<lastmod>2019-05-06T15:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fraudsters-targeting-consumers-with-one-ring-phone-scams/</loc>
		<lastmod>2019-05-06T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/facebookery-plans-underway-to-disrupt-credit-card-business-with-facebook-cryptocurrency-payment-network/</loc>
		<lastmod>2019-05-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hhs-announces-reduced-annual-limits-on-civil-money-penalties-for-most-hipaa-violations/</loc>
		<lastmod>2019-05-06T18:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-threats-cyber-opportunities-and-collective-defense-a-view-from-the-three-seas/</loc>
		<lastmod>2019-05-06T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-bounty/</loc>
		<lastmod>2019-05-06T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/10-most-secure-methods-of-communication/</loc>
		<lastmod>2019-05-06T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-joel-grays-social-forensication/</loc>
		<lastmod>2019-05-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/abcs-of-ueba-f-is-for-fraud-2/</loc>
		<lastmod>2019-05-06T19:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/synopsys-and-red-hat-openshift-4-one-smooth-operator/</loc>
		<lastmod>2019-05-06T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/our-assessing-the-impact-of-machine-learning-on-security-published/</loc>
		<lastmod>2019-05-06T20:18:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/robert-m-lees-jeff-hass-little-bobby-comics-connectivity/</loc>
		<lastmod>2019-05-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/planning-to-react-by-mackenzie-brown/</loc>
		<lastmod>2019-05-06T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/6-security-concerns-with-office-365-2/</loc>
		<lastmod>2019-05-06T21:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/it-vs-sales-turning-cybersecurity-into-a-revenue-center/</loc>
		<lastmod>2019-05-06T21:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/companies-are-breaking-up-with-excel-for-managing-cybersecurity-heres-why/</loc>
		<lastmod>2019-05-06T21:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-few-ghidra-tips-for-ida-users-part-3-conversion-labels-and-comments/</loc>
		<lastmod>2019-05-06T22:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/replica-spam-on-poorly-maintained-asp-site/</loc>
		<lastmod>2019-05-07T00:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyberpatriot-competitions-offer-answers-to-u-s-cybersecurity-workforce-challenges/</loc>
		<lastmod>2019-05-07T01:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/top-tips-on-cyber-security-for-smes/</loc>
		<lastmod>2019-05-07T01:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-android-users-must-remain-vigilant-about-malicious-apps-avast/</loc>
		<lastmod>2019-05-07T02:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/alert-logic-uncovers-new-vulnerability-in-wordpress-wp-live-chat-cve-2019-11185/</loc>
		<lastmod>2019-05-07T03:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-devops-maturity-and-how-does-it-relate-to-devops-security/</loc>
		<lastmod>2019-05-07T04:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/webinar-deploy-containers-confidently-with-synopsys-and-google/</loc>
		<lastmod>2019-05-07T05:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/attackers-wiped-many-github-gitlab-and-bitbucket-repos-with-compromised-valid-credentials-leaving-behind-a-ransom-note/</loc>
		<lastmod>2019-05-07T06:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/duckduckgo-proposes-do-not-track-act-of-2019-to-require-sites-to-respect-dnt-browser-setting/</loc>
		<lastmod>2019-05-07T06:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-encryption-became-the-boards-new-best-friend/</loc>
		<lastmod>2019-05-07T07:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/when-should-your-company-think-about-migrating-to-the-cloud/</loc>
		<lastmod>2019-05-07T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/information-security-professionals-todays-unsung-heroes/</loc>
		<lastmod>2019-05-07T08:05:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sensitive-data-can-lurk-on-second-hand-hard-drives/</loc>
		<lastmod>2019-05-07T08:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/penetration-testing-in-the-times-of-apis-and-microservices/</loc>
		<lastmod>2019-05-07T09:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fraud-the-facts/</loc>
		<lastmod>2019-05-07T10:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/scientists-claim-to-have-invented-the-unhackable-processor/</loc>
		<lastmod>2019-05-07T10:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-emerging-vectors-of-attack-and-recommendations-for-mitigating-the-risks/</loc>
		<lastmod>2019-05-07T11:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tennessee-clinic-fined-3-million-five-years-after-leaking-patient-data/</loc>
		<lastmod>2019-05-07T12:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/announcing-the-new-website-file-changes-monitor-plugin-for-wordpress/</loc>
		<lastmod>2019-05-07T13:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ferruh-mavituna-is-interviewed-about-netsparker-by-help-net-security/</loc>
		<lastmod>2019-05-07T13:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/solarwinds-expands-security-portfolio-with-solarwinds-endpoint-detection-and-response-through-partnership-with-sentinelone/</loc>
		<lastmod>2019-05-07T13:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-hunting-techniques-conducting-the-hunt/</loc>
		<lastmod>2019-05-07T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyberseek-career-path-cybersecurity-architect/</loc>
		<lastmod>2019-05-07T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/report-russia-is-using-social-media-to-influence-european-parliamentary-elections/</loc>
		<lastmod>2019-05-07T14:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/symantec-says-nsas-equation-group-tools-were-hacked-by-buckeye-in-2016-way-before-they-were-leaked-by-shadow-brokers-in-2017/</loc>
		<lastmod>2019-05-07T14:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-build-2019-microsoft-showcases-new-updates-to-ms-365-platfrom-with-focus-on-ai-and-developer-productivity/</loc>
		<lastmod>2019-05-07T14:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bug-bounty-hacker-and-the-taste-of-paradise/</loc>
		<lastmod>2019-05-07T14:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xml-external-entity-vulnerability-in-internet-explorer/</loc>
		<lastmod>2019-05-07T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bypassing-sop-using-the-browser-cache/</loc>
		<lastmod>2019-05-07T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/visit-us-at-the-malta-a-i-blockchain-summit-2019/</loc>
		<lastmod>2019-05-07T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/session-token-in-url-vulnerability/</loc>
		<lastmod>2019-05-07T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-are-some-vulnerabilities-marked-as-verified/</loc>
		<lastmod>2019-05-07T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-are-injection-attacks/</loc>
		<lastmod>2019-05-07T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/what-is-code-injection/</loc>
		<lastmod>2019-05-07T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/remote-code-execution-in-bootstrap-sass-ruby-package/</loc>
		<lastmod>2019-05-07T14:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/mutation-xss-in-google-search/</loc>
		<lastmod>2019-05-07T14:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-jason-j-wonnns-tip-of-the-spear-a-threat-intelligence-platform-acquisition/</loc>
		<lastmod>2019-05-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fast-dns-secondary-implementation-order-or-operations-for-ns-zone-registrar-records/</loc>
		<lastmod>2019-05-07T15:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/idaptive-ensures-compliance-with-comfort-for-remy-cointreau/</loc>
		<lastmod>2019-05-07T15:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/online-tutoring-program-reveals-customer-data-breach/</loc>
		<lastmod>2019-05-07T16:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/facial-recognition-is-waking-companies-up-to-consumer-privacy/</loc>
		<lastmod>2019-05-07T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-fight-back-against-robocall-scams-avast/</loc>
		<lastmod>2019-05-07T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/building-a-soc-without-even-knowing-it/</loc>
		<lastmod>2019-05-07T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-nist-privacy-framework-is-more-needed-than-ever/</loc>
		<lastmod>2019-05-07T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tiktok-privacys-greatest-enemy/</loc>
		<lastmod>2019-05-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-year-of-gdpr/</loc>
		<lastmod>2019-05-07T17:03:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/finding-registry-malware-persistence-with-recmd/</loc>
		<lastmod>2019-05-07T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/strengthen-your-web-app-defenses-using-behavioral-analysis-and-attacker-deception/</loc>
		<lastmod>2019-05-07T17:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/on-the-launch-of-shape-connect/</loc>
		<lastmod>2019-05-07T18:26:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cloud-security-observability-how-to-reduce-risk-in-your-cloud-native-infrastructure/</loc>
		<lastmod>2019-05-07T18:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-nova-2019-track-2-craig-chamberlains-cloud-intrusion-detection-and-threat-hunting-with-open-source-tools/</loc>
		<lastmod>2019-05-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-do-marketers-add-security-into-their-messaging/</loc>
		<lastmod>2019-05-07T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whats-behind-the-wolters-kluwer-tax-outage/</loc>
		<lastmod>2019-05-07T19:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/botnet-led-ddos-attacks-are-hitting-record-intensities-imperva-is-mitigating-all-of-them/</loc>
		<lastmod>2019-05-07T20:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-heists-and-escapes/</loc>
		<lastmod>2019-05-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/persistent-xss-via-csrf-in-wp-meta-and-date-remover/</loc>
		<lastmod>2019-05-07T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infographic-findings-from-the-2019-ossra-report/</loc>
		<lastmod>2019-05-07T22:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-i-joined-zeronorth/</loc>
		<lastmod>2019-05-07T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/7-steps-for-businesses-to-more-effectively-secure-data-in-the-cloud/</loc>
		<lastmod>2019-05-08T01:54:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/with-great-freedom-comes-great-cloud-responsibility/</loc>
		<lastmod>2019-05-08T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-next-miami-operation-wirewire-case-alfredo-veloso/</loc>
		<lastmod>2019-05-08T05:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/real-time-threat-detection-is-the-key-to-minimizing-fallout-from-cyber-attacks/</loc>
		<lastmod>2019-05-08T05:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/visionary-managed-security-services-easy-as-p-i-e/</loc>
		<lastmod>2019-05-08T05:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/automate-employee-off-boarding-processes-with-swimlane/</loc>
		<lastmod>2019-05-08T07:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/automating-your-employee-off-boarding-process-with-swimlane/</loc>
		<lastmod>2019-05-08T07:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/poor-password-hygiene-leaving-us-and-uk-businesses-vulnerable-to-attack/</loc>
		<lastmod>2019-05-08T08:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/passwords-management-best-practices-for-wordpress-administrators/</loc>
		<lastmod>2019-05-08T09:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-regular-cyber-security-assessments-and-audits-help-your-organization/</loc>
		<lastmod>2019-05-08T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/decrypt-gandcrab-ransomware-how-to-recover-gandcrab-encrypted-files/</loc>
		<lastmod>2019-05-08T11:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/40-million-worth-of-bitcoin-stolen-from-binance-cryptocurrency-exchange/</loc>
		<lastmod>2019-05-08T11:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/glass-class-the-aws-security-quest/</loc>
		<lastmod>2019-05-08T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/equifax-sued-by-the-state-of-indiana-over-2017-breach/</loc>
		<lastmod>2019-05-08T12:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/managing-security-risks-in-the-cloud/</loc>
		<lastmod>2019-05-08T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/on-abusing-email-validation-protocols-for-distributed-reflective-denial-of-service/</loc>
		<lastmod>2019-05-08T13:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/highlights-from-the-verizon-dbir-2019/</loc>
		<lastmod>2019-05-08T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/introducing-the-bromium-threat-insights-report/</loc>
		<lastmod>2019-05-08T13:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-hunting-remediation/</loc>
		<lastmod>2019-05-08T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/segmentation-penetration-testing-for-pci-compliance/</loc>
		<lastmod>2019-05-08T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/psychological-differences-between-americans-and-brits-can-cost-brands-significantly-when-it-comes-to-security/</loc>
		<lastmod>2019-05-08T14:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-erich-krons-what-you-know-what-you-have-and-what-you-are-mfa-in-the-modern-age/</loc>
		<lastmod>2019-05-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/protect-your-personal-data-online-avast/</loc>
		<lastmod>2019-05-08T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/keep-security-in-mind-for-a-successful-windows-10-upgrade-five-steps-2/</loc>
		<lastmod>2019-05-08T15:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/if-you-arent-scared-of-ransomware-you-arent-paying-attention/</loc>
		<lastmod>2019-05-08T16:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/buckeyed/</loc>
		<lastmod>2019-05-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/2019-verizon-dbir-shows-web-applications-and-human-error-as-top-sources-of-breach/</loc>
		<lastmod>2019-05-08T17:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/working-together-to-understand-the-threat-landscape/</loc>
		<lastmod>2019-05-08T17:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/social-engineer-newsletter-vol-09-issue-116/</loc>
		<lastmod>2019-05-08T17:54:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesnova-2019-track-2-jd-works-torn-flags/</loc>
		<lastmod>2019-05-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/chapter-3-election-day-best-practices-and-readiness-checklist-for-digital-news-publishers/</loc>
		<lastmod>2019-05-08T19:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/introducing-new-rum-based-website-performance-benchmarks/</loc>
		<lastmod>2019-05-08T19:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-wasnt-the-internet-supposed-to-make-us-all-smarter/</loc>
		<lastmod>2019-05-08T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/scranos-rootkit-operation-turns-global/</loc>
		<lastmod>2019-05-08T21:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/2019-verizon-data-breach-investigations-report-dbir-key-takeaways/</loc>
		<lastmod>2019-05-08T22:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/announcing-code-sight-2019-4/</loc>
		<lastmod>2019-05-09T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-changing-threat-landscape-inside-verizons-2019-dbir/</loc>
		<lastmod>2019-05-09T04:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/internet-data-privacy-regulation-not-if-but-how-and-by-whom/</loc>
		<lastmod>2019-05-09T06:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-reality-reflected-by-the-devsecops-2019-survey-results/</loc>
		<lastmod>2019-05-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/securing-sensitive-data-in-pivotal-cloud-foundry/</loc>
		<lastmod>2019-05-09T07:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/an-integrated-approach-to-cloud-security-3/</loc>
		<lastmod>2019-05-09T07:17:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gdpr-business-benefits-beyond-just-compliance-3/</loc>
		<lastmod>2019-05-09T07:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/750000-medtronic-defibrillators-are-vulnerable-to-hacking-3/</loc>
		<lastmod>2019-05-09T07:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/close-to-one-billion-peoples-emails-leaked-in-one-of-the-biggest-hacking-scandals-ever-3/</loc>
		<lastmod>2019-05-09T07:37:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/university-of-washington-medicine-exposes-information-of-nearly-1-million-patients-3/</loc>
		<lastmod>2019-05-09T07:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/network-security-challenges-create-a-commercial-imperative-for-ai/</loc>
		<lastmod>2019-05-09T08:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/92-million-my-heritage-genealogy-accounts-breached-now-what/</loc>
		<lastmod>2019-05-09T09:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/california-consumer-privacy-act-the-toughest-data-privacy-law-in-the-united-states-3/</loc>
		<lastmod>2019-05-09T09:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/no-enterprise-is-a-cybersecurity-island/</loc>
		<lastmod>2019-05-09T10:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/amazon-is-losing-the-war-on-fraudulent-sellers/</loc>
		<lastmod>2019-05-09T10:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/where-in-the-world-is-peter-carlisle-episode-2-saudi-arabia/</loc>
		<lastmod>2019-05-09T12:47:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/robbinhood-ransomware-attack-brings-down-parts-of-city-of-baltimores-computer-network/</loc>
		<lastmod>2019-05-09T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/global-information-services-company-discloses-malware-attack/</loc>
		<lastmod>2019-05-09T13:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/file-encryption-using-vhd-and-bitlocker/</loc>
		<lastmod>2019-05-09T13:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/smart-cities-and-smarter-hackers/</loc>
		<lastmod>2019-05-09T13:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hackers-steal-bitcoins-worth-41m-from-binance-exchange-in-a-single-go/</loc>
		<lastmod>2019-05-09T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/key-considerations-in-bot-management-evaluation/</loc>
		<lastmod>2019-05-09T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/take-these-five-steps-to-really-mitigate-your-data-breach-risks/</loc>
		<lastmod>2019-05-09T14:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-network-complexity-kills-security/</loc>
		<lastmod>2019-05-09T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-thomas-vaughns-keynote/</loc>
		<lastmod>2019-05-09T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/idaptives-brian-krause-recognized-as-2019-crn-channel-chief/</loc>
		<lastmod>2019-05-09T16:19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-hunting-with-graylog/</loc>
		<lastmod>2019-05-09T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/matrix-1-ctf-walkthrough/</loc>
		<lastmod>2019-05-09T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/when-a-tree-falls-in-st-louis-will-the-power-go-out/</loc>
		<lastmod>2019-05-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-reasons-why-pharmacy-patient-engagement-works-best-with-smartphones/</loc>
		<lastmod>2019-05-09T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/despite-ongoing-warnings-u-s-critical-infrastructure-remains-vulnerable/</loc>
		<lastmod>2019-05-09T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/washington-strengthens-breach-notification-law/</loc>
		<lastmod>2019-05-09T18:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/zavvi-champions-league-final-competition-winner-email-blunder/</loc>
		<lastmod>2019-05-09T18:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-craig-galleys-managing-risk-in-the-cloud/</loc>
		<lastmod>2019-05-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-pony-hidden-in-your-secret-garden/</loc>
		<lastmod>2019-05-09T19:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-ceos-guide-to-understanding-cyber/</loc>
		<lastmod>2019-05-09T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-waiting-for-the-but/</loc>
		<lastmod>2019-05-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/iso-27001-vs-cobit-a-comparison-2/</loc>
		<lastmod>2019-05-09T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-reporting-and-closing-the-skills-gap-with-dark-reading/</loc>
		<lastmod>2019-05-09T22:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/new-survey-says-americans-remain-positive-on-technology-innovation/</loc>
		<lastmod>2019-05-09T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/verizon-data-breach-investigations-report-for-2019-the-highlights-2/</loc>
		<lastmod>2019-05-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-breach-statistics-from-the-verizon-dbir-2019/</loc>
		<lastmod>2019-05-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/garry-kasparov-on-geopolitical-cybersecurity-coming-home-avast/</loc>
		<lastmod>2019-05-10T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/selecting-enterprise-email-security-detection-matters/</loc>
		<lastmod>2019-05-10T00:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-zero-trust-paradox/</loc>
		<lastmod>2019-05-10T02:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/benefits-of-dast-testing-for-application-security/</loc>
		<lastmod>2019-05-10T09:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/social-breaches-targeting-c-level-executives-spike-in-2018-verizon-says/</loc>
		<lastmod>2019-05-10T09:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bigger-and-better-welcome-to-the-2019-arkcon-cybersecurity-event/</loc>
		<lastmod>2019-05-10T13:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sectigo-acquires-icon-labs-delivering-industry-first-end-to-end-iot-security-platform/</loc>
		<lastmod>2019-05-10T14:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/this-week-in-cybersecurity-fighting-hackers-with-missiles/</loc>
		<lastmod>2019-05-10T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-panel-open-source-logging-and-analytics/</loc>
		<lastmod>2019-05-10T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/highlights-from-verizon-dbir-2019/</loc>
		<lastmod>2019-05-10T15:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/facial-recognition-ban-moves-to-city-and-county-of-san-francisco-commissioner-vote-on-may-14th/</loc>
		<lastmod>2019-05-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nine-charged-in-alleged-sim-swapping-ring/</loc>
		<lastmod>2019-05-10T17:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/byoi-bring-your-own-identity-with-loginradius-sso-identity-providers/</loc>
		<lastmod>2019-05-10T17:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-export-access-and-export-customer-data-with-loginradius/</loc>
		<lastmod>2019-05-10T17:37:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/streamline-customer-experience-with-role-management/</loc>
		<lastmod>2019-05-10T18:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-risk-based-authentication-creates-a-frictionless-customer-experience/</loc>
		<lastmod>2019-05-10T18:27:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/synopsys-adds-two-more-awards-to-its-2019-winning-streak/</loc>
		<lastmod>2019-05-10T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-matthew-battens-danny-zastrows-offensive-movement-after-initial-compromise/</loc>
		<lastmod>2019-05-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-google-nest-wants-inside/</loc>
		<lastmod>2019-05-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cloud-browser-economics-101/</loc>
		<lastmod>2019-05-10T21:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/abcs-of-ueba-g-is-for-gurucul-2/</loc>
		<lastmod>2019-05-11T00:39:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/free-website-security-consultation-for-godaddy-pros/</loc>
		<lastmod>2019-05-11T01:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-christopher-peacocks-defending-the-cyber-killchain/</loc>
		<lastmod>2019-05-11T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/windows-file-system-auditing-video-tutorials-for-fileaudit/</loc>
		<lastmod>2019-05-11T15:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/brook-schoenfield-discusses-threat-modeling-and-secure-design/</loc>
		<lastmod>2019-05-11T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-appendicitis/</loc>
		<lastmod>2019-05-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-ben-martins-election-hackers-what-really-happened-in-2016/</loc>
		<lastmod>2019-05-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/school-lunch-cfo-arrested-in-hacking-of-rival-avast/</loc>
		<lastmod>2019-05-12T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/quick-hit-updates-to-quicklookr-and-rdatainfo/</loc>
		<lastmod>2019-05-12T14:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-christopher-peacocks-cybersecurity-careers/</loc>
		<lastmod>2019-05-12T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-can-healthcare-innovate-securely/</loc>
		<lastmod>2019-05-12T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/robert-m-lees-jeff-hass-little-bobby-comics-critical-asset/</loc>
		<lastmod>2019-05-12T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-tony-mocks-seeing-through-the-illusion-of-security/</loc>
		<lastmod>2019-05-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mitre-attck-april-2019-update/</loc>
		<lastmod>2019-05-13T03:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/israel-cyber-attack-bombing-new-google-privacy-settings-traditional-mail-blackmail-scam/</loc>
		<lastmod>2019-05-13T04:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/top-3-open-source-tools-for-sast/</loc>
		<lastmod>2019-05-13T09:05:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/exploring-botnets-in-vr/</loc>
		<lastmod>2019-05-13T12:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bitglass-security-spotlight-80-million-personal-records-exposed/</loc>
		<lastmod>2019-05-13T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bumper-sticker-hacking/</loc>
		<lastmod>2019-05-13T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cloud-waaps-are-the-future-of-application-security-but-what-does-that-mean/</loc>
		<lastmod>2019-05-13T14:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/unmasking-data-masking/</loc>
		<lastmod>2019-05-13T14:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-connor-wilsons-google-hacking/</loc>
		<lastmod>2019-05-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/idaptive-release-19-3-is-now-available/</loc>
		<lastmod>2019-05-13T15:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/minecraft-mod-mothers-day-and-a-hacker-dad/</loc>
		<lastmod>2019-05-13T15:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/apply-item-level-targeting-outside-domains-gp-preferences/</loc>
		<lastmod>2019-05-13T16:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tell-your-board-protecting-data-is-a-bottom-line-issue-in-2019/</loc>
		<lastmod>2019-05-13T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/first-rule-of-antivirus-companies-dont-succumb-to-malware/</loc>
		<lastmod>2019-05-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/migrating-from-your-siem-to-a-new-one/</loc>
		<lastmod>2019-05-13T17:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fortinet-2019-operational-technology-security-trends-report/</loc>
		<lastmod>2019-05-13T17:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-soft-skills-you-need-to-be-a-successful-security-pro/</loc>
		<lastmod>2019-05-13T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/zero-trust-security-what-is-it/</loc>
		<lastmod>2019-05-13T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-curling/</loc>
		<lastmod>2019-05-13T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-problem-with-too-many-security-options/</loc>
		<lastmod>2019-05-13T17:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-spam-attack-targets-romanian-corporation/</loc>
		<lastmod>2019-05-13T17:35:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/addressing-the-global-cybersecurity-skills-gap-challenge/</loc>
		<lastmod>2019-05-13T17:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fortinet-hosts-second-annual-federal-partner-forum/</loc>
		<lastmod>2019-05-13T17:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sd-wan-delivers-digital-transformation-to-your-next-gen-branch/</loc>
		<lastmod>2019-05-13T17:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/examining-three-key-threat-landscape-trends/</loc>
		<lastmod>2019-05-13T17:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fortios-now-supports-the-hashicorp-terraform-datacenter-provisioning-tool/</loc>
		<lastmod>2019-05-13T17:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fortinet-brings-true-5g-security-to-the-2019-big-5g-event/</loc>
		<lastmod>2019-05-13T17:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/world-password-day-6-best-practices-for-password-security/</loc>
		<lastmod>2019-05-13T17:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-and-why-to-use-apis-to-strengthen-your-appsec-strategy/</loc>
		<lastmod>2019-05-13T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-rain-bakers-wifi-the-unfriendly-skies/</loc>
		<lastmod>2019-05-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gandcrab-claims-supremacy-most-prevalent-ransomware-in-the-world-reaches-50-market-share/</loc>
		<lastmod>2019-05-13T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/better-understand-the-risk-of-phishing-attacks-join-a-live-demo-of-real-time-phishing-threat-intelligence/</loc>
		<lastmod>2019-05-13T20:25:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/privoro-announces-air-force-contract/</loc>
		<lastmod>2019-05-13T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-why-shakespeare-was-so-prolific/</loc>
		<lastmod>2019-05-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/technet-cyber-2019-here-we-come/</loc>
		<lastmod>2019-05-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/webinars-tech-due-diligence-iast-and-government-software/</loc>
		<lastmod>2019-05-13T21:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-appsec-tools-are-in-your-devops-toolshed/</loc>
		<lastmod>2019-05-13T21:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ciso-life-how-are-you-holding-up/</loc>
		<lastmod>2019-05-13T21:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-you-part-of-a-supply-chain-attack-avast/</loc>
		<lastmod>2019-05-13T21:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/multiple-vulnerabilities-in-the-wordpress-ultimate-member-plugin/</loc>
		<lastmod>2019-05-13T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-guide-on-the-sucuri-referral-program/</loc>
		<lastmod>2019-05-13T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/brute-force-attacks-denying-the-attacker-not-the-user/</loc>
		<lastmod>2019-05-13T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-look-at-hworm-houdini-aka-njrat/</loc>
		<lastmod>2019-05-13T23:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cve-2019-0708-wormable-critical-rdp-vulnerability-in-older-windows-versions/</loc>
		<lastmod>2019-05-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/windows-patch-released-after-critical-rdp-vulnerability/</loc>
		<lastmod>2019-05-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/welcoming-fips-140-3/</loc>
		<lastmod>2019-05-14T05:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fortinet-operational-technology-security-trends-report/</loc>
		<lastmod>2019-05-14T05:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/6-common-compliance-conundrums-to-know-about/</loc>
		<lastmod>2019-05-14T06:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-use-cases-for-amazon-workspaces-you-should-know/</loc>
		<lastmod>2019-05-14T08:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/asynchronous-warfare-part-4-ooda-loop-2-0-and-the-four-golden-rules/</loc>
		<lastmod>2019-05-14T08:05:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whatsapp-flaw-lets-spies-install-surveillance-software-with-a-simple-call-even-unanswered/</loc>
		<lastmod>2019-05-14T09:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-necessity-of-data-security-recapping-the-2019-thales-data-security-summit/</loc>
		<lastmod>2019-05-14T09:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-top-5-cyber-threats-that-brexit-brings/</loc>
		<lastmod>2019-05-14T09:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/shared-responsibility-in-the-cloud-and-how-to-mess-it-up/</loc>
		<lastmod>2019-05-14T10:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/3-ways-cloud-adoption-is-changing-the-role-of-the-ciso/</loc>
		<lastmod>2019-05-14T11:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bad-actors-using-mitm-attacks-against-asus-to-distribute-plead-backdoor/</loc>
		<lastmod>2019-05-14T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/operational-visibility-boosts-cyber-security-for-midstream-operators/</loc>
		<lastmod>2019-05-14T12:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/equifax-has-bled-1-4-billion-from-2017-breach-so-far/</loc>
		<lastmod>2019-05-14T12:47:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/trickbot-update-from-credential-theft-to-business-disruption/</loc>
		<lastmod>2019-05-14T13:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-ways-banks-can-retain-consumer-trust/</loc>
		<lastmod>2019-05-14T13:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mobile-device-cyberattacks-are-increasing-avast/</loc>
		<lastmod>2019-05-14T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/rusts-recent-releases-1-34-0-and-1-34-1-affected-from-a-vulnerability-that-can-cause-memory-unsafety/</loc>
		<lastmod>2019-05-14T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/trend-micro-delivers-the-industrys-most-complete-security-across-cloud-and-container-workloads/</loc>
		<lastmod>2019-05-14T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-whatsapp-vulnerability-enabled-attackers-to-inject-israeli-spyware-on-users-phones/</loc>
		<lastmod>2019-05-14T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fbi-detects-new-surveillance-malware-linked-to-north-koreas-lazarus-group/</loc>
		<lastmod>2019-05-14T14:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/content-type-and-status-code-leakage/</loc>
		<lastmod>2019-05-14T14:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-necessary-burden-of-5g-security/</loc>
		<lastmod>2019-05-14T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-amy-hollens-people-hacking-101/</loc>
		<lastmod>2019-05-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/north-america-headquarters-shifts-to-the-heart-of-the-city/</loc>
		<lastmod>2019-05-14T15:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whatsapp-releases-update-following-breach-via-remote-code-execution-vulnerability/</loc>
		<lastmod>2019-05-14T15:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hackers-target-education-student-lunch-is-no-exception/</loc>
		<lastmod>2019-05-14T15:24:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/secureage-integrates-artificial-intelligence-powered-apex-anti-malware-engine-in-virustotal/</loc>
		<lastmod>2019-05-14T15:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-make-security-questions-more-secure/</loc>
		<lastmod>2019-05-14T16:10:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-cost-effectively-dynamically-analyze-uefi-malware/</loc>
		<lastmod>2019-05-14T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-ensure-windows-server-is-gdpr-compliant/</loc>
		<lastmod>2019-05-14T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/guide-to-cobit-2019/</loc>
		<lastmod>2019-05-14T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-patches-wormable-flaw-in-windows-xp-7-and-windows-2003/</loc>
		<lastmod>2019-05-14T17:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/when-customers-attack-dns/</loc>
		<lastmod>2019-05-14T17:24:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-the-nist-privacy-framework-draft-means-for-privacy-and-cybersecurity/</loc>
		<lastmod>2019-05-14T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/presumptions-of-grandeur-the-cisco-router-fail/</loc>
		<lastmod>2019-05-14T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/automating-red-team-homelabs-part-2-build-pentest-destroy-and-repeat/</loc>
		<lastmod>2019-05-14T17:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/emotet-the-banking-trojan-malware-of-the-month-may-2019/</loc>
		<lastmod>2019-05-14T18:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sectigo-sponsors-lets-encrypt-to-enable-certificate-transparency-log-operation/</loc>
		<lastmod>2019-05-15T13:11:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/equifaxs-story-the-risks-of-lax-security/</loc>
		<lastmod>2019-05-14T18:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/verodin-release-update-mitre-attck-by-henry-peltokangas/</loc>
		<lastmod>2019-05-14T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/compliance-policy-templates-and-checklists-getting-you-down/</loc>
		<lastmod>2019-05-14T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-tallahassee-2019-nicholas-carrolls-death-by-usb/</loc>
		<lastmod>2019-05-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-driven-security-awareness-training/</loc>
		<lastmod>2019-05-14T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dc-1-vulnhub-walkthrough/</loc>
		<lastmod>2019-05-14T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/may-2019-patch-tuesday-79-vulns-22-critical-rdp-rce-mds-attacks-adobe-vulns/</loc>
		<lastmod>2019-05-14T20:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-alternate-histories/</loc>
		<lastmod>2019-05-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/vert-threat-alert-may-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-05-14T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sap-security-notes-may-19-several-missing-authority-checks-patched/</loc>
		<lastmod>2019-05-14T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/critical-update-windows-remote-desktop-services-vulnerability/</loc>
		<lastmod>2019-05-15T00:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/avast-attends-viva-technology-2019-in-paris-avast/</loc>
		<lastmod>2019-05-15T01:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/halfway-there-security-developments-around-the-world/</loc>
		<lastmod>2019-05-15T08:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-worm-warning-windows-users-urged-to-patch-now/</loc>
		<lastmod>2019-05-15T08:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/yet-another-meltdown-a-microarchitectural-fill-buffer-data-sampling-vulnerability-cve-2018-12130/</loc>
		<lastmod>2019-05-15T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sunlight-for-the-ransomware-data-recovery-industry/</loc>
		<lastmod>2019-05-15T10:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/san-francisco-says-no-to-facial-recognition-tech-in-police-investigations/</loc>
		<lastmod>2019-05-15T11:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/monster-sized-breaches-spell-disaster-for-the-enterprise/</loc>
		<lastmod>2019-05-15T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/magecart-used-same-skimmer-against-two-web-based-suppliers/</loc>
		<lastmod>2019-05-15T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-threat-stack-soc-analysis-the-continuing-evolution-of-the-shellbot-cryptomining-malware/</loc>
		<lastmod>2019-05-15T13:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5g-security-in-an-api-driven-economy/</loc>
		<lastmod>2019-05-15T13:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-you-need-to-know-to-avoid-becoming-a-phishing-scheme-victim/</loc>
		<lastmod>2019-05-15T13:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/best-information-security-management-certifications/</loc>
		<lastmod>2019-05-15T13:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/freedom-mobile-leaks-customer-database-online/</loc>
		<lastmod>2019-05-15T13:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-can-health-care-innovate-with-cybersecurity-in-mind/</loc>
		<lastmod>2019-05-15T13:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5g-networks-shaping-quality-of-experience-qoe-in-the-5g-era/</loc>
		<lastmod>2019-05-15T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-vancouver-2019-day-1-track-1/</loc>
		<lastmod>2019-05-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/skyline-ai-gains-visibility-into-serverless-security-posture-with-puresec/</loc>
		<lastmod>2019-05-15T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/unhackable-iris-scanning-usb-stick-hacked/</loc>
		<lastmod>2019-05-15T15:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/passwords-are-just-one-piece-of-the-cybersecurity-puzzle/</loc>
		<lastmod>2019-05-15T15:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/intel-discloses-four-new-vulnerabilities-labeled-mds-attacks-affecting-intel-chips/</loc>
		<lastmod>2019-05-15T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/net-core-releases-may-2019-updates/</loc>
		<lastmod>2019-05-15T15:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/atlassian-bitbucket-github-and-gitlab-take-collective-steps-against-the-git-ransomware-attack/</loc>
		<lastmod>2019-05-15T15:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/key-considerations-for-a-secure-cloud-migration/</loc>
		<lastmod>2019-05-15T15:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/build-a-best-in-class-service-desk/</loc>
		<lastmod>2019-05-15T16:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-warns-of-a-new-wannacry-newly-discovered-wormable-exploit-in-the-wild/</loc>
		<lastmod>2019-05-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infographic-a-look-back-at-the-first-year-of-gdpr/</loc>
		<lastmod>2019-05-15T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/wordpress-plugin-give-stored-xss-for-donors/</loc>
		<lastmod>2019-05-15T18:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-vancouver-2019-day-1-track-2/</loc>
		<lastmod>2019-05-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/do-ddos-attacks-originate-from-cloud-service-providers/</loc>
		<lastmod>2019-05-16T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-privacy-possible-5-ways-to-protect-your-data/</loc>
		<lastmod>2019-05-15T21:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-tough-week-for-ip-address-scammers/</loc>
		<lastmod>2019-05-15T22:09:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-xkeyboarcd/</loc>
		<lastmod>2019-05-15T22:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/persistent-cross-site-scripting-in-wp-live-chat-support-plugin/</loc>
		<lastmod>2019-05-15T22:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/human-expertise-is-the-key-to-effective-cybersecurity-automation/</loc>
		<lastmod>2019-05-15T22:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/verodin-headline-release-may-14-2019-recent-security-alerts-by-henry-peltokangas/</loc>
		<lastmod>2019-05-15T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/onapsis-appoints-gerhard-eschelbeck-former-google-ciso-to-board-of-directors/</loc>
		<lastmod>2019-05-16T00:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/windows-rdp-remote-code-execution-vulnerability-bluekeep-how-to-detect-and-patch/</loc>
		<lastmod>2019-05-16T03:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-latest-techniques-hackers-are-using-to-compromise-office-365/</loc>
		<lastmod>2019-05-16T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-simple-data-breach-guide-interpreting-gdpr/</loc>
		<lastmod>2019-05-16T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/byoe-offers-data-security-and-compliance-in-the-cloud/</loc>
		<lastmod>2019-05-16T07:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dont-let-your-security-operations-team-suffer-alert-fatigue%e2%80%af/</loc>
		<lastmod>2019-05-16T08:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/us-bans-foreign-equipment-that-threatens-national-security-implicating-huawei/</loc>
		<lastmod>2019-05-16T10:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-business-case-for-securing-robotic-process-automation/</loc>
		<lastmod>2019-05-16T13:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-you-need-to-know-about-the-texas-consumer-privacy-txcpa-and-texas-privacy-protection-acts-txppa/</loc>
		<lastmod>2019-05-16T13:55:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/not-all-secure-sd-wan-solutions-are-created-equal/</loc>
		<lastmod>2019-05-16T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sven-morgenroth-talks-about-how-facebook-stored-millions-of-passwords-in-plain-text-on-hack-naked-news-212/</loc>
		<lastmod>2019-05-16T14:22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/100-million-goznym-cybercrime-network-dismantled-as-suspects-charged/</loc>
		<lastmod>2019-05-16T14:35:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/beyond-the-top-5-industries-most-impacted-by-social-engineering/</loc>
		<lastmod>2019-05-16T14:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/advice-for-young-women-getting-started-in-cybersecurity-avast/</loc>
		<lastmod>2019-05-16T14:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/atlantic-council-2019-poland-cyber-security-conference-day-one/</loc>
		<lastmod>2019-05-16T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/chinese-hacking-group-buckeye-used-stolen-nsa-hacking-tools-ahead-of-shadow-brokers-leaks/</loc>
		<lastmod>2019-05-16T15:17:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/keys-to-scaling-your-application-security-program/</loc>
		<lastmod>2019-05-16T15:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-releases-security-updates-a-wormable-threat-similar-to-wannacry-ransomware-discovered/</loc>
		<lastmod>2019-05-16T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-the-impact-of-zombieload/</loc>
		<lastmod>2019-05-16T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-your-third-party-vendors-putting-you-at-risk/</loc>
		<lastmod>2019-05-16T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/forbes-subscribers-warned-of-magecart-threat-skimming-credit-card-details/</loc>
		<lastmod>2019-05-16T16:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-bashed/</loc>
		<lastmod>2019-05-16T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/requiescat-in-pacem-fleming-begaye-sr-us-marine-navajo-code-talker/</loc>
		<lastmod>2019-05-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/more-attacks-against-computer-automatic-update-systems/</loc>
		<lastmod>2019-05-16T18:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-guide-to-a-ceos-first-board-level-cybersecurity-report/</loc>
		<lastmod>2019-05-16T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-a-robust-acceptable-use-policy-can-set-you-free/</loc>
		<lastmod>2019-05-16T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/atlantic-council-2019-poland-cyber-security-conference-day-two/</loc>
		<lastmod>2019-05-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-whatsapp-hack/</loc>
		<lastmod>2019-05-16T19:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/luke-kingma-and-lou-patrick-mackays-futurism-catitude/</loc>
		<lastmod>2019-05-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/feds-target-100m-goznym-cybercrime-network/</loc>
		<lastmod>2019-05-16T22:05:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/weaponized-documents-its-just-a-matter-of-time-before-one-is-opened/</loc>
		<lastmod>2019-05-16T22:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/happy-birthday-wannacry/</loc>
		<lastmod>2019-05-16T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dont-let-insider-threats-rain-on-your-cloud-deployment/</loc>
		<lastmod>2019-05-16T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/key-takeaways-from-sap-sapphire-conference/</loc>
		<lastmod>2019-05-17T03:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-ugly-truth-of-retail-fraud-and-account-takeovers/</loc>
		<lastmod>2019-05-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/avast-talks-ai-at-infosecurity-mexico-2019-avast/</loc>
		<lastmod>2019-05-17T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/understanding-consumer-sentiments-about-financial-cybersecurity/</loc>
		<lastmod>2019-05-17T09:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/devsecops-best-practices/</loc>
		<lastmod>2019-05-17T10:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/decentralized-identity-and-the-path-to-digital-privacy/</loc>
		<lastmod>2019-05-17T10:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bitdefender-at-citrix-synergy-security-done-right/</loc>
		<lastmod>2019-05-17T10:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/stack-overflow-discloses-digital-attack-against-production-systems/</loc>
		<lastmod>2019-05-17T11:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ransomware-recovery-firms-often-just-pay-attackers-ransom-demands/</loc>
		<lastmod>2019-05-17T11:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/stack-overflow-confirms-production-systems-hacked/</loc>
		<lastmod>2019-05-17T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cisco-reports-critical-vulnerabilities-in-nexus-9000-data-center-switches-pi-software-and-epn-manager/</loc>
		<lastmod>2019-05-17T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/google-to-provide-a-free-replacement-key-for-its-compromised-bluetooth-low-energy-ble-titan-security-keys/</loc>
		<lastmod>2019-05-17T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-defend-against-zombieload/</loc>
		<lastmod>2019-05-17T13:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-aaron-toponces-keynote/</loc>
		<lastmod>2019-05-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whatsapp-microsoft-and-intel-chip-vulnerabilities/</loc>
		<lastmod>2019-05-17T15:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-meltdown-researchers-discover-new-hardware-vulnerability-in-modern-intel-processors/</loc>
		<lastmod>2019-05-17T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/prc-pla-navy-targeting-undersea-communications-cables/</loc>
		<lastmod>2019-05-17T17:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/congratulations-youve-won-a-meterpreter-shell/</loc>
		<lastmod>2019-05-17T18:17:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/8-security-points-of-vendor-lifecycle-management/</loc>
		<lastmod>2019-05-17T18:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/who-is-responsible-for-the-security-of-your-website/</loc>
		<lastmod>2019-05-17T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-andrew-rushan-hall-s-how-systems-engineering-can-help-cybersecurity/</loc>
		<lastmod>2019-05-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/eic-exploring-digital-identity-from-every-angle/</loc>
		<lastmod>2019-05-17T20:06:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/europol-shuts-down-goznym-malware-network-avast/</loc>
		<lastmod>2019-05-17T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/10-tips-for-engaging-a-security-services-vendor/</loc>
		<lastmod>2019-05-17T20:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-iphones-rumored-new-square-bump/</loc>
		<lastmod>2019-05-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/spotlight-podcast-fixing-supply-chain-hacks-with-strong-device-identities/</loc>
		<lastmod>2019-05-17T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/account-hijacking-forum-ogusers-hacked/</loc>
		<lastmod>2019-05-18T13:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-michael-butlers-bryce-kunz-i-find-your-lack-of-serverless-disturbing-leveraging-the-cloud-to-automate-the-mundane/</loc>
		<lastmod>2019-05-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mapping-tornado-alley-with-r/</loc>
		<lastmod>2019-05-18T15:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-a-b/</loc>
		<lastmod>2019-05-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/realtalk-we-recreated-joe-rogans-voice-using-artificial-intelligence/</loc>
		<lastmod>2019-05-18T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsides-slc-2019-bashninjas-solving-the-bsidesslc-2019-badge/</loc>
		<lastmod>2019-05-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/governments-explore-opportunities-at-national-summit-on-state-cyber-security/</loc>
		<lastmod>2019-05-19T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-erkang-zhengs-three-dimensional-security-a-graph-and-search-approach-to-security-and-compliance/</loc>
		<lastmod>2019-05-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/robert-m-lees-jeff-hass-little-bobby-comics-continuing-education/</loc>
		<lastmod>2019-05-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-stephanie-carruthers-neal-wylers-mike-spicers-tech-panel/</loc>
		<lastmod>2019-05-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ross-anderson-and-another-edition-of-security-engineering/</loc>
		<lastmod>2019-05-20T03:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/things-you-need-to-know-about-open-source-the-faq-edition/</loc>
		<lastmod>2019-05-20T03:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/critical-whatsapp-vulnerability-facial-recognition-ban-wormable-flaw-in-windows/</loc>
		<lastmod>2019-05-20T04:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-guide-to-law-firm-cybersecurity-risks-ethical-compliance/</loc>
		<lastmod>2019-05-20T07:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/black-duck-supports-securing-containers-in-red-hat-openshift-and-cri-o/</loc>
		<lastmod>2019-05-20T08:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-use-codewarrior-for-sast-step-by-step-guide/</loc>
		<lastmod>2019-05-20T09:20:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/selecting-enterprise-email-security-scaling-to-the-enterprise/</loc>
		<lastmod>2019-05-20T11:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/company-behind-leakedsource-pleads-guilty-after-rcmp-investigation/</loc>
		<lastmod>2019-05-20T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/verizons-2019-dbir-documents-over-2000-breaches/</loc>
		<lastmod>2019-05-20T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/safe-boot-violation-failure-found-on-cisco-devices/</loc>
		<lastmod>2019-05-20T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/on-premises-cloud-storage-audit-respond-to-your-hybrid-file-environment/</loc>
		<lastmod>2019-05-20T13:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bash-golf-with-whois/</loc>
		<lastmod>2019-05-20T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dont-have-your-account-hijacked-secure-your-online-accounts-with-more-than-a-password-says-google/</loc>
		<lastmod>2019-05-20T14:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-ken-westins-white-collars-black-hats-bitcoin-dark-nets-and-insider-trading/</loc>
		<lastmod>2019-05-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mothers-day-online-shoppers-were-active-and-so-were-threat-actors/</loc>
		<lastmod>2019-05-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/global-enterprise-security-spending-to-hit-103-billion-this-year/</loc>
		<lastmod>2019-05-20T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/protecting-customer-data-at-contact-centers/</loc>
		<lastmod>2019-05-20T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-your-communication-skills-holding-your-information-security-career-back/</loc>
		<lastmod>2019-05-20T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/which-states-have-the-toughest-privacy-laws/</loc>
		<lastmod>2019-05-20T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/salesforce-suffers-major-outage-providing-data-access-irrespective-of-the-permission-settings/</loc>
		<lastmod>2019-05-20T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/approx-250-public-network-users-affected-during-stack-overflows-security-attack/</loc>
		<lastmod>2019-05-20T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/asus-cloud-services-backdoor-in-motion/</loc>
		<lastmod>2019-05-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-closer-look-at-satan-ransomwares-propagation-techniques/</loc>
		<lastmod>2019-05-20T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/phishing-attacks-against-saas-webmail-services-rise-sharply-in-q1/</loc>
		<lastmod>2019-05-20T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-concept-of-return-on-data/</loc>
		<lastmod>2019-05-20T18:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-shelby-petersons-the-magic-of-rsa-cryptosystems/</loc>
		<lastmod>2019-05-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/85-of-infected-websites-are-not-blacklisted/</loc>
		<lastmod>2019-05-20T19:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/w97m-downloader-malware-dropper-served-from-compromised-websites/</loc>
		<lastmod>2019-05-20T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-phishing-attacks-are-increasingly-clever/</loc>
		<lastmod>2019-05-20T20:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-canape/</loc>
		<lastmod>2019-05-20T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/daniel-storis-oracle-download-page/</loc>
		<lastmod>2019-05-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/webinar-security-by-obscurity-the-flip-side-of-the-compliance-coin/</loc>
		<lastmod>2019-05-20T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/taming-network-chaos-by-understanding-user-behavior/</loc>
		<lastmod>2019-05-20T23:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/letting-go-while-holding-on-managing-cyber-risk-in-cloud-environments/</loc>
		<lastmod>2019-05-21T06:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/where-in-the-world-is-peter-carlisle-episode-3-sydney/</loc>
		<lastmod>2019-05-21T06:40:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/signal-sciences-launches-cloud-waf-for-easy-web-application-security/</loc>
		<lastmod>2019-05-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/five-warning-signs-you-are-at-risk-of-a-data-breach/</loc>
		<lastmod>2019-05-21T07:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cloud-security-a-shared-responsibility-shared-security-model/</loc>
		<lastmod>2019-05-21T08:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/thales-wins-cybersecurity-excellence-awards-for-encryption-and-identity-and-access-management-solutions-2/</loc>
		<lastmod>2019-05-21T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/comforte-ag-launches-new-payments-industry-data-security-solution/</loc>
		<lastmod>2019-05-21T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/aligning-security-with-patient-safety-8-insights-for-healthcare-cybersecurity-by-healthcare-cybersecurity-pros/</loc>
		<lastmod>2019-05-21T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/from-pesky-to-dangerous-image-based-spam-2/</loc>
		<lastmod>2019-05-21T11:20:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/google-working-on-ai-algorithm-that-detects-lung-cancer/</loc>
		<lastmod>2019-05-21T12:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hawkeye-attack-wave-sends-stolen-data-to-another-keylogger-provider/</loc>
		<lastmod>2019-05-21T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/add-dressbarn-to-the-continued-retailpocalypse/</loc>
		<lastmod>2019-05-21T12:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/five-key-steps-to-bring-devops-and-security-teams-into-alignment/</loc>
		<lastmod>2019-05-21T13:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-difference-between-ai-and-machine-learning/</loc>
		<lastmod>2019-05-21T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/top-4-cloud-security-certifications/</loc>
		<lastmod>2019-05-21T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/uk-human-rights-group-sues-police-over-facial-recognition-software-use/</loc>
		<lastmod>2019-05-21T13:38:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/spirent-first-to-incorporate-netsecopen-test-suite-into-security-and-performance-testing-platform/</loc>
		<lastmod>2019-05-21T13:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-privacy-is-in-the-spotlight-as-colorado-enacts-landmark-consumer-data-privacy-bill-pcdp/</loc>
		<lastmod>2019-05-21T13:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/veracode-announces-new-devops-penetration-testing-service/</loc>
		<lastmod>2019-05-21T13:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mining-cryptocurrency-at-work-lands-australian-civil-servant-in-court/</loc>
		<lastmod>2019-05-21T14:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/psd2-whats-the-fuss-about/</loc>
		<lastmod>2019-05-21T14:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bsidesslc-2019-closing-ceremony/</loc>
		<lastmod>2019-05-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/education-cybersecurity-regulations-any-suggestions/</loc>
		<lastmod>2019-05-21T15:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-strategic-approach-to-security-will-make-or-break-your-organizations-digital-transformation-initiatives/</loc>
		<lastmod>2019-05-21T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-sd-wan-solutions-help-canadian-schools-with-wan-edge-transformation/</loc>
		<lastmod>2019-05-21T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/key-takeaways-from-our-latest-global-threat-landscape-report/</loc>
		<lastmod>2019-05-21T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/google-utilizing-consumer-gmail-accounts-to-track-purchases-financial-transactions/</loc>
		<lastmod>2019-05-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tufin-extends-automation-leadership-in-support-of-digital-transformation-initiatives-with-an-end-to-manual-cloning-of-server-policies/</loc>
		<lastmod>2019-05-21T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-wordpress-file-integrity-scanning-why-your-site-needs-it/</loc>
		<lastmod>2019-05-21T18:05:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/modern-database-security-buys-down-more-risks-for-enterprises/</loc>
		<lastmod>2019-05-21T18:37:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-christina-mitchells-d-02-understanding-xss/</loc>
		<lastmod>2019-05-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/12000-unsecured-mongodb-databases-deleted-by-unistellar-attackers/</loc>
		<lastmod>2019-05-21T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gdpr-complaint-in-eu-claim-billions-of-personal-data-leaked-via-online-advertising-bids/</loc>
		<lastmod>2019-05-21T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/core-security-features-of-elastic-stack-are-now-free/</loc>
		<lastmod>2019-05-21T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-after-game-of-thrones-now-what/</loc>
		<lastmod>2019-05-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/iot-traffic-in-the-enterprise-is-rising-so-are-the-threats/</loc>
		<lastmod>2019-05-21T21:21:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nist-cybersecurity-framework-tool-critical-capabilities-to-look-out-for/</loc>
		<lastmod>2019-05-21T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/getting-to-know-the-new-rsac-advisory-board-members-dawn-cappelli/</loc>
		<lastmod>2019-05-21T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/zombieload-affects-data-centers-and-heres-what-you-can-do-about-it/</loc>
		<lastmod>2019-05-21T22:37:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sast-iast-the-power-couple-in-the-devsecops-era/</loc>
		<lastmod>2019-05-21T22:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-state-of-cybersecurity-in-the-physical-security-industry/</loc>
		<lastmod>2019-05-21T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-key-considerations-in-choosing-a-ddos-mitigation-network/</loc>
		<lastmod>2019-05-21T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/value-added-distributor-rain-networks-chooses-cloudcare-for-its-distribution-portfolio/</loc>
		<lastmod>2019-05-22T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/network-segmentation-in-the-cloud-mission-impossible/</loc>
		<lastmod>2019-05-22T02:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/swimlane-research-team-open-sources-py-ews/</loc>
		<lastmod>2019-05-22T05:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/european-businesses-signal-growing-security-gap-amid-mass-digital-transformation/</loc>
		<lastmod>2019-05-22T07:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/top-exploit-kit-activity-roundup-spring-2019/</loc>
		<lastmod>2019-05-22T07:13:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/one-year-later-first-gdpr-execution-overview-reveals-theres-still-work-to-do/</loc>
		<lastmod>2019-05-22T08:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/slimstat-stored-xss-from-visitors/</loc>
		<lastmod>2019-05-22T08:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-use-nikto-for-dast/</loc>
		<lastmod>2019-05-22T09:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/database-of-49-million-instagram-influencers-leaked-online/</loc>
		<lastmod>2019-05-22T10:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/computer-infected-with-6-high-profile-viruses-surpasses-1m-in-auction/</loc>
		<lastmod>2019-05-22T11:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/economics-of-load-balancing-when-transitioning-to-the-cloud/</loc>
		<lastmod>2019-05-22T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/improved-stable-tor-browser-released-for-android/</loc>
		<lastmod>2019-05-22T12:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/betting-big-on-casb-bitglass-at-evolve/</loc>
		<lastmod>2019-05-22T12:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/20-best-continuous-integration-tools-a-guide-to-optimizing-your-ci-cd-processes/</loc>
		<lastmod>2019-05-22T13:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/google-stored-business-customers-passwords-in-plaintext-on-its-servers-for-14-years/</loc>
		<lastmod>2019-05-22T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-reporting-requirements-under-arkansas-data-breach-law/</loc>
		<lastmod>2019-05-22T14:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/akamai-receives-a-loyalty360-top-10-award/</loc>
		<lastmod>2019-05-22T14:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/application-security-best-practices/</loc>
		<lastmod>2019-05-22T14:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/enabling-breach-prevention-with-the-fortiguard-security-rating-service/</loc>
		<lastmod>2019-05-22T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-michele-bousquets-c-14-elliptic-curve-cryptography-what-it-is-and-who-needs-it/</loc>
		<lastmod>2019-05-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-on-millions-of-instagram-accounts-spills-onto-the-internet/</loc>
		<lastmod>2019-05-22T15:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-workforce-development-by-helen-patton/</loc>
		<lastmod>2019-05-22T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-generation-robots-txt-apple-app-site-association/</loc>
		<lastmod>2019-05-22T16:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/yubikey-the-weaponization-thereof/</loc>
		<lastmod>2019-05-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-ireland-too-soft-with-gdpr-enforcement-or-just-being-prudent/</loc>
		<lastmod>2019-05-22T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/design-it-dfir-it-win-it-wear-it/</loc>
		<lastmod>2019-05-22T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/private-tunnel-has-a-new-pricing-plan/</loc>
		<lastmod>2019-05-22T18:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cryptography-is-changing-fast-and-cyber-security-pros-are-best-advised-to-stay-ahead-of-the-curve/</loc>
		<lastmod>2019-05-22T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-damon-j-smalls-c-13-the-jazz-improv-of-infosec/</loc>
		<lastmod>2019-05-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/protect-your-legacy-and-modern-applications-using-a-single-solution/</loc>
		<lastmod>2019-05-22T19:09:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/visiting-the-nsa/</loc>
		<lastmod>2019-05-22T19:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/legal-threats-make-powerful-phishing-lures/</loc>
		<lastmod>2019-05-22T19:26:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-are-public-and-private-key-pairs-and-how-do-they-work/</loc>
		<lastmod>2019-05-22T20:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/three-veracode-leaders-honored-among-crns-2019-women-of-the-channel/</loc>
		<lastmod>2019-05-22T20:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-westerns/</loc>
		<lastmod>2019-05-22T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/guardrails-to-innovate-and-stay-secure-in-the-cloud-2/</loc>
		<lastmod>2019-05-22T21:24:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/efficient-device-onboarding-for-higher-education/</loc>
		<lastmod>2019-05-22T22:19:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/libraries-and-frameworks-to-help-you-create-secure-code/</loc>
		<lastmod>2019-05-23T04:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/darktrace-and-vectra-product-overviews/</loc>
		<lastmod>2019-05-23T04:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/endpoint-security-its-a-whole-new-world/</loc>
		<lastmod>2019-05-23T05:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-intelligence-know-thy-adversary/</loc>
		<lastmod>2019-05-23T08:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/your-account-has-been-locked-7-telltale-signs-of-a-phishing-scam/</loc>
		<lastmod>2019-05-23T11:45:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/free-decryptor-released-for-getcrypt-ransomware/</loc>
		<lastmod>2019-05-23T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/crn-recognizes-five-thales-women-in-their-2019-women-of-the-channel-awards/</loc>
		<lastmod>2019-05-23T13:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-financial-implications-of-online-video-quality/</loc>
		<lastmod>2019-05-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/defining-the-full-stack-in-full-stack-security-observability/</loc>
		<lastmod>2019-05-23T13:18:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-securely-share-certificates-with-your-cloud-security-provider/</loc>
		<lastmod>2019-05-23T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/deployment-diversity-for-dns-resiliency/</loc>
		<lastmod>2019-05-23T13:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/take-control-of-your-cloudhsm-migration-plan/</loc>
		<lastmod>2019-05-23T14:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-good-the-bad-and-the-unexpected-what-gdpr-has-taught-us-in-the-last-year/</loc>
		<lastmod>2019-05-23T14:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/baltimore-struggles-to-rebuild-systems-after-refusing-to-pay-bitcoin-ransom/</loc>
		<lastmod>2019-05-23T14:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/these-are-the-top-most-targeted-countries-by-phishing-attacks/</loc>
		<lastmod>2019-05-23T14:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/developing-an-effective-change-management-program/</loc>
		<lastmod>2019-05-23T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sodinokibi-ransomware-poised-to-impact-larger-enterprises/</loc>
		<lastmod>2019-05-23T14:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-phoenix-snokes-dont-panic-a-beginners-guide-to-hardware-hacking/</loc>
		<lastmod>2019-05-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sensorid-attack-calibration-fingerprinting-that-can-easily-trace-your-ios-and-android-phones-study-reveals/</loc>
		<lastmod>2019-05-23T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tp-link-kept-thousands-of-vulnerable-routers-at-risk-of-remote-hijack-failed-to-alert-customers/</loc>
		<lastmod>2019-05-23T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gdpr-and-the-cloud-three-essential-functions/</loc>
		<lastmod>2019-05-23T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/thangrycat-a-serious-cisco-vulnerability/</loc>
		<lastmod>2019-05-23T16:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/five-ways-messaging-in-home-healthcare-improves-patient-care/</loc>
		<lastmod>2019-05-23T16:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/lips-a-looseness-thereof/</loc>
		<lastmod>2019-05-23T17:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/egyptian-ddos-campaign-observations/</loc>
		<lastmod>2019-05-23T17:57:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/states-explore-opportunities-at-national-summit-on-cybersecurity/</loc>
		<lastmod>2019-05-23T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/chrome-tightens-csrf-protection/</loc>
		<lastmod>2019-05-23T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/visit-us-at-the-national-homeland-security-conference-2019/</loc>
		<lastmod>2019-05-23T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/preventing-ntp-reflection-attacks/</loc>
		<lastmod>2019-05-23T18:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/acunetix-vulnerability-scanner-now-with-network-security-scans/</loc>
		<lastmod>2019-05-23T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-build-includes-new-network-scanning-integration-ipv6-support-improved-resource-usage-and-many-new-vulnerability-checks/</loc>
		<lastmod>2019-05-23T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/configuring-your-web-server-to-not-disclose-its-identity/</loc>
		<lastmod>2019-05-23T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-persistent-xss/</loc>
		<lastmod>2019-05-23T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-is-source-code-disclosure-dangerous/</loc>
		<lastmod>2019-05-23T18:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-hsts-and-why-should-i-use-it/</loc>
		<lastmod>2019-05-23T18:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-role-of-finance-in-securing-the-sme/</loc>
		<lastmod>2019-05-23T18:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-stop-email-fraud-the-costliest-cybercrime/</loc>
		<lastmod>2019-05-23T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-aaron-ringos-my-making-of-a-metasploit-module/</loc>
		<lastmod>2019-05-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gemalto-partners-security-champions-that-accelerated-organisations-digital-growth/</loc>
		<lastmod>2019-05-23T19:45:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cve-2019-0708-remote-desktop-protocol-and-remote-code-execution-bluekeep/</loc>
		<lastmod>2019-05-23T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/can-legislation-save-iot-security/</loc>
		<lastmod>2019-05-23T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-need-for-speed-key-takeaways-from-the-fs-isac-annual-summit/</loc>
		<lastmod>2019-05-23T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/using-nist-800-30-to-implement-the-nist-cybersecurity-framework/</loc>
		<lastmod>2019-05-23T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/luke-kingma-and-lou-patrick-mackays-futurism-mech-suit/</loc>
		<lastmod>2019-05-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infocyte-launches-first-agentless-cloud-workload-protection-platform/</loc>
		<lastmod>2019-05-23T21:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cross-site-scripting-xss-web-based-application-security-part-3/</loc>
		<lastmod>2019-05-23T21:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/paving-your-way-through-sap-digital-transformation-part-3/</loc>
		<lastmod>2019-05-23T22:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tips-for-recruiting-top-cyber-security-talent-and-mistakes-to-avoid/</loc>
		<lastmod>2019-05-24T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/htaccess-injector-on-joomla-and-wordpress-websites/</loc>
		<lastmod>2019-05-24T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-poison/</loc>
		<lastmod>2019-05-24T01:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-secure-your-box-3/</loc>
		<lastmod>2019-05-24T02:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/remotely-killing-car-engines-password-expiration-policies-facial-recognition-at-airports-infosec-vs-cybersecurity/</loc>
		<lastmod>2019-05-24T04:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/microsoft-vulnerability-source-code-published-for-three-zero-day-vulnerabilities-in-windows-2/</loc>
		<lastmod>2019-05-24T05:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/one-year-after-gdpr-significant-rise-on-data-breach-reporting-from-european-businesses-2/</loc>
		<lastmod>2019-05-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/deutsche-banks-decade-old-faulty-software-may-have-stopped-it-from-reporting-suspicious-transactions/</loc>
		<lastmod>2019-05-24T07:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infocyte-launches-first-agentless-cloud-workload-protection-platform-strengthens-check-point-softwares-threat-detection-and-incident-response-capabilities-in-dynamic-aws-environments/</loc>
		<lastmod>2019-05-24T08:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/customer-details-from-2015-talktalk-breach-found-on-google/</loc>
		<lastmod>2019-05-24T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/facebook-says-5-of-monthly-active-accounts-are-fake-deletes-3b-in-6-months/</loc>
		<lastmod>2019-05-24T11:12:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/adding-a-recovery-phone-number-blocks-100-of-automated-bot-attacks-finds-google/</loc>
		<lastmod>2019-05-24T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-internet-knows-your-every-move-this-is-why-you-should-care/</loc>
		<lastmod>2019-05-24T12:37:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/snapchat-workers-snooped-on-users-with-internal-tool/</loc>
		<lastmod>2019-05-24T13:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/grumpy-hackers/</loc>
		<lastmod>2019-05-24T13:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fbi-internet-fueled-theft-fraud-and-exploitation-reaches-cost-of-2-7-billion/</loc>
		<lastmod>2019-05-24T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/pci-pal-awarded-best-pci-compliance-provider-at-cnp-2019/</loc>
		<lastmod>2019-05-24T14:57:04+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->