<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/05/tapping-veterans-unique-skillset-to-fill-the-cybersecurity-talent-pool/</loc>
		<lastmod>2019-05-24T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-josh-schwartzs-samantha-davis-behavioral-security-and-offensive-psychology-at-scale/</loc>
		<lastmod>2019-05-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/notable-gdpr-enforcement-actions-in-the-first-year-and-key-takeaways/</loc>
		<lastmod>2019-05-24T15:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/build-bikes-and-go-fast-why-building-bikes-is-critical-to-impervas-success/</loc>
		<lastmod>2019-05-24T16:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-can-companies-and-individuals-best-protect-themselves-against-cybercrime/</loc>
		<lastmod>2019-05-24T16:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/have-new-privacy-laws-like-gdpr-changed-how-we-secure-data/</loc>
		<lastmod>2019-05-24T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-chainsplaining/</loc>
		<lastmod>2019-05-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/samesite-cookies-by-default-in-chrome-76-and-above/</loc>
		<lastmod>2019-05-24T17:10:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/analysing-a-massive-office-365-phishing-campaign/</loc>
		<lastmod>2019-05-24T17:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-are-code-quality-and-code-security-related/</loc>
		<lastmod>2019-05-24T17:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/secure-the-wrong-path-or-change-the-path/</loc>
		<lastmod>2019-05-24T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cyber-attacks-remain-a-high-risk-and-more-enterprises-are-buying-insurance-for-protection/</loc>
		<lastmod>2019-05-24T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-jeff-mans-more-tales-from-the-cryptanalyst/</loc>
		<lastmod>2019-05-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-your-vendors-compromising-your-compliance-2/</loc>
		<lastmod>2019-05-24T20:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-cloud-security-posture-management-cspm-2/</loc>
		<lastmod>2019-05-24T20:36:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/first-american-financial-corp-leaked-hundreds-of-millions-of-title-insurance-records/</loc>
		<lastmod>2019-05-24T20:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/when-ai-classifies-pokemon-go-as-child-pornography/</loc>
		<lastmod>2019-05-24T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-effects-of-high-altitude/</loc>
		<lastmod>2019-05-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/one-year-later-has-gdpr-really-been-that-big-of-a-deal/</loc>
		<lastmod>2019-05-24T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cell-network-freedom-mobile-exposes-data-2/</loc>
		<lastmod>2019-05-24T21:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-many-reports-does-it-take-to-make-sense-of-your-data-2/</loc>
		<lastmod>2019-05-25T00:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/snaplion-an-internal-tool-snapchat-employees-abused-to-spy-on-user-data/</loc>
		<lastmod>2019-05-25T05:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-use-nodejsscan-for-sast-step-by-step-guide/</loc>
		<lastmod>2019-05-25T07:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-evan-wagners-ir-with-volatility-framework/</loc>
		<lastmod>2019-05-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-how-huawei-is-characterized/</loc>
		<lastmod>2019-05-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/addressing-the-challenges-of-aws-security/</loc>
		<lastmod>2019-05-25T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/tp-link-router-vulnerability-and-more-news-avast/</loc>
		<lastmod>2019-05-25T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-josh-stones-waiter-theres-a-compiler-in-my-shellcode/</loc>
		<lastmod>2019-05-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-brett-gravois-lets-talk-about-waf-bypass-baby/</loc>
		<lastmod>2019-05-26T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/iso-27001-for-startups-is-it-worth-investing-in-2/</loc>
		<lastmod>2019-05-26T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/robert-m-lees-jeff-hass-little-bobby-comics-apt-is-coming/</loc>
		<lastmod>2019-05-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-yolanda-smiths-empathy-for-the-developer-lessons-learned-building-an-application-security-module/</loc>
		<lastmod>2019-05-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/two-new-ways-to-make-dns-over-https-queries-in-r/</loc>
		<lastmod>2019-05-26T19:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/equifax-downgraded-huawei-ban-google-is-tracking-your-purchases/</loc>
		<lastmod>2019-05-27T04:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-for-2020-elections-avast/</loc>
		<lastmod>2019-05-27T04:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/lest-we-forget-all-gave-some-some-gave-all/</loc>
		<lastmod>2019-05-27T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/slither-the-leading-static-analyzer-for-smart-contracts/</loc>
		<lastmod>2019-05-27T10:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/google-cuts-baltimore-off-gmail-as-city-officials-struggle-with-robinhood-ransomware-aftermath/</loc>
		<lastmod>2019-05-27T13:48:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-a-new-wave-of-cryptocurrencies-coming-soon/</loc>
		<lastmod>2019-05-27T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fraud-trends-from-the-latest-threatmetrix-cybercrime-report/</loc>
		<lastmod>2019-05-27T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/a-lesson-in-journalism-vs-cybersecurity/</loc>
		<lastmod>2019-05-27T23:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/webinar-vulnerabilities-in-containerised-production-environments/</loc>
		<lastmod>2019-05-28T02:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/return-to-the-city-of-cron-malware-infections-on-joomla-and-wordpress/</loc>
		<lastmod>2019-05-28T05:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/whats-going-on-at-infosecurity-2019-tripwire-edition/</loc>
		<lastmod>2019-05-28T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-language-of-risk-bridging-the-disconnect-between-the-c-suite-and-cyber-security-experts/</loc>
		<lastmod>2019-05-28T05:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gdpr-is-a-year-old-do-you-know-where-your-customer-data-is/</loc>
		<lastmod>2019-05-28T07:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-essential-checklist-for-cloud-security/</loc>
		<lastmod>2019-05-28T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-iso-27001-accreditation-worth-it/</loc>
		<lastmod>2019-05-28T09:02:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-why-and-wherefore-of-cybersecurity-risk/</loc>
		<lastmod>2019-05-28T10:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/almost-one-million-vulnerable-to-bluekeep-vuln-cve-2019-0708/</loc>
		<lastmod>2019-05-28T10:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/caploader-1-8-released/</loc>
		<lastmod>2019-05-28T10:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/6-of-professionals-feel-personal-data-is-actually-less-protected-under-gdpr/</loc>
		<lastmod>2019-05-28T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-emotet-ion-game-part-3/</loc>
		<lastmod>2019-05-28T11:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/3-ways-norsk-hydro-kept-its-reputation-during-lockergoga-cyberattack/</loc>
		<lastmod>2019-05-28T12:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/6-common-flaws-that-can-emerge-in-a-network-security-strategy-over-time/</loc>
		<lastmod>2019-05-28T13:27:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/do-student-privacy-laws-fix-privacy-flaws/</loc>
		<lastmod>2019-05-28T14:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/first-american-financial-corp-data-records-leak/</loc>
		<lastmod>2019-05-28T14:59:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-jim-allees-baking-your-anomalous-cookies/</loc>
		<lastmod>2019-05-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/protecting-the-new-online-frontiers-akamai-on-watch/</loc>
		<lastmod>2019-05-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/windows-10-start-screen-cleanup-is-easier-than-you-think/</loc>
		<lastmod>2019-05-28T15:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-become-a-cybersecurity-consultant/</loc>
		<lastmod>2019-05-28T15:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/job-outlook-for-pmp-certification-holders/</loc>
		<lastmod>2019-05-28T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-career-paths/</loc>
		<lastmod>2019-05-28T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infonomics-based-model-teaches-cisos-how-to-assess-their-datas-financial-risk-invest-properly-in-data-security/</loc>
		<lastmod>2019-05-28T16:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/is-there-hope-for-a-better-password-experience/</loc>
		<lastmod>2019-05-28T16:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/security-for-the-networks-of-tomorrow/</loc>
		<lastmod>2019-05-28T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-secure-your-information-on-aws-10-best-practices/</loc>
		<lastmod>2019-05-28T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/digital-criminals-abusing-secure-tunneling-service-to-deliver-lokibot/</loc>
		<lastmod>2019-05-28T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-evaluation-stage-4-determining-the-outcome/</loc>
		<lastmod>2019-05-28T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-unenforceables/</loc>
		<lastmod>2019-05-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/selecting-enterprise-email-security-the-buying-process/</loc>
		<lastmod>2019-05-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/canva-faced-security-breach-139-million-users-data-hacked-zdnet-reports/</loc>
		<lastmod>2019-05-28T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/women-in-tech-progress-but-still-not-parity/</loc>
		<lastmod>2019-05-28T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/analyst-burnout-what-does-it-look-like-and-how-can-soar-help/</loc>
		<lastmod>2019-05-28T17:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/analyst-burnout-what-does-it-look-like-and-how-can-swimlane-help/</loc>
		<lastmod>2019-05-28T17:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/uk-pub-chain-greene-king-gift-card-website-hacked/</loc>
		<lastmod>2019-05-28T18:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/disrupting-an-attacker-from-exploiting-domain-credentials/</loc>
		<lastmod>2019-05-28T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ssrf-and-xxe-vulnerabilities-in-pdfreactor/</loc>
		<lastmod>2019-05-28T18:51:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/health-care-digitalization-brings-new-security-challenges/</loc>
		<lastmod>2019-05-28T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-sophia-fadlis-joe-grays-forensics-phish-tank-breaking-down-analysis-of-advanced-phishing-emails/</loc>
		<lastmod>2019-05-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/developer-dilemma-where-does-the-security-knowledge-gap-come-from-and-how-do-we-fix-it/</loc>
		<lastmod>2019-05-28T19:25:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/it-security-made-in-germany-a-promise-of-trust-privacy/</loc>
		<lastmod>2019-05-28T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/one-year-later-what-were-the-biggest-gdpr-fines/</loc>
		<lastmod>2019-05-28T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/an-integrated-risk-management-approach-needs-and-goes-beyond-irm-tools/</loc>
		<lastmod>2019-05-28T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-motivation/</loc>
		<lastmod>2019-05-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-smbs-too-small-to-be-breached/</loc>
		<lastmod>2019-05-28T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/credential-stuffing-attacks-vs-brute-force-attacks/</loc>
		<lastmod>2019-05-29T02:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/malta-a-i-blockchain-summit-2019-highlights/</loc>
		<lastmod>2019-05-29T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-protection-needs-to-be-put-on-steroids/</loc>
		<lastmod>2019-05-29T10:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-price-of-loyalty-almost-half-of-uk-office-workers-are-willing-to-sell-companys-information/</loc>
		<lastmod>2019-05-29T10:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cnp-expo-2019-in-review/</loc>
		<lastmod>2019-05-29T11:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/eternalblue-worm-still-claiming-victims-two-years-after-wannacry-and-notpetya/</loc>
		<lastmod>2019-05-29T11:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/flipboard-resets-users-passwords-after-discovering-security-incident/</loc>
		<lastmod>2019-05-29T11:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/new-rocke-variant-ready-to-box-any-mining-challengers/</loc>
		<lastmod>2019-05-29T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/are-darknet-take-downs-effective/</loc>
		<lastmod>2019-05-29T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/sven-morgenroth-netsparker-application-security-weekly-60/</loc>
		<lastmod>2019-05-29T13:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-rise-in-mobile-phishing-attacks/</loc>
		<lastmod>2019-05-29T13:42:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bitglass-security-spotlight-g-suite-user-passwords-stored-in-plaintext/</loc>
		<lastmod>2019-05-29T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-brent-whites-tim-roberts-breaking-into-your-building-a-hackers-guide-to-unauthorized-physical-access/</loc>
		<lastmod>2019-05-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/all-docker-versions-are-now-vulnerable-to-a-symlink-race-attack/</loc>
		<lastmod>2019-05-29T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/time-to-discovery-is-a-security-pain-point-2/</loc>
		<lastmod>2019-05-29T16:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-hunting-with-saltopen/</loc>
		<lastmod>2019-05-29T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/creating-your-personal-incident-response-plan/</loc>
		<lastmod>2019-05-29T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/system-administrator-vs-cloud-administrator/</loc>
		<lastmod>2019-05-29T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/facebookery-all-the-many-datas-of-zuckerberg/</loc>
		<lastmod>2019-05-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/should-failing-phish-tests-be-a-fireable-offense/</loc>
		<lastmod>2019-05-29T17:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-chris-holts-formula-for-a-bug-bounty-program/</loc>
		<lastmod>2019-05-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/do-you-have-the-right-tools-in-your-application-security-toolkit/</loc>
		<lastmod>2019-05-29T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cybersecurity-career-paths-overview/</loc>
		<lastmod>2019-05-29T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/malicious-javascript-injected-into-wordpress-sites-using-the-latest-plugin-vulnerability/</loc>
		<lastmod>2019-05-29T20:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-joy-of-tech-technology-is-ruining-our-kids/</loc>
		<lastmod>2019-05-29T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/4-takeaways-for-cisos-from-the-fortinet-global-threat-landscape-report/</loc>
		<lastmod>2019-05-29T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/when-old-vulnerabilities-rise-to-critical/</loc>
		<lastmod>2019-05-29T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/handling-of-digitally-signed-notes/</loc>
		<lastmod>2019-05-29T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/an-open-letter-to-puresecs-clients-partners-and-friends/</loc>
		<lastmod>2019-05-29T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-your-smartphone-tracks-your-movement-avast/</loc>
		<lastmod>2019-05-29T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/managing-your-security-logs-more-than-just-set-and-forget/</loc>
		<lastmod>2019-05-29T23:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/your-threat-model-is-wrong/</loc>
		<lastmod>2019-05-30T00:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/php-backdoor-evaluates-xor-encrypted-requests/</loc>
		<lastmod>2019-05-30T01:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/kickstarting-your-idaptive-mfa-integration-with-cortex-by-palo-alto-networks/</loc>
		<lastmod>2019-05-30T02:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/journey-to-oscp-10-things-you-need-to-know/</loc>
		<lastmod>2019-05-30T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/signal-sciences-launches-next-gen-waf-support-for-envoy/</loc>
		<lastmod>2019-05-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/seven-microservices-identity-questions-to-secure-your-data/</loc>
		<lastmod>2019-05-30T07:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/swimlane-raises-23m-of-series-b-funding-from-leading-energy-sector-venture-firm-energy-impact-partners/</loc>
		<lastmod>2019-05-30T07:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/swimlane-raises-23m-of-series-b-funding/</loc>
		<lastmod>2019-05-30T07:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/itproportal-feature-how-penetration-testing-can-help-secure-your-companys-infrastructure/</loc>
		<lastmod>2019-05-30T08:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/announcing-automated-reverse-engineering-trainings/</loc>
		<lastmod>2019-05-30T11:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/checkers-says-data-breach-affected-100-locations/</loc>
		<lastmod>2019-05-30T12:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dast-v-sast-which-one-is-better/</loc>
		<lastmod>2019-05-30T12:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/spotlight-on-administrator-rights-and-privileged-credential-theft/</loc>
		<lastmod>2019-05-30T13:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/cjis-requirements-what-businesses-need-to-know/</loc>
		<lastmod>2019-05-30T13:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/capsule8-names-scott-kenerly-as-chief-financial-officer/</loc>
		<lastmod>2019-05-30T13:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/infoblox-unveils-simplified-security-platform-to-detect-and-stop-threats-in-todays-borderless-networks/</loc>
		<lastmod>2019-05-30T13:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-become-a-cybersecurity-manager/</loc>
		<lastmod>2019-05-30T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/information-security-career-resume-tips/</loc>
		<lastmod>2019-05-30T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hack-the-box-htb-machines-walkthrough-series-apocalyst/</loc>
		<lastmod>2019-05-30T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/frame-injection-attacks/</loc>
		<lastmod>2019-05-30T14:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fraudulent-academic-papers/</loc>
		<lastmod>2019-05-30T14:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/hiddenwasp-malware-seizes-control-of-linux-systems/</loc>
		<lastmod>2019-05-30T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-jayson-e-streets-keynote-i-pwn-thee-i-pwn-thee-not/</loc>
		<lastmod>2019-05-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/balance-content-security-and-content-access-with-granular-governance/</loc>
		<lastmod>2019-05-30T15:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/back-into-the-web-of-profit-going-undercover-in-the-dark-net-uncovering-threats-to-the-enterprise/</loc>
		<lastmod>2019-05-30T15:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/network-slicing-not-as-dicey-as-you-might-think/</loc>
		<lastmod>2019-05-30T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/brute-force-attacks-on-iot-here-to-stay/</loc>
		<lastmod>2019-05-30T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/five-things-you-should-know-about-the-whatsapp-hack/</loc>
		<lastmod>2019-05-30T15:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-future-of-cybersecurity-is-artificial-intelligence-will-transform-enterprise-governance/</loc>
		<lastmod>2019-05-30T16:23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/karas-analysis-its-fakebook/</loc>
		<lastmod>2019-05-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/current-trends-in-automated-software-testing/</loc>
		<lastmod>2019-05-30T17:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-cost-of-doing-nothing/</loc>
		<lastmod>2019-05-30T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/web-security-leader-rapidly-expands-by-partnering-with-aws-and-imperva/</loc>
		<lastmod>2019-05-30T18:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-is-single-sign-on-sso/</loc>
		<lastmod>2019-05-30T18:26:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-cybersecurity-workforce-executive-order-real-potential-or-wishful-thinking/</loc>
		<lastmod>2019-05-30T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-paul-w-brager-jr-s-after-mirai-cyber-security-implications-of-iot-botnet-proliferation-against-critical-infrastructure/</loc>
		<lastmod>2019-05-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/gaming-industry-exploits-user-addiction-avast/</loc>
		<lastmod>2019-05-30T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/find-relief-in-a-good-malware-policy/</loc>
		<lastmod>2019-05-30T20:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/its-2019-and-most-cisos-at-financial-institutions-demand-bigger-cybersecurity-budgets/</loc>
		<lastmod>2019-05-30T20:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/securing-the-transformation-to-the-sd-wan-powered-branch/</loc>
		<lastmod>2019-05-30T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/over-185000-payment-card-details-stolen-by-magecart/</loc>
		<lastmod>2019-05-30T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/xkcd-swimming/</loc>
		<lastmod>2019-05-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/integrating-governance-risk-and-compliance/</loc>
		<lastmod>2019-05-30T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/canada-uses-civil-anti-spam-law-in-bid-to-fine-malware-purveyors/</loc>
		<lastmod>2019-05-30T22:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/dolos-dns-rebiner-what-you-need-to-know/</loc>
		<lastmod>2019-05-31T04:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fuzzing-unit-tests-with-deepstate-and-eclipser/</loc>
		<lastmod>2019-05-31T11:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/apple-releases-firmware-security-updates-for-airport-base-stations/</loc>
		<lastmod>2019-05-31T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/checkers-restaurant-chain-warns-customers-that-hackers-have-their-credit-cards/</loc>
		<lastmod>2019-05-31T12:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-intelligence-and-the-evolving-threat-landscape/</loc>
		<lastmod>2019-05-31T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/ny-investigates-exposure-of-885-million-mortgage-documents/</loc>
		<lastmod>2019-05-31T13:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/acme-protocol-what-it-is-and-how-it-works/</loc>
		<lastmod>2019-05-31T14:27:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/next-generation-cyber-threats-images-2/</loc>
		<lastmod>2019-05-31T14:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-josh-harveys-making-an-internal-lets-encrypt-relay-server/</loc>
		<lastmod>2019-05-31T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/pypi-announces-2fa-for-securing-python-package-downloads/</loc>
		<lastmod>2019-05-31T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/making-a-command-line-html-rendering-script-for-the-art-of-the-command-line-in-r/</loc>
		<lastmod>2019-05-31T15:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/salesforce-outage-highlights-why-backup-is-critical/</loc>
		<lastmod>2019-05-31T15:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/using-osquery-for-remote-forensics/</loc>
		<lastmod>2019-05-31T15:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/bens-book-of-the-month-review-of-cult-of-the-dead-cow-how-the-original-hacking-supergroup-might-just-save-the-world/</loc>
		<lastmod>2019-05-31T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/exit-stage-left/</loc>
		<lastmod>2019-05-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/10-ways-a-business-associate-can-trigger-hipaa-enforcement/</loc>
		<lastmod>2019-05-31T18:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/nolacon-2019-erika-noerenbergs-its-malware-time-a-bar-crawl-from-skunked-homebrew-to-rotten-apples/</loc>
		<lastmod>2019-05-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/why-alert-logic-siemless-threat-management-makes-sense-for-your-bottom-line/</loc>
		<lastmod>2019-05-31T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/should-you-buy-a-piece-of-siem/</loc>
		<lastmod>2019-05-31T19:33:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/synopsys-software-integrity-group-receives-red-hat-partner-award/</loc>
		<lastmod>2019-05-31T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-to-find-the-right-identity-and-access-management-tools/</loc>
		<lastmod>2019-05-31T20:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/daniel-storis-checksum/</loc>
		<lastmod>2019-05-31T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/wordpress-hacks-5-ways-to-protect-wordpress-from-hacking/</loc>
		<lastmod>2019-05-31T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/could-a-new-wave-of-cryptocurrencies-be-on-the-horizon/</loc>
		<lastmod>2019-05-31T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/some-raspberry-pi-compatible-computers/</loc>
		<lastmod>2019-06-01T00:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/data-breach-victim-sues-first-american-financial-avast/</loc>
		<lastmod>2019-06-01T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/mfa-is-no-cure-for-phishing/</loc>
		<lastmod>2019-06-01T03:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/where-in-the-world-is-peter-carlisle-episode-4-milan/</loc>
		<lastmod>2019-06-01T06:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nolacon-2019-jim-nitterauers-dns-strategies-for-reducing-data-leakage-protecting-online-privacy/</loc>
		<lastmod>2019-06-01T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/get-your-head-in-the-clouds/</loc>
		<lastmod>2019-06-01T16:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-ufo/</loc>
		<lastmod>2019-06-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nolacon-2019-evil-mogs-automating-hashtopolis/</loc>
		<lastmod>2019-06-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sms-phish-amazon-reward/</loc>
		<lastmod>2019-06-01T19:12:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/php-security-guide/</loc>
		<lastmod>2019-06-01T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/secure-your-node-js-env-files/</loc>
		<lastmod>2019-06-01T23:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quick-hit-handling-cocoa-core-data-timestamps-in-r/</loc>
		<lastmod>2019-06-02T00:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-uk-government-huawei-dilemma-and-the-brexit-factor/</loc>
		<lastmod>2019-06-02T02:15:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-to-blame-or-not-to-blame/</loc>
		<lastmod>2019-06-02T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nolacon-2019-april-c-wrights-social-engineering-at-work-how-to-use-positive-influence-to-gain-management-buy-in-for-anything/</loc>
		<lastmod>2019-06-02T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/trawling-through-ios-backups-for-treasure-a-k-a-how-to-fish-for-target-files-in-ios-backups-with-r/</loc>
		<lastmod>2019-06-02T16:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/robert-m-lees-jeff-hass-little-bobby-comics-limited-authority/</loc>
		<lastmod>2019-06-02T17:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyber-security-roundup-for-may-2019/</loc>
		<lastmod>2019-06-02T18:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nolacon-2019-nancy-snokes-one-random-insecure-web-application-please-oriwap/</loc>
		<lastmod>2019-06-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-practical-digital-library-updated/</loc>
		<lastmod>2019-06-02T23:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-to-blame-or-not-to-blame-in-baltimore-cyberattack/</loc>
		<lastmod>2019-06-03T00:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tripwire-patch-priority-index-for-may-2019/</loc>
		<lastmod>2019-06-03T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/revisiting-the-risk-management-framework-in-light-of-revision-2/</loc>
		<lastmod>2019-06-03T03:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-rampage-mobile-phishing-attacks-iphone-app-ad-trackers/</loc>
		<lastmod>2019-06-03T04:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-become-an-apt-hunter-with-carbon-black/</loc>
		<lastmod>2019-06-03T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-importance-of-protecting-cybersecurity-whistleblowers/</loc>
		<lastmod>2019-06-03T11:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/unpatched-vulnerabilities-caused-breaches-in-27-of-orgs-finds-study/</loc>
		<lastmod>2019-06-03T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/eurofins-scientific-says-ransomware-attack-disrupted-some-it-systems/</loc>
		<lastmod>2019-06-03T12:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/i-am-the-one-who-knocks-device-posture-and-detecting-the-danger-in-your-devices/</loc>
		<lastmod>2019-06-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/applicants-must-give-up-social-media-privacy-for-us-visa-approval/</loc>
		<lastmod>2019-06-03T13:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/four-essential-cloud-security-concepts/</loc>
		<lastmod>2019-06-03T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/critical-strategies-for-staying-ahead-of-emerging-cyberthreats/</loc>
		<lastmod>2019-06-03T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-send-encrypted-email-on-3-major-email-platforms/</loc>
		<lastmod>2019-06-03T14:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyber-criminals-can-ruin-your-brands-reputation/</loc>
		<lastmod>2019-06-03T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infiltrate-2019-alexei-bulazels-jeremy-blackthornes-three-heads-are-better-than-one-mastering-nsas-ghidra-reverse-engineering-tool/</loc>
		<lastmod>2019-06-03T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/time-travel-may-be-capable-of-defeating-ransomware/</loc>
		<lastmod>2019-06-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/american-megatrends-supports-bios-passwords-to-be-stored-in-the-tpm-nvram-via-new-aptio-v-uefi-firmware-emodule/</loc>
		<lastmod>2019-06-03T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quest-diagnostics-breached-through-third-party-billing-collections-vendor/</loc>
		<lastmod>2019-06-03T18:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-nist-privacy-framework-helping-the-legal-team-talk-with-the-tech-team/</loc>
		<lastmod>2019-06-03T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-a-casb-and-how-do-you-even-say-it/</loc>
		<lastmod>2019-06-03T18:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-question-and-answer-tips/</loc>
		<lastmod>2019-06-03T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ccsp-vs-cloud/</loc>
		<lastmod>2019-06-03T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-guide-to-communication-methods-of-u-s-government-departments/</loc>
		<lastmod>2019-06-03T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-end-the-tug-of-war-between-data-analytics-and-data-security/</loc>
		<lastmod>2019-06-03T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infiltrate-2019-marco-ivaldis-a-bugs-life-story-of-a-solaris-0day/</loc>
		<lastmod>2019-06-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/unlearned-lessons-of-the-past-and-the-not-so-secure-smart-city-of-the-future/</loc>
		<lastmod>2019-06-03T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/closed-source-e-commerce-platforms-can-be-compromised/</loc>
		<lastmod>2019-06-03T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/customer-identity-and-access-management-2-0-bridging-the-gap-of-identity/</loc>
		<lastmod>2019-06-03T20:18:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-ciam-discover-the-benefits/</loc>
		<lastmod>2019-06-03T20:18:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-diploma-legal-notes/</loc>
		<lastmod>2019-06-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/webinar-risk-based-adaptive-devsecops/</loc>
		<lastmod>2019-06-03T21:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/im-just-not-smart-enough-to-work-in-tech/</loc>
		<lastmod>2019-06-03T23:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/report-no-eternal-blue-exploit-found-in-baltimore-city-ransomware/</loc>
		<lastmod>2019-06-04T00:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/seven-friends-of-vpn-top-applications-to-keep-anonymity-on-the-web/</loc>
		<lastmod>2019-06-04T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/whatsapp-vulnerability-illustrates-importance-of-data-protection/</loc>
		<lastmod>2019-06-04T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dj-sampath-chats-about-raising-the-bar-for-cybersecurity-with-ai-and-nlu/</loc>
		<lastmod>2019-06-04T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-whos-to-blame-or-not-to-blame-in-baltimore-attack/</loc>
		<lastmod>2019-06-04T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/migration-from-oracle-is-easier-than-you-think/</loc>
		<lastmod>2019-06-04T01:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-are-so-many-cios-leaving-the-nhs/</loc>
		<lastmod>2019-06-04T07:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pen-test-vs-vulnerability-assessment-which-is-right-for-my-organization/</loc>
		<lastmod>2019-06-04T08:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/gdpr-12-months-on/</loc>
		<lastmod>2019-06-04T09:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/an-apt-blueprint-gaining-new-visibility-into-financial-threats/</loc>
		<lastmod>2019-06-04T09:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-suricata-intro-to-a-best-of-breed-open-source-ids-and-ips/</loc>
		<lastmod>2019-06-04T11:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-cost-of-cybercrime/</loc>
		<lastmod>2019-06-04T11:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/data-of-nearly-12-million-patients-leaked-online/</loc>
		<lastmod>2019-06-04T12:20:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ioactive-and-bugcrowd-combine-forces-to-extend-security-service-offerings/</loc>
		<lastmod>2019-06-04T13:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-keys-to-improve-your-cybersecurity/</loc>
		<lastmod>2019-06-04T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/what-the-heck-is-iast/</loc>
		<lastmod>2019-06-04T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/one-year-later-finding-harmony-between-gdpr-and-the-cloud/</loc>
		<lastmod>2019-06-04T14:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infiltrate-2019-natalie-silvanovichs-adventures-in-video-conferencing/</loc>
		<lastmod>2019-06-04T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/guest-essay-the-story-behind-how-datatribe-is-helping-to-seed-cybersecurity-valley-in-maryland/</loc>
		<lastmod>2019-06-04T15:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hacking-higher-education-australian-incident-and-students-tricks/</loc>
		<lastmod>2019-06-04T15:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/military-security-careers-overview/</loc>
		<lastmod>2019-06-04T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pentest-versus-ceh/</loc>
		<lastmod>2019-06-04T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/no-experience-7-ways-to-stand-out-to-information-security-recruiters/</loc>
		<lastmod>2019-06-04T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/imperva-to-acquire-distil-networks-the-leader-in-advanced-bot-mitigation/</loc>
		<lastmod>2019-06-04T15:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/swiss-msp-grows-client-base-with-avast-business-cloudcare/</loc>
		<lastmod>2019-06-04T16:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/critical-capabilities-of-cyber-risk-assessment-tools/</loc>
		<lastmod>2019-06-04T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aws-gdpr-what-you-need-to-know/</loc>
		<lastmod>2019-06-04T16:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/australia-national-university-reveals-data-breach-involving-19-years-of-info/</loc>
		<lastmod>2019-06-04T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/this-is-what-happens-when-your-ssl-certificate-expires/</loc>
		<lastmod>2019-06-04T17:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/facebookery-there-is-no-invasion-of-privacy-at-all-because-there-is-no-privacy/</loc>
		<lastmod>2019-06-04T17:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-things-to-consider-when-choosing-a-bot-management-solution/</loc>
		<lastmod>2019-06-04T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/its-not-just-autonomous-cars-of-the-future-that-need-security/</loc>
		<lastmod>2019-06-04T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lack-of-focus-on-security-makes-healthcare-industry-a-target-for-phishing-attacks/</loc>
		<lastmod>2019-06-04T17:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ncipher-in-the-news/</loc>
		<lastmod>2019-06-04T18:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-consider-iso-27001-certification/</loc>
		<lastmod>2019-06-04T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/apple-showcases-privacy-innovations-at-wwdc-2019-sign-in-with-apple-adguard-pro-new-app-store-guidelines-and-more/</loc>
		<lastmod>2019-06-04T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-do-the-iso-27001-requirements-and-structure-look-like/</loc>
		<lastmod>2019-06-04T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/over-19-years-of-anuaustralian-national-university-students-and-staff-data-breached/</loc>
		<lastmod>2019-06-04T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dataedge-2019-alex-stamos-keynote-the-platform-challenge-balancing-safety-privacy-and-freedom/</loc>
		<lastmod>2019-06-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/building-the-idaptive-identity/</loc>
		<lastmod>2019-06-04T20:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/flying-blind-into-the-threat-visibility-gap/</loc>
		<lastmod>2019-06-04T20:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-the-new-barbarians/</loc>
		<lastmod>2019-06-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/labcorp-7-7-million-consumers-hit-in-collections-firm-breach/</loc>
		<lastmod>2019-06-04T21:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/still-waiting-to-hire-a-security-analyst-dont/</loc>
		<lastmod>2019-06-04T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vulnerability-management-in-devops-style-it/</loc>
		<lastmod>2019-06-04T22:18:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/four-reasons-for-investing-in-your-wan-edge/</loc>
		<lastmod>2019-06-04T22:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/are-cisos-starting-to-crack-under-pressure-new-research-suggests-they-need-more-support-from-peers/</loc>
		<lastmod>2019-06-04T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/os-command-injection-in-wp-database-backup/</loc>
		<lastmod>2019-06-04T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/breach-happens-got-the-right-iam/</loc>
		<lastmod>2019-06-05T00:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cloud-services-your-rocket-ship-control-board/</loc>
		<lastmod>2019-06-05T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/privileged-access-management-issues-enter-tripwire-password-manager/</loc>
		<lastmod>2019-06-05T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/microsoft-bluekeep-flaw-threatens-medical-devices-iot/</loc>
		<lastmod>2019-06-05T06:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/real-time-web-layer-threat-investigation-and-remediation-with-cisco-threat-response/</loc>
		<lastmod>2019-06-05T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/school-network-management-youve-got-your-work-cut-out/</loc>
		<lastmod>2019-06-05T09:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infactor-scans-with-netsparker-following-every-code-deployment/</loc>
		<lastmod>2019-06-05T10:25:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pci-pal-announced-as-2019-cyber-security-awards-finalist/</loc>
		<lastmod>2019-06-05T11:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-the-baltimore-ransomware-attack-means-for-incident-response-communications/</loc>
		<lastmod>2019-06-05T11:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/norsk-hydro-q1-2019-profits-sank-following-ransomware-attack/</loc>
		<lastmod>2019-06-05T12:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/11-common-tools-for-your-devops-team/</loc>
		<lastmod>2019-06-05T12:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/password-policies-manager-plugin-update-1-2-support-for-custom-login-pages/</loc>
		<lastmod>2019-06-05T12:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/glass-class-mitigating-risk-before-shadow-it/</loc>
		<lastmod>2019-06-05T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ciso-hesitancy-about-public-cloud-leaves-data-centers-to-run-most-workload-by-2021/</loc>
		<lastmod>2019-06-05T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/auto-discover-scale-and-license-adcs/</loc>
		<lastmod>2019-06-05T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dont-let-recruiters-hold-you-back-from-the-it-job-of-your-dreams/</loc>
		<lastmod>2019-06-05T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/casp-vs-cissp/</loc>
		<lastmod>2019-06-05T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-are-the-risks-for-average-users-who-download-content-via-torrent/</loc>
		<lastmod>2019-06-05T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-rory-alsops-welcome/</loc>
		<lastmod>2019-06-05T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/report-it-right-amca-got-hacked-not-quest-and-labcorp/</loc>
		<lastmod>2019-06-05T15:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/proactive-credential-data-dump-hunting-with-soar/</loc>
		<lastmod>2019-06-05T15:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/proactive-credential-dump-hunting-with-soar/</loc>
		<lastmod>2019-06-05T15:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lawfare-us-cyber-command-questionable-strategy/</loc>
		<lastmod>2019-06-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/notes-on-analyst-value-for-vendors/</loc>
		<lastmod>2019-06-05T17:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/social-engineer-newsletter-vol-09-issue-117/</loc>
		<lastmod>2019-06-05T17:35:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/divvycloud-wins-2019-fortress-cyber-security-award-2/</loc>
		<lastmod>2019-06-05T18:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-research-2019-cloud-security-report-reveals-top-challenges/</loc>
		<lastmod>2019-06-05T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/technology-company-ma-do-due-diligence-on-sdlc-process-tools/</loc>
		<lastmod>2019-06-05T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/1-7-2018-dtex-insider-threat-privacy-news-how-to-reduce-it-supply-chain-risk-credential-theft-hits-humana-applicants-harris-poll-reveals-americans-attitudes-towards-privacy-security/</loc>
		<lastmod>2019-06-05T18:51:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-the-beer-farmers-we-take-your-security-seriously-or-do-we/</loc>
		<lastmod>2019-06-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/building-the-enterprise-security-team-by-dr-ed-amoroso/</loc>
		<lastmod>2019-06-05T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/winning-with-forticloud-services/</loc>
		<lastmod>2019-06-05T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/eliminating-the-burden-of-periodic-password-reset/</loc>
		<lastmod>2019-06-05T20:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-comments/</loc>
		<lastmod>2019-06-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/feature-release-19-2-introducing-compliance-scorecard-threat-detection-iac-protection-and-enhanced-iam-protection-2/</loc>
		<lastmod>2019-06-05T21:17:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pentest-everything-you-need-to-know-about-comptias-new-certification/</loc>
		<lastmod>2019-06-06T02:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/is-hacking-a-good-job-for-teens-avast/</loc>
		<lastmod>2019-06-06T05:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-unusual-cybersecurity-hacking-strategies/</loc>
		<lastmod>2019-06-06T05:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/d-d-june-6-1944-75-years-on/</loc>
		<lastmod>2019-06-06T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/game-of-threats-what-the-cybersecurity-industry-can-take-away-from-game-of-thrones/</loc>
		<lastmod>2019-06-06T07:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vigilant-softwares-most-wanted-data-breach-bulletin-may-2019/</loc>
		<lastmod>2019-06-06T09:03:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/u-s-businesses-lost-654-billion-from-cyberattacks-in-2018/</loc>
		<lastmod>2019-06-06T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-last-blog-post/</loc>
		<lastmod>2019-06-06T11:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/national-cyber-security-strategy-2016-to-2021-progress-report/</loc>
		<lastmod>2019-06-06T11:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/which-cyber-security-threats-are-most-feared-by-uk-businesses/</loc>
		<lastmod>2019-06-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-study-explores-the-dark-net-and-the-growing-risk-to-the-enterprise/</loc>
		<lastmod>2019-06-06T12:05:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/china-allegedly-hacked-australian-national-university-to-recruit-informants/</loc>
		<lastmod>2019-06-06T12:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/next-generation-firewall-ngfw-vs-traditional-firewall/</loc>
		<lastmod>2019-06-06T12:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pcastle-malware-attacks-targeting-china-based-systems-with-xmrig/</loc>
		<lastmod>2019-06-06T12:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/celebrating-10-years-of-netsparker/</loc>
		<lastmod>2019-06-06T12:35:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-troubled-city-reminds-us-that-ransomware-is-here-to-stay/</loc>
		<lastmod>2019-06-06T13:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/gdpr-one-year-anniversary-what-weve-learned-so-far-2/</loc>
		<lastmod>2019-06-06T14:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/make-multi-point-dumbbell-plots-in-ggplot2/</loc>
		<lastmod>2019-06-06T14:16:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-broken-ssl-certificate-will-hurt-your-seo/</loc>
		<lastmod>2019-06-06T14:34:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-sanja-bonics-may-the-setenforce-be-with-you/</loc>
		<lastmod>2019-06-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberseek-career-pathway-it-auditor/</loc>
		<lastmod>2019-06-06T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/usb-killer-what-it-is-and-how-to-protect-your-devices/</loc>
		<lastmod>2019-06-06T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/threat-hunting-with-cymon-api/</loc>
		<lastmod>2019-06-06T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/with-idaptive-chugai-administers-the-right-dose-of-security/</loc>
		<lastmod>2019-06-06T16:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/getting-to-know-the-new-rsac-advisory-board-members-john-scimone/</loc>
		<lastmod>2019-06-06T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bot-manager-vs-waf-why-you-actually-need-both/</loc>
		<lastmod>2019-06-06T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tips-on-recruiting-top-talent-in-the-current-devops-and-cloud-security-markets/</loc>
		<lastmod>2019-06-06T16:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/integrating-grc-governance-processes-and-automation/</loc>
		<lastmod>2019-06-06T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/daniel-storis-hello-world/</loc>
		<lastmod>2019-06-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/should-user-passwords-expire-microsoft-ends-its-policy/</loc>
		<lastmod>2019-06-06T17:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/morphisec-announces-version-3-5/</loc>
		<lastmod>2019-06-06T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-thomas-fischers-building-a-personal-data-focused-incident-response-plan/</loc>
		<lastmod>2019-06-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-and-human-behavior-shb-2019/</loc>
		<lastmod>2019-06-06T19:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/demo-of-new-automated-phishing-attack-that-hacks-two-factor-authentication/</loc>
		<lastmod>2019-06-06T20:15:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/apple-mug-new/</loc>
		<lastmod>2019-06-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/is-vulnerability-management-hopeless-2/</loc>
		<lastmod>2019-06-06T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/mozilla-puts-peoples-privacy-first-in-its-browser-with-updates-to-enhanced-tracking-protection-firefox-lockwise-and-firefox-monitor/</loc>
		<lastmod>2019-06-06T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/best-iot-technology-for-small-business-avast-business/</loc>
		<lastmod>2019-06-06T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-succeeds-because-targets-dont-learn-from-history/</loc>
		<lastmod>2019-06-07T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/automating-sox-controls-testing/</loc>
		<lastmod>2019-06-07T00:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/migrate-your-erp-systems-to-the-cloud-with-confidence/</loc>
		<lastmod>2019-06-07T00:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-deep-dive-into-the-emotet-malware/</loc>
		<lastmod>2019-06-07T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/now-available-bromium-threat-insights-report-june-2019-edition/</loc>
		<lastmod>2019-06-07T04:30:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/understanding-the-online-safety-and-privacy-challenges-faced-by-south-asian-women/</loc>
		<lastmod>2019-06-07T05:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-ncipher-security-recommends-hospitals-can-stay-resilient-to-cyber-threats/</loc>
		<lastmod>2019-06-07T06:03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-cmmc-a-palatable-enforcement-solution-to-dfars-requirement/</loc>
		<lastmod>2019-06-07T06:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/announcing-manticore-0-3-0/</loc>
		<lastmod>2019-06-07T10:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/uk-security-bsides-mark-your-calendar-dont-miss-out/</loc>
		<lastmod>2019-06-07T11:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx/</loc>
		<lastmod>2019-06-07T14:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-robin-vickerys-using-natural-language-processing-to-crack-passwords/</loc>
		<lastmod>2019-06-07T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cloud-services-are-vulnerable-without-end-to-end-encryption/</loc>
		<lastmod>2019-06-07T15:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/gss-at-edge-world/</loc>
		<lastmod>2019-06-07T15:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ip-disclosure-of-servers-behind-wafs-using-wordpress-xml-rpc/</loc>
		<lastmod>2019-06-07T15:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/reader-challenge-have-some-fun-with-apples-wwdc-2019-keynote-subtitles-show-your-work/</loc>
		<lastmod>2019-06-07T16:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/google-confirms-backdoor-is-in-motion/</loc>
		<lastmod>2019-06-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-dirty-dozen-the-12-most-costly-phishing-attack-examples/</loc>
		<lastmod>2019-06-07T17:37:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-essentials-of-vendor-risk-management/</loc>
		<lastmod>2019-06-07T17:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/letter-to-our-customers-and-partners-entrust-datacard-acquires-ncipher-security/</loc>
		<lastmod>2019-06-07T17:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/contrast-protect-waf-a-day-in-the-life-of-a-user/</loc>
		<lastmod>2019-06-07T18:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/contrast-security-honored-as-a-silver-stevie-award-winner-in-the-2019-american-business-awards-for-best-business-technology-software-devops-solution/</loc>
		<lastmod>2019-06-07T18:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-do-teams-stay-afloat-in-an-ocean-of-vulnerabilities-they-remediate-faster-3-0x-faster/</loc>
		<lastmod>2019-06-07T18:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/using-contrast-to-prevent-the-weblogic-remote-code-execution-rce-deserialization-vulnerability-cve-2019-2725/</loc>
		<lastmod>2019-06-07T18:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/privilege-escalation-in-popular-blogging-platform/</loc>
		<lastmod>2019-06-07T18:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/contrast-security-recognized-as-the-only-visionary-in-the-gartner-magic-quadrant-for-application-security-testing-for-2019/</loc>
		<lastmod>2019-06-07T18:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/3-key-takeaways-from-locomocosec/</loc>
		<lastmod>2019-06-07T18:52:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/using-contrast-to-prevent-bootstrap-sass-rubygem-remote-code-execution-rce/</loc>
		<lastmod>2019-06-07T18:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-5-challenges-securing-applications-with-wafs/</loc>
		<lastmod>2019-06-07T18:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/cyber-defense-magazine-infosec-awards-honors-contrast-security-as-editors-choice-in-application-security/</loc>
		<lastmod>2019-06-07T18:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/creating-a-cybersecurity-powerhouse-ncipher-security-is-now-part-of-entrust-datacard/</loc>
		<lastmod>2019-06-07T18:57:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-callum-wilsons-the-top-10-devices-found-in-uk-homes/</loc>
		<lastmod>2019-06-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/beitaad-adware-hidden-in-google-play-apps-avast/</loc>
		<lastmod>2019-06-07T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fortune-500-company-addresses-weakness-behind-264gb-data-leak/</loc>
		<lastmod>2019-06-07T20:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-advance-ics-cybersecurity-implement-continuous-monitoring/</loc>
		<lastmod>2019-06-07T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cryptocurrency-wallet-gatehub-hacked-nearly-10-million-worth-of-ripple-xrp-stolen/</loc>
		<lastmod>2019-06-07T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/webinars-software-security-metrics-and-open-source-security/</loc>
		<lastmod>2019-06-07T20:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/korean-gambling-and-call-girl-spam-on-hacked-and-non-hacked-sites/</loc>
		<lastmod>2019-06-07T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-apples-new-mac-pro/</loc>
		<lastmod>2019-06-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/jcrush-joins-the-database-leak-club-2/</loc>
		<lastmod>2019-06-07T21:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/see-bromium-at-cuna-cybersecurity-conference-2019/</loc>
		<lastmod>2019-06-07T22:05:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/is-security-everyones-business/</loc>
		<lastmod>2019-06-07T23:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lessons-from-the-baltimore-cyber-attack-are-you-doing-enough-to-protect-your-business/</loc>
		<lastmod>2019-06-08T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/six-reasons-you-dont-want-to-miss-sans-dfir-summit-amp-training-2019/</loc>
		<lastmod>2019-06-08T00:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aws-summit-london-2019-security-is-still-a-shared-responsibility/</loc>
		<lastmod>2019-06-08T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-sean-wrights-security-enablement/</loc>
		<lastmod>2019-06-08T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-qualifiers/</loc>
		<lastmod>2019-06-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-dr-zbigniew-kweckas-a-deep-dark-dive-into-security-and-risk/</loc>
		<lastmod>2019-06-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-stu-hirsts-and-tash-norris-for-crying-out-cloud/</loc>
		<lastmod>2019-06-09T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-ken-burns-theory/</loc>
		<lastmod>2019-06-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/10-questions-to-ask-a-bot-mitigation-vendor/</loc>
		<lastmod>2019-06-09T17:11:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/wrapping-up-exploration-of-john-deeres-mowerplus-database/</loc>
		<lastmod>2019-06-09T17:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-magda-de-jagers-gdpr-for-devs/</loc>
		<lastmod>2019-06-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/large-applications-monoliths%e2%80%8a-%e2%80%8astruggling-to-do-code-analysis-read-on/</loc>
		<lastmod>2019-06-09T19:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/government-cyber-focus-election-security/</loc>
		<lastmod>2019-06-09T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/securing-machine-identities-in-the-digital-transformation-era/</loc>
		<lastmod>2019-06-10T00:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quest-diagnostics-data-breach-googles-network-outage-us-visa-applicants-and-social-media-names/</loc>
		<lastmod>2019-06-10T04:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/going-all-in-on-aws-cloud/</loc>
		<lastmod>2019-06-10T07:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-data-science-and-machine-learning-are-affecting-cybersecurity/</loc>
		<lastmod>2019-06-10T07:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/my-take-why-locking-down-firmware-has-now-become-the-next-big-cybersecurity-challenge/</loc>
		<lastmod>2019-06-10T08:49:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/take-our-quiz-and-try-to-spot-scam-websites-avast/</loc>
		<lastmod>2019-06-10T10:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/russia-wants-access-to-tinder-photos-and-conversations/</loc>
		<lastmod>2019-06-10T11:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/even-with-the-greater-emphasis-on-cyber-security-many-organizations-still-struggle-to-protect-themselves/</loc>
		<lastmod>2019-06-10T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/first-american-breach-retrospective/</loc>
		<lastmod>2019-06-10T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/june-12-webinar-emotet-taming-a-wild-trojan/</loc>
		<lastmod>2019-06-10T12:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/email-blackmailer-threatens-to-have-your-website-blocked-forever/</loc>
		<lastmod>2019-06-10T13:59:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tricky-topics-in-ccpa-compliance/</loc>
		<lastmod>2019-06-10T14:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/uk-tax-department-investigated-over-2-6-million-phishing-attacks-in-three-years/</loc>
		<lastmod>2019-06-10T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-alert-fin8-is-back-in-business-targeting-the-hospitality-industry/</loc>
		<lastmod>2019-06-10T14:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberseek-career-pathway-incident-analyst-responder/</loc>
		<lastmod>2019-06-10T14:59:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-cybersecurity-and-infrastructure-security-agency/</loc>
		<lastmod>2019-06-10T14:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lets-talk-about-real-data-privacy/</loc>
		<lastmod>2019-06-10T14:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-ben-turners-doug-mcleods-powershell-is-dead-epic-learnings/</loc>
		<lastmod>2019-06-10T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-fim-file-integrity-monitoring/</loc>
		<lastmod>2019-06-10T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/microsoft-warns-of-malspam-campaign-abusing-office-vulnerability-to-distribute-backdoor/</loc>
		<lastmod>2019-06-10T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/forsooth-what-sort-of-villainy-makes-its-evil-pestilence-known/</loc>
		<lastmod>2019-06-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-the-amca-data-breach-teaches-us-about-modern-supply-chain-security/</loc>
		<lastmod>2019-06-10T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nsa-warns-users-of-bluekeep-vulnerability-urges-them-to-update-their-windows-systems/</loc>
		<lastmod>2019-06-10T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hurricane-season-is-upon-us-is-your-business-continuity-and-disaster-recovery-plan-ready/</loc>
		<lastmod>2019-06-10T17:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/eternalblue-comes-home-to-roost-in-baltimore-will-we-learn-from-our-mistakes/</loc>
		<lastmod>2019-06-10T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/political-campaign-security/</loc>
		<lastmod>2019-06-10T17:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/avast-business-offers-new-patch-management-service-avast/</loc>
		<lastmod>2019-06-10T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/showdown-vpn-vs-cloud-browser/</loc>
		<lastmod>2019-06-10T18:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-chris-sutherlands-closing-keynote/</loc>
		<lastmod>2019-06-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cisco-asa-firepower-aci-public-cloud-and-kubernetes-end-to-end-policy-management/</loc>
		<lastmod>2019-06-10T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-future-of-mac-management-opening-the-door-through-innovation/</loc>
		<lastmod>2019-06-10T19:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cybercriminals-opt-for-open-source-tools/</loc>
		<lastmod>2019-06-10T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/8-key-components-of-a-perfect-ciam-platform-2/</loc>
		<lastmod>2019-06-10T20:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/robert-m-lees-jeff-hass-little-bobby-comics-on-your-own/</loc>
		<lastmod>2019-06-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-big-data-3/</loc>
		<lastmod>2019-06-10T21:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/naming-and-shaming/</loc>
		<lastmod>2019-06-10T21:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hours-of-cybersecurity-efficiencies-say-hello-to-apptegas-task-packs/</loc>
		<lastmod>2019-06-10T21:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/alert-logic-researchers-find-another-critical-vulnerability-in-wordpress-wp-live-chat-cve-2019-12498/</loc>
		<lastmod>2019-06-10T22:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bsides-scotland-2019-rory-alsops-closing/</loc>
		<lastmod>2019-06-10T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ftp-logs-used-to-determine-attack-vector/</loc>
		<lastmod>2019-06-11T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ask-the-experts-should-the-us-have-a-data-privacy-law-similar-to-gdpr/</loc>
		<lastmod>2019-06-11T01:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fanatical-about-metrics-by-richard-seiersen/</loc>
		<lastmod>2019-06-11T02:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/steps-for-successful-vulnerability-management-lessons-from-the-pitch/</loc>
		<lastmod>2019-06-11T03:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-does-gdpr-matter-in-the-tech-and-media-industry/</loc>
		<lastmod>2019-06-11T07:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-customer-event-june-13-2019-in-madrid/</loc>
		<lastmod>2019-06-11T07:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-fundamentals-for-mitigating-the-risk-of-laterally-spreading-malware/</loc>
		<lastmod>2019-06-11T11:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nice-incontact-interactions-emea-2019-in-review/</loc>
		<lastmod>2019-06-11T11:50:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cisco-catalyst-switches-embed-nozomi-networks-solution/</loc>
		<lastmod>2019-06-11T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/healthcare-cybersecurity-has-its-own-award-category-at-last/</loc>
		<lastmod>2019-06-11T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/food-bank-needs-help-recovering-from-ransomware-attack/</loc>
		<lastmod>2019-06-11T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/4-reasons-password-policies-are-vital-for-wordpress-users/</loc>
		<lastmod>2019-06-11T12:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/blockchain-in-higher-education-the-transformation-begins/</loc>
		<lastmod>2019-06-11T12:47:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberattack-compromises-us-customs-and-border-protection-photo-database/</loc>
		<lastmod>2019-06-11T12:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberark-introduces-privileged-access-security-assessment-tool/</loc>
		<lastmod>2019-06-11T13:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/where-in-the-world-is-peter-carlisle-episode-5-san-francisco/</loc>
		<lastmod>2019-06-11T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-must-haves-for-effectively-securing-azure/</loc>
		<lastmod>2019-06-11T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/eliminating-excessive-permissions/</loc>
		<lastmod>2019-06-11T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dns-over-https-doh/</loc>
		<lastmod>2019-06-11T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-conference-staffs-opening/</loc>
		<lastmod>2019-06-11T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberark-and-cna-introduce-first-of-its-kind-cybersecurity-insurance-offering-that-prioritizes-privileged-access-security/</loc>
		<lastmod>2019-06-11T15:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ferruh-mavituna-talks-about-discovering-websites-on-business-security-weekly-129/</loc>
		<lastmod>2019-06-11T15:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-verizon-dbir-and-the-art-of-the-breach/</loc>
		<lastmod>2019-06-11T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/threats-are-omnipresent-but-you-have-options/</loc>
		<lastmod>2019-06-11T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-torrid-affair-data-analytics-and-data-protection/</loc>
		<lastmod>2019-06-11T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-research-leverages-ai-for-side-channel-automated-keystroke-attack/</loc>
		<lastmod>2019-06-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/enzoic-part-of-enterprise-security-magazines-top-10-identity-and-access-management-solution-providers-for-2019/</loc>
		<lastmod>2019-06-11T17:34:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/gdpr-one-year-later-how-has-it-impacted-privacy/</loc>
		<lastmod>2019-06-11T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lets-talk-about-zero-trust/</loc>
		<lastmod>2019-06-11T18:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-amber-welchs-data-access-rights-exploits-under-new-privacy-laws/</loc>
		<lastmod>2019-06-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/state-of-gdpr-compliance-and-cybersecurity-after-first-year/</loc>
		<lastmod>2019-06-11T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/making-sense-of-fisma-compliance/</loc>
		<lastmod>2019-06-11T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sap-security-notes-june-19-sap-increased-priority-for-sap-solution-manager-patch/</loc>
		<lastmod>2019-06-11T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/stored-xss-in-mybb/</loc>
		<lastmod>2019-06-11T20:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/luke-kingma-and-lou-patrick-mackays-futurism-blenders/</loc>
		<lastmod>2019-06-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/makeover-jumbalaya-beating-dumbbells-into-slopegraphs-whilst-orchestrating-ethercalc/</loc>
		<lastmod>2019-06-11T21:01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rsacs-new-leadership-a-conversation-with-linda-gray-martin/</loc>
		<lastmod>2019-06-11T21:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vert-threat-alert-june-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-06-11T21:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nist-cybersecurity-framework-explained/</loc>
		<lastmod>2019-06-11T21:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/untangle-expands-its-network-security-framework-with-new-zseries-appliances-ng-firewall-version-14-2-3/</loc>
		<lastmod>2019-06-11T22:41:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-eu-bounty-program-enabled-in-vlc-3-0-7-release-this-version-fixed-the-most-number-of-security-issues/</loc>
		<lastmod>2019-06-11T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/us-customs-and-border-protection-reveal-data-breach-that-exposed-thousands-of-traveler-photos-and-license-plate-images/</loc>
		<lastmod>2019-06-11T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/google-researchers-present-zanzibar-a-global-authorization-system-it-scales-trillions-of-access-control-lists-and-millions-of-authorization-requests-per-second/</loc>
		<lastmod>2019-06-11T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/june-2019-patch-tuesday-88-vulns-21-critical-hyper-v-escape-adobe-vulns/</loc>
		<lastmod>2019-06-11T23:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-easily-bypass-epa-to-compromise-any-web-server-that-supports-windows-integrated-authentication/</loc>
		<lastmod>2019-06-11T23:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/drop-the-mic-cve-2019-1040/</loc>
		<lastmod>2019-06-11T23:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/your-session-key-is-my-session-key-how-to-retrieve-the-session-key-for-any-authentication/</loc>
		<lastmod>2019-06-11T23:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-advisory-critical-vulnerabilities-in-ntlm-allow-remote-code-execution-and-cloud-resources-compromise/</loc>
		<lastmod>2019-06-11T23:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-are-we-seeing-more-ransomware/</loc>
		<lastmod>2019-06-12T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/part-i-what-defines-a-modern-soc-as-a-service-solution/</loc>
		<lastmod>2019-06-12T02:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/visit-bromium-at-614con-june-13-14-2019/</loc>
		<lastmod>2019-06-12T03:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-state-of-european-cybersecurity-and-lessons-to-learn/</loc>
		<lastmod>2019-06-12T07:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/youtube-attacks-to-watch-out-for-in-2019/</loc>
		<lastmod>2019-06-12T07:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-typo-can-make-you-an-administrator/</loc>
		<lastmod>2019-06-12T07:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/protecting-your-website-against-low-orbit-ion-cannon/</loc>
		<lastmod>2019-06-12T07:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/mitigate-slow-http-get-post-vulnerabilities-in-the-apache-http-server/</loc>
		<lastmod>2019-06-12T07:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/visit-us-at-black-hat-usa-2019/</loc>
		<lastmod>2019-06-12T07:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/radiohead-releases-music-online-instead-of-giving-in-to-blackmailer-demands/</loc>
		<lastmod>2019-06-12T09:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-attack-paralyses-lake-city-email-landlines-and-credit-card-services/</loc>
		<lastmod>2019-06-12T09:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/la-liga-fined-e250000-after-android-app-spied-on-football-fans/</loc>
		<lastmod>2019-06-12T10:11:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sans-2019-ot-ics-cyber-security-research-3-key-findings/</loc>
		<lastmod>2019-06-12T12:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/microsoft-patch-tuesday-june-2019-edition/</loc>
		<lastmod>2019-06-12T13:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-you-need-to-know-about-botnets/</loc>
		<lastmod>2019-06-12T14:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-jason-smiths-how-to-reach-and-teach-youth-about-cybersecurity-if-anybody-will-let-you/</loc>
		<lastmod>2019-06-12T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-critical-role-of-independent-third-party-testing/</loc>
		<lastmod>2019-06-12T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/secure-sd-wan-vs-nfv-unraveling-the-hidden-costs-of-wan-edge-technologies/</loc>
		<lastmod>2019-06-12T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/avast-report-may-explain-why-users-are-resisting-microsofts-bluekeep-patch-avast/</loc>
		<lastmod>2019-06-12T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/saint-gertrude-high-school-improves-efficiency-with-avast-business-patch-management-avast/</loc>
		<lastmod>2019-06-12T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/forrester-recognizes-idaptive-as-a-leader-in-new-the-forrester-wave-identity-as-a-service-for-enterprise-report/</loc>
		<lastmod>2019-06-12T15:52:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bitglass-security-spotlight-quest-diagnostics-patients-personal-information-at-risk/</loc>
		<lastmod>2019-06-12T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-can-you-tell-if-a-security-test-is-useful-or-not/</loc>
		<lastmod>2019-06-12T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/webinar-hacking-the-extraterrestrial-internet-where-fiction-meets-reality/</loc>
		<lastmod>2019-06-12T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cis-releases-2018-year-in-review/</loc>
		<lastmod>2019-06-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lake-city-reveals-it-suffered-a-triple-threat-ransomware-attack/</loc>
		<lastmod>2019-06-12T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/malware-misuses-common-operating-system-commands-to-perform-targeted-attacks/</loc>
		<lastmod>2019-06-12T17:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/it-auditor-certifications/</loc>
		<lastmod>2019-06-12T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-phishing-emails-that-led-to-real-world-data-breaches/</loc>
		<lastmod>2019-06-12T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/untangle-releases-zseries-appliances-and-ng-firewall-v14-2-for-enhanced-network-security-framework/</loc>
		<lastmod>2019-06-12T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/felipe-a-new-infostealer-trojan/</loc>
		<lastmod>2019-06-12T18:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-definition-of-phishing/</loc>
		<lastmod>2019-06-12T18:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bluekeep-vulnerability-cve-2019-0708-within-cloud-datacenter-machines-how-to-safeguard-yourself/</loc>
		<lastmod>2019-06-12T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-jeff-mans-more-tales-from-the-crypt-analyst/</loc>
		<lastmod>2019-06-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-does-microsofts-move-mean-for-passwords/</loc>
		<lastmod>2019-06-12T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/disruptops-the-security-pros-quick-comparison-aws-vs-azure-vs-gcp/</loc>
		<lastmod>2019-06-12T20:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/apple-flexes-its-privacy-muscles/</loc>
		<lastmod>2019-06-12T20:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-struggle-is-real/</loc>
		<lastmod>2019-06-12T20:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-an-apple-a-day/</loc>
		<lastmod>2019-06-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-open-source-cookbook-a-bakers-guide-to-modern-application-development/</loc>
		<lastmod>2019-06-12T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/incident-response-is-the-weakest-link-in-the-threat-handling-chain-study-shows/</loc>
		<lastmod>2019-06-12T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-4-website-security-tips-for-development-and-hosting/</loc>
		<lastmod>2019-06-12T22:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/government-cyber-focus-planning-for-2020-election-security/</loc>
		<lastmod>2019-06-12T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/if-google-ran-the-post-office/</loc>
		<lastmod>2019-06-13T01:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-public-sector-cisos-should-take-away-from-verizons-2019-dbir/</loc>
		<lastmod>2019-06-13T03:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-tax-paying-hacker-a-modern-phenomenon/</loc>
		<lastmod>2019-06-13T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/vulnerable-software-the-gift-that-keeps-on-giving/</loc>
		<lastmod>2019-06-13T05:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/improving-safety-in-schools-through-the-convergence-of-digital-and-physical-security/</loc>
		<lastmod>2019-06-13T09:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/preveil-launches-new-partner-program-for-cybersecurity-service-providers/</loc>
		<lastmod>2019-06-13T11:13:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aircraft-parts-manufacturer-halts-operations-after-ransomware-attack/</loc>
		<lastmod>2019-06-13T11:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-road-to-reinforce-predictions-with-our-cmo/</loc>
		<lastmod>2019-06-13T11:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/idba-a-proprietary-bot-detection-technology/</loc>
		<lastmod>2019-06-13T12:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-cisos-share-steps-to-prioritize-devops-tools-and-cloud/</loc>
		<lastmod>2019-06-13T13:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-do-cattle-and-turtles-have-to-do-with-security/</loc>
		<lastmod>2019-06-13T13:32:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/securityscorecard-closes-50-million-in-series-d-financing-round/</loc>
		<lastmod>2019-06-13T13:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ddos-attack-that-knocked-telegram-secure-messaging-service-offline-linked-to-hong-kong-protests/</loc>
		<lastmod>2019-06-13T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/intercepting-https-traffic-with-burp-suite/</loc>
		<lastmod>2019-06-13T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/it-auditor-degree-requirements/</loc>
		<lastmod>2019-06-13T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/9-pci-myths-that-can-cost-cios/</loc>
		<lastmod>2019-06-13T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-meag-lees-dont-wait-5-tactics-to-leveling-up-your-infosec-career/</loc>
		<lastmod>2019-06-13T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cybersaint-at-gartner-security-and-risk-management-summit-2019/</loc>
		<lastmod>2019-06-13T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/2019-application-security-priorities-stats-trends/</loc>
		<lastmod>2019-06-13T15:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/google-researcher-reveals-an-unpatched-bug-in-windows-cryptographic-library-that-can-quickly-take-down-a-windows-fleet/</loc>
		<lastmod>2019-06-13T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-eliminate-security-vulnerabilities-of-iot-devices/</loc>
		<lastmod>2019-06-13T16:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/four-key-trends-driving-sustainable-use-of-biometrics/</loc>
		<lastmod>2019-06-13T16:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/recorded-futures-discovery-fishwrappery/</loc>
		<lastmod>2019-06-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/c-level-suite-is-a-growing-target-for-social-engineering-phishing-attacks/</loc>
		<lastmod>2019-06-13T17:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-follow-nist-800-53/</loc>
		<lastmod>2019-06-13T17:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/answering-your-emotet-questions-from-the-webinar-emotet-taming-a-wild-trojan/</loc>
		<lastmod>2019-06-13T17:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sql-injection-attacks-so-old-but-still-so-relevant-heres-why-charts/</loc>
		<lastmod>2019-06-13T18:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-mary-waddicks-could-static-code-analysis-and-secure-coding-have-saved-the-death-star/</loc>
		<lastmod>2019-06-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/13-things-to-know-about-cjis-compliance/</loc>
		<lastmod>2019-06-13T20:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/youre-using-open-source-software-and-you-need-to-keep-track-of-it/</loc>
		<lastmod>2019-06-13T20:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/unleashing-office-365-powershell-for-sharepoint/</loc>
		<lastmod>2019-06-13T20:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-the-power-of-presentation/</loc>
		<lastmod>2019-06-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/risking-privacy-with-genetic-testing-avast/</loc>
		<lastmod>2019-06-13T22:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dark-web-becomes-a-haven-for-targeted-hits-buyers-and-sellers-conspire-to-carry-out-malicious-crimes/</loc>
		<lastmod>2019-06-13T23:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/when-the-going-gets-tough-understanding-the-challenges-with-product-commoditization-in-sca/</loc>
		<lastmod>2019-06-14T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/soc-as-a-service-overview-improving-aws-and-azure-security-part-ii/</loc>
		<lastmod>2019-06-14T00:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/onapsis-at-gartner-security-and-risk-management-summit/</loc>
		<lastmod>2019-06-14T02:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fbi-issues-warning-about-https-phishing/</loc>
		<lastmod>2019-06-14T03:38:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/big-data-made-small/</loc>
		<lastmod>2019-06-14T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ncipher-security-response-to-sstic-hsm-security-vulnerability/</loc>
		<lastmod>2019-06-14T05:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hey-infosec-what-are-you-doing-to-protect-your-developers/</loc>
		<lastmod>2019-06-14T06:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aircraft-component-maker-asco-hit-by-ransomware-shuts-down-global-production/</loc>
		<lastmod>2019-06-14T10:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/in-incident-response-speed-is-everything/</loc>
		<lastmod>2019-06-14T12:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nsa-sounds-the-alarm-on-bluekeep-windows-vulnerability-opens-the-door-for-the-next-wannacry/</loc>
		<lastmod>2019-06-14T13:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-ashley-benitez-smiths-ill-complete-my-threat-model-later-mom-infosec-in-middle-school/</loc>
		<lastmod>2019-06-14T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/announcing-the-enterprise-web-security-best-practices-whitepaper/</loc>
		<lastmod>2019-06-14T15:14:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/french-ministry-of-interior-releases-decryptor-for-pylocky-versions-1-2/</loc>
		<lastmod>2019-06-14T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dnssec-how-it-works-key-considerations/</loc>
		<lastmod>2019-06-14T16:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/synopsys-receives-a-2019-sd-times-100-award-in-security/</loc>
		<lastmod>2019-06-14T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/take-the-google-pill/</loc>
		<lastmod>2019-06-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/computers-and-video-surveillance/</loc>
		<lastmod>2019-06-14T17:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/flaw-in-evernote-chrome-ext-put-4-6m-at-risk-avast/</loc>
		<lastmod>2019-06-14T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-future-of-companies-and-cybersecurity-spending/</loc>
		<lastmod>2019-06-14T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-steven-bernsteins-cons-careers/</loc>
		<lastmod>2019-06-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-literary-options/</loc>
		<lastmod>2019-06-14T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/idaptive-release-19-4-is-now-available/</loc>
		<lastmod>2019-06-14T21:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/telegram-faces-massive-ddos-attack-suspects-link-to-the-ongoing-hong-kong-protests/</loc>
		<lastmod>2019-06-14T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/exim-mta-vulnerability-the-return-of-the-wizard-cve-2019-10149/</loc>
		<lastmod>2019-06-14T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/reports-indicate-we-the-north-are-also-we-the-phished/</loc>
		<lastmod>2019-06-14T22:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-few-ghidra-tips-for-ida-users-part-4-function-call-graphs/</loc>
		<lastmod>2019-06-14T22:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/censorship-vs-the-memes/</loc>
		<lastmod>2019-06-14T23:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-do-hackers-hack-3-reasons-explained/</loc>
		<lastmod>2019-06-15T04:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/contribute-your-integration-to-cyberark-marketplace-for-a-chance-to-win/</loc>
		<lastmod>2019-06-15T12:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-glytch-techs-3d-printing-canister-launchable-drones-for-city-scale-wardriving/</loc>
		<lastmod>2019-06-15T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/introducing-the-ethercalc-package/</loc>
		<lastmod>2019-06-15T16:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-expurgate-the-hate/</loc>
		<lastmod>2019-06-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-ross-wolfs-the-hunter-games-how-to-find-the-adversary-with-event-query-language/</loc>
		<lastmod>2019-06-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/photos-of-travelers-and-license-plates-stolen-in-us-border-protection-breach-avast/</loc>
		<lastmod>2019-06-15T20:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/casb-stops-data-leaks-via-email-for-office-365-and-g-suite/</loc>
		<lastmod>2019-06-16T09:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/north-dakotas-new-cyber-vision/</loc>
		<lastmod>2019-06-16T11:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/authentication-bypass-in-wp-live-chat/</loc>
		<lastmod>2019-06-16T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-micah-browns-star-wars-how-an-ineffective-data-governance-program-destroyed-the-galactic-empire/</loc>
		<lastmod>2019-06-16T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-chernobyl/</loc>
		<lastmod>2019-06-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-chris-roberts-security-lessons-from-the-woofmutt-or-how-i-learned-to-embrace-the-slobber/</loc>
		<lastmod>2019-06-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/welcome-to-the-tribe-onapsis-completes-acquisition-of-virtual-forge/</loc>
		<lastmod>2019-06-16T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/north-dakota-ciso-sean-wiese-on-the-states-new-cyber-vision/</loc>
		<lastmod>2019-06-17T00:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/climbing-the-vulnerability-management-mountain/</loc>
		<lastmod>2019-06-17T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/adding-to-the-toolkit-some-useful-tools-for-cloud-security/</loc>
		<lastmod>2019-06-17T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/us-customs-and-border-protection-data-breach-sign-in-with-apple-leaked-facebook-emails/</loc>
		<lastmod>2019-06-17T04:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/from-my-gartner-blog-presenting-at-the-gartner-security-and-risk-management-summit-dc-2019/</loc>
		<lastmod>2019-06-17T04:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/telegram-hit-by-powerful-ddos-attack-blames-china/</loc>
		<lastmod>2019-06-17T07:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/leaves-of-hash/</loc>
		<lastmod>2019-06-17T10:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/data-surveillance-and-the-ai-arms-race/</loc>
		<lastmod>2019-06-17T10:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/good-riddance-gandcrab-were-still-fixing-the-mess-you-left-behind/</loc>
		<lastmod>2019-06-17T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-a-buffer-overflow/</loc>
		<lastmod>2019-06-17T11:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/oregon-state-university-osu-discloses-data-breach/</loc>
		<lastmod>2019-06-17T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/latest-malware-trends-are-bad-news-for-business/</loc>
		<lastmod>2019-06-17T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/june-2019-update-for-netsparker-enterprise/</loc>
		<lastmod>2019-06-17T13:27:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/owasps-most-wanted-continued/</loc>
		<lastmod>2019-06-17T14:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-yolonda-smiths-its-coming-from-inside-the-house-an-inside-out-approach-to-nodejs-application-security/</loc>
		<lastmod>2019-06-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-new-titus-partner-program-were-all-in/</loc>
		<lastmod>2019-06-17T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-newspaper-test/</loc>
		<lastmod>2019-06-17T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sd-branch-extending-security-into-the-next-gen-branch-network/</loc>
		<lastmod>2019-06-17T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/webinars-tech-due-diligence-and-appsec-tools-for-developers/</loc>
		<lastmod>2019-06-17T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/we-are-now-on-the-offensive-the-target-the-russian-power-grid/</loc>
		<lastmod>2019-06-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-become-a-cybersecurity-architect/</loc>
		<lastmod>2019-06-17T17:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infosecs-top-6-security-awareness-podcast-episodes/</loc>
		<lastmod>2019-06-17T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hack-the-box-htb-machine-walkthrough-series-devoops/</loc>
		<lastmod>2019-06-17T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/amazon-is-being-sued-for-recording-childrens-voices-through-alexa-without-consent/</loc>
		<lastmod>2019-06-17T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-publics-interest-in-cybersecurity/</loc>
		<lastmod>2019-06-17T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/comforte-ag-announces-seamless-integration-of-data-security-with-apache-kafka/</loc>
		<lastmod>2019-06-17T17:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-mike-shecky-kavkas-get-off-my-lawn-or-are-we-looking-for-the-right-people/</loc>
		<lastmod>2019-06-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/identity-where-you-can-control-it/</loc>
		<lastmod>2019-06-17T19:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tcg-launches-initiative-to-develop-worlds-tiniest-tpm/</loc>
		<lastmod>2019-06-17T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rsac-unplugged-2019-bangkok-thailand-cybersecurity-week/</loc>
		<lastmod>2019-06-17T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/robert-m-lees-jeff-hass-little-bobby-comics-clearance/</loc>
		<lastmod>2019-06-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-to-expect-at-aws-reinforce-2019/</loc>
		<lastmod>2019-06-17T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/lightbox-adware-from-innocent-scripts-to-malicious-redirects/</loc>
		<lastmod>2019-06-17T23:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/demystifying-the-myth-of-an-appsec-silver-bullet/</loc>
		<lastmod>2019-06-18T01:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rambleed-a-rowhammer-based-side-channel-attack-that-reads-memory-bits-without-accessing-them/</loc>
		<lastmod>2019-06-18T02:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/is-your-data-safe-in-the-cloud/</loc>
		<lastmod>2019-06-18T07:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/test-your-xss-skills-using-vulnerable-sites/</loc>
		<lastmod>2019-06-18T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/it-certifications-to-elevate-your-skillset/</loc>
		<lastmod>2019-06-18T08:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/to-air-gap-or-not-air-gap-industrial-control-networks/</loc>
		<lastmod>2019-06-18T08:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/3-things-finance-professionals-need-to-know-about-the-gdpr/</loc>
		<lastmod>2019-06-18T08:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/comforte-ag-gives-apache-kafka-a-big-data-security-boost/</loc>
		<lastmod>2019-06-18T09:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ncipher-comments-on-uk-governments-iot-security-consultation/</loc>
		<lastmod>2019-06-18T10:37:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-you-should-go-to-querycon-this-week/</loc>
		<lastmod>2019-06-18T10:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/make-it-harder-to-hide-3-techniques-for-conducting-threat-hunting-at-scale/</loc>
		<lastmod>2019-06-18T11:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/iot-devices-around-the-world-avast/</loc>
		<lastmod>2019-06-18T12:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/threat-stack-launches-new-unified-application-security-monitoring-solution/</loc>
		<lastmod>2019-06-18T12:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/researchers-release-decryptor-that-works-against-gandcrab-version-5-2/</loc>
		<lastmod>2019-06-18T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phishlabs-enhances-email-incident-response-service/</loc>
		<lastmod>2019-06-18T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/every-second-counts-when-youre-under-attack-imperva-provides-3-second-ddos-mitigation-stops-account-takeovers-protects-your-apis/</loc>
		<lastmod>2019-06-18T13:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/website-file-changes-monitor-plugin-update-1-1/</loc>
		<lastmod>2019-06-18T13:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-veracode-supports-devsecops-methodologies-with-saas-based-application-security/</loc>
		<lastmod>2019-06-18T13:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/blog-aws-reinforce-2019-what-to-expect/</loc>
		<lastmod>2019-06-18T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/decrypting-ssl-tls-traffic-with-wireshark/</loc>
		<lastmod>2019-06-18T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-future-of-employee-monitoring/</loc>
		<lastmod>2019-06-18T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/whats-it-like-to-be-a-pentester-for-a-penetration-testing-company/</loc>
		<lastmod>2019-06-18T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-gartner-security-risk-mgmt-summit-running-midsize-enterprise-security/</loc>
		<lastmod>2019-06-18T14:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-dan-beavins-endpoint-security-swimming-through-the-snake-oil/</loc>
		<lastmod>2019-06-18T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/3-reasons-why-b2c-enterprises-should-use-single-sign-on-authentication-2/</loc>
		<lastmod>2019-06-18T15:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/executives-are-turning-infosec-into-a-competitive-advantage/</loc>
		<lastmod>2019-06-18T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-linux-foundation-announces-intent-to-form-new-foundation-to-support-osquery-community/</loc>
		<lastmod>2019-06-18T16:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/strong-password-security-a-cure-to-cybersecurity-obsession/</loc>
		<lastmod>2019-06-18T16:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/qa-interactive-application-security-testing-iast-and-seeker/</loc>
		<lastmod>2019-06-18T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-driven-networking-sd-wan-and-the-new-edge-a-qa-with-john-maddison/</loc>
		<lastmod>2019-06-18T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/robotic-surveillance-dawn-of/</loc>
		<lastmod>2019-06-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quick-hit-some-ggplot2-stat/</loc>
		<lastmod>2019-06-18T17:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/netflix-security-engineers-report-several-tcp-networking-vulnerabilities-in-freebsd-and-linux-kernels/</loc>
		<lastmod>2019-06-18T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/introducing-morphisecs-2019-financial-cyberthreat-index/</loc>
		<lastmod>2019-06-18T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/virtual-patching-the-signal-sciences-way/</loc>
		<lastmod>2019-06-18T17:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/application-security-beyond-static-analysis/</loc>
		<lastmod>2019-06-18T18:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/making-every-moment-count-genesys-xperience19-recap/</loc>
		<lastmod>2019-06-18T18:25:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/book-review-the-official-isc%c2%b2-guide-to-the-cissp-cbk-reference/</loc>
		<lastmod>2019-06-18T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-kathleen-smiths-do-you-have-what-it-takes-how-to-support-your-career-from-community-involvement/</loc>
		<lastmod>2019-06-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/broadcast-operations-control-center-bocc-enabling-ott-broadcast-operations/</loc>
		<lastmod>2019-06-18T19:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-gartner-security-risk-mgmt-summit-pair-security-trainings-with-technical-controls/</loc>
		<lastmod>2019-06-18T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cryptojacking-an-unwanted-guest/</loc>
		<lastmod>2019-06-18T19:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/avast-hacked-a-smart-coffee-maker-all-kinds-of-ways-avast/</loc>
		<lastmod>2019-06-18T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/luke-kingma-and-lou-patrick-mackays-futurism-waldo/</loc>
		<lastmod>2019-06-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/are-free-vpns-safe/</loc>
		<lastmod>2019-06-18T21:17:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quick-tips-for-pci-compliance/</loc>
		<lastmod>2019-06-18T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/detecting-advanced-bots-using-active-interrogation/</loc>
		<lastmod>2019-06-18T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/analysis-of-a-new-hawkeye-variant/</loc>
		<lastmod>2019-06-18T23:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/swimlane-open-sources-graphish-help-secops-teams/</loc>
		<lastmod>2019-06-19T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/swimlane-open-sources-graphish-to-help-secops-teams/</loc>
		<lastmod>2019-06-19T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/swimlane-open-sources-graphish-to-search-and-delete-messages-using-microsoft-graph-api/</loc>
		<lastmod>2019-06-19T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/travel-tips-to-keep-you-safe-from-cybercrime-fraud-identity-theft/</loc>
		<lastmod>2019-06-19T01:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/beyond-the-buzzwords-machine-learning-and-ai-in-cybersecurity/</loc>
		<lastmod>2019-06-19T07:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-7-habits-of-highly-effective-vulnerability-management/</loc>
		<lastmod>2019-06-19T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/your-personally-identifiable-information-is-part-of-you-stop-giving-it-away/</loc>
		<lastmod>2019-06-19T08:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/advances-in-cyber-security-for-electric-utilities-wg15-black-hat-2/</loc>
		<lastmod>2019-06-19T08:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-cybersecurity-paradox/</loc>
		<lastmod>2019-06-19T10:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/maciej-ceglowski-on-privacy-in-the-information-age/</loc>
		<lastmod>2019-06-19T10:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/putting-iot-security-in-its-place/</loc>
		<lastmod>2019-06-19T10:43:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/triton-malware-protecting-your-network-from-the-latest-threat/</loc>
		<lastmod>2019-06-19T10:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/partnership-with-new-global-software-is-uncovering-new-ways-to-secure-and-monetize-iot-networks/</loc>
		<lastmod>2019-06-19T10:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/6-ways-to-protect-your-business-from-online-fraud/</loc>
		<lastmod>2019-06-19T10:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/5-ways-cybersecurity-can-gain-from-ai/</loc>
		<lastmod>2019-06-19T10:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/einvoicing-the-eu-vat-directive/</loc>
		<lastmod>2019-06-19T10:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-ultimate-in-security-by-design-device-identities-embedded-in-chips-and-purpose-built-for-iot-applications/</loc>
		<lastmod>2019-06-19T10:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/partnering-with-xage-security-to-deliver-super-strong-industrial-iot-security/</loc>
		<lastmod>2019-06-19T10:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/world-password-day-is-it-safe/</loc>
		<lastmod>2019-06-19T10:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/young-and-scale-free/</loc>
		<lastmod>2019-06-19T10:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/bringing-gamification-to-cyber-security-training/</loc>
		<lastmod>2019-06-19T10:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/its-tax-season-and-cyber-criminals-are-waiting/</loc>
		<lastmod>2019-06-19T10:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/dont-be-fooled-the-top-6-cybersecurity-risks/</loc>
		<lastmod>2019-06-19T10:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/how-much-testing-is-enough-understanding-test-results-with-bncov-and-coverage-analysis/</loc>
		<lastmod>2019-06-19T10:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/top-5-takeaways-from-the-forallsecure-makes-software-security-autonomous-livestream/</loc>
		<lastmod>2019-06-19T10:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/onward-to-the-next-chapter-in-forallsecures-journey/</loc>
		<lastmod>2019-06-19T10:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/a-reflection-on-forallsecures-journey-in-bootstrapping-behavior-testing-technology/</loc>
		<lastmod>2019-06-19T10:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/modular-plurox-backdoor-comes-with-cryptomining-worm-like-plugins/</loc>
		<lastmod>2019-06-19T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/version-10-9-extends-security-to-privileged-business-users/</loc>
		<lastmod>2019-06-19T11:48:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devsecops-security-at-the-speed-of-devops/</loc>
		<lastmod>2019-06-19T11:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devops-culture-the-neuroscience-of-behavior/</loc>
		<lastmod>2019-06-19T11:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/continuous-compliance-and-devops/</loc>
		<lastmod>2019-06-19T11:57:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hands-on-with-the-nexus-platform-a-software-supply-chain-demo/</loc>
		<lastmod>2019-06-19T11:57:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/developers-say-goodbye-to-vulnerabilities-squash-those-bugs/</loc>
		<lastmod>2019-06-19T11:57:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/oss-for-enterprise-procure-secure-components-faster-manage-risk-better/</loc>
		<lastmod>2019-06-19T11:57:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tools-not-rules/</loc>
		<lastmod>2019-06-19T11:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/empowering-developers-security-self-serve-and-automated-time-based-waivers/</loc>
		<lastmod>2019-06-19T11:57:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-5-tomcat-vulnerabilities/</loc>
		<lastmod>2019-06-19T11:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-path-forward-for-the-nexus-platform/</loc>
		<lastmod>2019-06-19T11:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/may-we-please-get-back-to-the-data/</loc>
		<lastmod>2019-06-19T12:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/645000-people-warned-their-personal-health-data-at-risk-after-phishing-attack/</loc>
		<lastmod>2019-06-19T13:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/glass-class-securing-patient-data-in-the-cloud/</loc>
		<lastmod>2019-06-19T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/companies-deploy-iot-solutions-but-are-confused-about-achieving-goals/</loc>
		<lastmod>2019-06-19T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fortinet-secure-sd-wan-again-receives-nss-labs-recommended-rating/</loc>
		<lastmod>2019-06-19T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/more-than-10m-australians-affected-by-a-single-data-breach-reveals-oaic/</loc>
		<lastmod>2019-06-19T14:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-a-secure-communications-channel-is-a-must/</loc>
		<lastmod>2019-06-19T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/five-things-every-law-firm-should-know-about-cybersecurity/</loc>
		<lastmod>2019-06-19T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/trail-of-bits-icse-2019-recap/</loc>
		<lastmod>2019-06-19T14:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-aaron-sawyers-catching-the-guerrilla-powershell-counterinsurgency/</loc>
		<lastmod>2019-06-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/embracing-the-sec-in-devsecops-how-veracode-and-aws-work-together-to-help-you-build-secure-apps/</loc>
		<lastmod>2019-06-19T15:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/want-to-aggravate-your-ciso-bring-iot-devices-onto-the-network/</loc>
		<lastmod>2019-06-19T15:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-gartner-security-risk-mgmt-summit-how-to-approach-container-security/</loc>
		<lastmod>2019-06-19T15:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/do-you-know-the-last-time-you-were-socially-engineered-avast/</loc>
		<lastmod>2019-06-19T15:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-hybrid-always-on-protection-is-your-best-bet/</loc>
		<lastmod>2019-06-19T15:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/g-suite-security-best-practices-proactive-steps-to-stay-safe-with-soc-as-a-service/</loc>
		<lastmod>2019-06-19T15:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/amca-files-for-bankruptcy-just-months-after-data-breach/</loc>
		<lastmod>2019-06-19T16:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/google-calendar-was-down-for-nearly-three-hours-after-a-major-outage/</loc>
		<lastmod>2019-06-19T16:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/mozilla-releases-firefox-67-0-3-and-firefox-esr-60-7-1-to-fix-a-zero-day-vulnerability-being-abused-in-the-wild/</loc>
		<lastmod>2019-06-19T16:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-a-self-healing-iot-security-system-is-key-to-staying-safe-and-connected/</loc>
		<lastmod>2019-06-19T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/linkedins-bad-behaviors-the-data-exfiltration-gambit/</loc>
		<lastmod>2019-06-19T17:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/email-encryption-and-protecting-executive-communications/</loc>
		<lastmod>2019-06-19T18:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-josh-conways-sigint-for-the-masses-building-and-using-a-signals-intelligence-platform-for-less-than-150/</loc>
		<lastmod>2019-06-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cryptomining-dropper-and-cronjob-creator/</loc>
		<lastmod>2019-06-19T19:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/using-third-party-services-for-credential-theft/</loc>
		<lastmod>2019-06-19T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-has-the-gdpr-changed-the-role-of-a-security-manager/</loc>
		<lastmod>2019-06-19T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/web-appsec-interview-questions-every-company-should-ask/</loc>
		<lastmod>2019-06-19T20:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-glacier/</loc>
		<lastmod>2019-06-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/integrating-grc-risk-quantifiable-metrics-and-aligning-with-business-objectives/</loc>
		<lastmod>2019-06-19T22:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/uks-largest-mobile-carrier-relies-on-aws-and-imperva-flexprotect-for-web-delivery-and-360-degree-application-protection/</loc>
		<lastmod>2019-06-19T23:59:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/collections-firm-behind-labcorp-quest-breaches-files-for-bankruptcy/</loc>
		<lastmod>2019-06-20T01:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyber-security-challenges-in-healthcare-iot-devices/</loc>
		<lastmod>2019-06-20T04:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/jamil-jaffer-chats-about-the-value-of-sharing-threat-intelligence-for-better-cybersecurity/</loc>
		<lastmod>2019-06-20T05:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/one-year-after-gdpr-is-our-personal-data-safer/</loc>
		<lastmod>2019-06-20T05:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-costs-and-risks-of-account-takeover/</loc>
		<lastmod>2019-06-20T06:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quantum-resistant-tls-in-go/</loc>
		<lastmod>2019-06-20T07:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/city-of-riviera-beach-florida-pays-ransom-to-regain-access-to-encrypted-files/</loc>
		<lastmod>2019-06-20T09:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-not-to-get-hacked-by-state-sponsored-actors/</loc>
		<lastmod>2019-06-20T09:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/getting-2fa-right-in-2019/</loc>
		<lastmod>2019-06-20T10:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hacking-hardware-security-modules/</loc>
		<lastmod>2019-06-20T11:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/designing-a-more-secure-future-for-the-iot/</loc>
		<lastmod>2019-06-20T12:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/riviera-beach-pays-nearly-600k-to-recover-data-after-ransomware-attack/</loc>
		<lastmod>2019-06-20T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/50-of-the-best-devops-podcasts/</loc>
		<lastmod>2019-06-20T14:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-danny-akackis-infosuck-the-nasty-bits-of-the-industry-we-want-to-tell-noobs-but-arent-allowed-to-in-polite-company/</loc>
		<lastmod>2019-06-20T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/missing-the-forest-for-the-trees-top-5-ciso-pitfalls-in-cybersecurity/</loc>
		<lastmod>2019-06-20T15:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hack-the-box-htb-machine-walkthrough-series-irked/</loc>
		<lastmod>2019-06-20T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/invisible-aka-fileless-malware-malware-of-the-month-june-2019/</loc>
		<lastmod>2019-06-20T15:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/defend-your-organization-from-browser-based-attacks-with-bitdefender-browser-isolation/</loc>
		<lastmod>2019-06-20T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/securing-the-iot-edge/</loc>
		<lastmod>2019-06-20T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/more-than-half-of-phishing-sites-now-use-https/</loc>
		<lastmod>2019-06-20T16:24:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-homomorphic-encryption/</loc>
		<lastmod>2019-06-20T16:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ics-attacks-the-real-national-emergency/</loc>
		<lastmod>2019-06-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-apples-find-my-feature-works/</loc>
		<lastmod>2019-06-20T17:27:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/using-the-cloud-as-a-cheap-devsecops-lab-environment/</loc>
		<lastmod>2019-06-20T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-christian-burrows-standardizer-a-standardization-framework-for-your-security-alerts/</loc>
		<lastmod>2019-06-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/botnets-ddos-and-beyond/</loc>
		<lastmod>2019-06-20T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/blocking-ddos-attacks-using-automation/</loc>
		<lastmod>2019-06-20T19:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-gartner-security-risk-mgmt-summit-starting-a-web-application-security-program/</loc>
		<lastmod>2019-06-20T20:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/avast-provides-parental-controls-to-mnos-avast/</loc>
		<lastmod>2019-06-20T20:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-gartner-security-risk-mgmt-summit-starting-an-appsec-program-part-2/</loc>
		<lastmod>2019-06-20T20:59:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-amazons-choice/</loc>
		<lastmod>2019-06-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/book-review-cybersecurity-blue-team-toolkit/</loc>
		<lastmod>2019-06-20T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/it-auditor-resume-tips/</loc>
		<lastmod>2019-06-21T00:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-organisations-can-effectively-manage-detect-and-respond-to-a-data-breach/</loc>
		<lastmod>2019-06-21T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-securing-erp-systems-is-critical-for-cisos/</loc>
		<lastmod>2019-06-21T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-road-to-reinforce-2019-insight-from-aws/</loc>
		<lastmod>2019-06-21T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/polarproxy-released/</loc>
		<lastmod>2019-06-21T06:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fake-news-and-pandemics/</loc>
		<lastmod>2019-06-21T10:10:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/computers-are-people-too/</loc>
		<lastmod>2019-06-21T12:24:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/millions-of-dell-pcs-vulnerable-to-attack-due-to-a-flaw-in-bundled-system-health-software/</loc>
		<lastmod>2019-06-21T13:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-2019-con-2019-susan-sons-information-security-practice-principles-a-rosetta-stone-for-information-security-work/</loc>
		<lastmod>2019-06-21T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/enhancing-video-streaming-quality-for-exoplayer-part-1-quality-of-user-experience-metrics/</loc>
		<lastmod>2019-06-21T16:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/backdoor-built-into-android-firmware/</loc>
		<lastmod>2019-06-21T16:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-research-reveals-a-surprising-world-of-iot-avast/</loc>
		<lastmod>2019-06-21T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/apples-umbrella-factory/</loc>
		<lastmod>2019-06-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/six-essentials-of-company-data-security/</loc>
		<lastmod>2019-06-21T17:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-benefits-of-managed-email-hosting-services-for-small-business/</loc>
		<lastmod>2019-06-21T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/office-365-proves-popular-with-phishers/</loc>
		<lastmod>2019-06-21T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/chip-security-emerges-a-hot-topic-in-the-supply-chain/</loc>
		<lastmod>2019-06-21T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-to-do-when-google-calendar-goes-down/</loc>
		<lastmod>2019-06-21T18:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-wendy-edwards-what-can-data-science-do-for-security/</loc>
		<lastmod>2019-06-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/activex-data-leaks-making-bad-non-browsers-worse/</loc>
		<lastmod>2019-06-21T19:14:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-set-up-a-dns-server/</loc>
		<lastmod>2019-06-21T19:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-second-zero-day-found-in-firefox-was-used-to-attack-coinbase-employees-fix-released-in-firefox-67-0-4-and-firefox-esr-60-7-2/</loc>
		<lastmod>2019-06-21T19:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/oracle-releases-emergency-patches-to-fix-a-critical-vulnerability-in-its-weblogic-servers/</loc>
		<lastmod>2019-06-21T19:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/security-news-roundup-facebook-libra-currency-under-fire-avast/</loc>
		<lastmod>2019-06-21T20:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-millennials/</loc>
		<lastmod>2019-06-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cloud-deployment-berlin-hosts-a-workshop/</loc>
		<lastmod>2019-06-21T21:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/grateful-for-15-with-f5/</loc>
		<lastmod>2019-06-21T21:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/infrastructure-cybersecurity-is-wanting/</loc>
		<lastmod>2019-06-21T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/data-breach-at-desjardins-bank-caused-by-malicious-insider/</loc>
		<lastmod>2019-06-21T22:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/malware-vs-virus-whats-the-difference/</loc>
		<lastmod>2019-06-21T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-human-factor-how-human-expertise-strengthens-your-security-posture/</loc>
		<lastmod>2019-06-22T05:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-alex-chalmers-evicting-the-password-from-the-digital-estate/</loc>
		<lastmod>2019-06-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-lisa-wallaces-beginning-dfir-how-to-get-started-with-cooties/</loc>
		<lastmod>2019-06-22T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-zucks-new-cryptocurrency/</loc>
		<lastmod>2019-06-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/small-florida-city-pays-hackers-600000-ransom-avast/</loc>
		<lastmod>2019-06-22T17:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-controlled-and-happy-family-2/</loc>
		<lastmod>2019-06-22T18:38:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-catherine-ullmans-a-theme-of-fear-hacking-the-paradigm/</loc>
		<lastmod>2019-06-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/back-doors-a-bad-idea-for-good-people/</loc>
		<lastmod>2019-06-22T19:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rest-api-security-testing-with-acunetix/</loc>
		<lastmod>2019-06-23T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-citizen-engagement-enables-welsh-police-to-reduce-road-fatalities/</loc>
		<lastmod>2019-06-23T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-rebecca-decks-of-cors-its-exploitable-whats-possible-with-cross-origin-resource-sharing/</loc>
		<lastmod>2019-06-23T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/robert-m-lees-jeff-hass-little-bobby-comics-everyone/</loc>
		<lastmod>2019-06-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-adi-ikans-nexus-zeta-how-a-newbie-hacker-managed-to-create-a-monster-botnet/</loc>
		<lastmod>2019-06-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/psa-how-to-go-mad-resetting-ge-light-bulb-firmware-the-8-second-rule/</loc>
		<lastmod>2019-06-23T22:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/facebooks-new-cryptocurrency-firefox-zero-day-smart-tv-malware/</loc>
		<lastmod>2019-06-24T04:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/price-vs-cost-what-the-stock-market-teaches-us-about-data-breaches/</loc>
		<lastmod>2019-06-24T05:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/whats-new-and-changing-in-the-world-of-vulnerability-management/</loc>
		<lastmod>2019-06-24T05:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-can-uk-financial-services-organisations-combat-the-cyber-threat/</loc>
		<lastmod>2019-06-24T08:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dear-ciso-who-is-responsible-for-data-privacy/</loc>
		<lastmod>2019-06-24T08:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyber-risk-insurance-sector-to-reach-7-5-billion-by-end-of-the-decade-pwc-says/</loc>
		<lastmod>2019-06-24T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/yikes-wetransfer-sends-users-files-to-the-wrong-people-says-it-doesnt-know-what-happened/</loc>
		<lastmod>2019-06-24T10:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/doh-will-the-new-protocol-change-how-infosec-professionals-work/</loc>
		<lastmod>2019-06-24T10:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sharing-phi-pii-and-pci-in-the-cloud/</loc>
		<lastmod>2019-06-24T12:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/privacy-and-access-management-insights-from-michael-chertoff/</loc>
		<lastmod>2019-06-24T14:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-mitchell-parkers-training-and-education-for-the-new-realities-of-privacy-and-security/</loc>
		<lastmod>2019-06-24T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/outlook-for-android-xss/</loc>
		<lastmod>2019-06-24T15:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/risk-visibility-across-the-app-stack-cloud-zeronorth-unveils-integration-with-aws-security-hub/</loc>
		<lastmod>2019-06-24T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/best-practices-do-you-know-the-last-time-you-were-socially-engineered/</loc>
		<lastmod>2019-06-24T16:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/more-medical-mega-breaches-thanks-to-third-party-insecurity/</loc>
		<lastmod>2019-06-24T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/regulus-demos-new-attack-gps-vector-all-the-things/</loc>
		<lastmod>2019-06-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-enjoy-a-cyber-safe-summer/</loc>
		<lastmod>2019-06-24T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/gandcrab-threat-actors-retire-maybe/</loc>
		<lastmod>2019-06-24T17:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/marketing-insecurity-podcast-data-before-dogma-how-research-can-change-your-cybersecurity-go-to-market/</loc>
		<lastmod>2019-06-24T18:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Wade_Baker_Sq512.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/marketing-insecurity-podcast-data-before-dogma-how-research-can-change-your-cybersecurity-go-to-market-2/</loc>
		<lastmod>2019-06-24T18:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/BrianSpector.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/marketing-insecurity-podcast-from-teamwork-to-story-and-back-again/</loc>
		<lastmod>2019-06-24T18:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Vasu_Jakal_Headshot_1_1_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/criminal-vs-ethical-hackers-who-wins/</loc>
		<lastmod>2019-06-24T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-verizon-dbir-the-c-suite-is-under-attack/</loc>
		<lastmod>2019-06-24T18:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-google-cloud-platform-primer-with-security-fundamentals/</loc>
		<lastmod>2019-06-24T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/10-things-you-need-to-know-about-kerberos/</loc>
		<lastmod>2019-06-24T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-yashvier-kosarajus-container-security-deep-dive/</loc>
		<lastmod>2019-06-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-loginradius-is-the-best-akamai-identity-cloud-janrain-alternative-2/</loc>
		<lastmod>2019-06-24T19:24:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-4-malicious-automation-attacks-how-to-detect-them/</loc>
		<lastmod>2019-06-24T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-is-your-website-a-target-the-seo-value-of-a-website/</loc>
		<lastmod>2019-06-24T20:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-eight-essentials-of-secure-computing-avast/</loc>
		<lastmod>2019-06-24T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-analysis-with-volatility/</loc>
		<lastmod>2019-06-24T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyberseek-cybersecurity-career-pathway-cybersecurity-manager-admin/</loc>
		<lastmod>2019-06-24T20:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-become-a-penetration-tester/</loc>
		<lastmod>2019-06-24T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-stack/</loc>
		<lastmod>2019-06-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cybersecurity-surprises-in-the-verizon-data-breach-investigations-report/</loc>
		<lastmod>2019-06-24T22:31:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-vendors-can-navigate-the-challenges-of-remote-support/</loc>
		<lastmod>2019-06-24T22:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/achieving-a-managed-state-model-for-your-software-supply-chain/</loc>
		<lastmod>2019-06-24T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xenotime-hacker-group-behind-oil-and-natural-gas-sites-are-now-targeting-us-power-grids/</loc>
		<lastmod>2019-06-24T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/openssh-code-gets-an-update-to-protect-against-side-channel-attacks/</loc>
		<lastmod>2019-06-24T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-us-launched-a-cyber-attack-on-iran-to-disable-its-rocket-launch-systems-iran-calls-it-unsuccessful/</loc>
		<lastmod>2019-06-24T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/current-cybersecurity-market-strong-whats-driving-it/</loc>
		<lastmod>2019-06-25T00:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-road-to-aws-reinforce-2019-unique-perspective-from-a-customer/</loc>
		<lastmod>2019-06-25T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aws-reinforce-2019-expectations-from-a-cybersecurity-conference-veteran/</loc>
		<lastmod>2019-06-25T01:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/two-brothers-arrested-for-bitfinex-hack-and-multi-year-cryptocurrency-phishing-campaign/</loc>
		<lastmod>2019-06-25T06:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ncipher-security-in-digitalisation-world/</loc>
		<lastmod>2019-06-25T06:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-cyber-skills-gap-the-diversity-debate/</loc>
		<lastmod>2019-06-25T07:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sd-wan-its-what-all-the-cool-kids-are-using/</loc>
		<lastmod>2019-06-25T07:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-third-party-supplier-has-breached-the-gdpr-am-i-liable/</loc>
		<lastmod>2019-06-25T07:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-36000-oss-projects-and-12000-commercial-dev-teams-taught-us-about-secure-coding-practices/</loc>
		<lastmod>2019-06-25T08:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pci-pal-launches-new-global-partner-program/</loc>
		<lastmod>2019-06-25T10:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc>
		<lastmod>2019-06-25T10:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-the-top-25-of-cybersecurity-pros-do-differently-in-strategy-risk-and-communication/</loc>
		<lastmod>2019-06-25T11:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/australian-hacker-to-serve-3-years-in-prison-for-insider-trading-unauthorized-computer-access/</loc>
		<lastmod>2019-06-25T11:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/insecure-communications-why-your-emails-arent-as-private-as-you-think/</loc>
		<lastmod>2019-06-25T11:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/13-reasons-why-wordpress-hacks-are-successful/</loc>
		<lastmod>2019-06-25T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/report-organizations-not-completely-clear-on-what-it-security-incidents-to-report/</loc>
		<lastmod>2019-06-25T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/3-steps-to-secure-cloud-storage/</loc>
		<lastmod>2019-06-25T12:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cities-are-under-attack-heres-why/</loc>
		<lastmod>2019-06-25T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/eight-key-trends-from-verizons-2019-data-breach-investigations-report/</loc>
		<lastmod>2019-06-25T12:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/veracode-to-showcase-devsecops-solutions-at-inaugural-aws-reinforce/</loc>
		<lastmod>2019-06-25T12:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/level-of-cyber-risk-to-businesses-held-steady-in-first-quarter-according-to-report/</loc>
		<lastmod>2019-06-25T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/where-security-accountability-stops-and-starts-in-the-public-cloud/</loc>
		<lastmod>2019-06-25T13:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/facebook-fails-to-fend-off-a-lawsuit-over-data-breach-of-nearly-30-million-users/</loc>
		<lastmod>2019-06-25T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/3-cybersecurity-lessons-for-e-commerce-website-administrators/</loc>
		<lastmod>2019-06-25T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/effective-cybersecurity-measures-to-protect-education-treasures/</loc>
		<lastmod>2019-06-25T14:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/penetration-tester-resume-tips/</loc>
		<lastmod>2019-06-25T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/penetration-tester-salary/</loc>
		<lastmod>2019-06-25T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/penetration-tester-career-path/</loc>
		<lastmod>2019-06-25T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-gabrielle-hempels-hacking-humans-addressing-vulnerabilities-in-the-advancing-medical-device-landscape/</loc>
		<lastmod>2019-06-25T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/intercept-saas-services-with-the-akamai-eaa-client/</loc>
		<lastmod>2019-06-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tracing-the-supply-chain-attack-on-android/</loc>
		<lastmod>2019-06-25T15:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/privileged-access-key-to-chinas-attack-on-telecoms/</loc>
		<lastmod>2019-06-25T15:26:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-intelligent-framework-mapping-is-the-new-harmony/</loc>
		<lastmod>2019-06-25T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/scranos-revisited-rethinking-persistence-to-keep-established-network-alive/</loc>
		<lastmod>2019-06-25T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/atlantic-council-discovers-likely-russian-federation-information-operation/</loc>
		<lastmod>2019-06-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-benefits-of-a-cloud-native-saas-waf-solution/</loc>
		<lastmod>2019-06-25T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ping-preempt-securing-all-access-in-hybrid-cloud-environments/</loc>
		<lastmod>2019-06-25T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-a-secure-enterprise-grade-communications-channel-can-protect-the-legal-industry/</loc>
		<lastmod>2019-06-25T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/enzoic-identified-as-a-leading-cyber-security-solution-provider/</loc>
		<lastmod>2019-06-25T17:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ransomware-strain-troldesh-spikes-again-avast/</loc>
		<lastmod>2019-06-25T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-continuous-testing/</loc>
		<lastmod>2019-06-25T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/key-components-to-consider-when-kicking-off-your-veracode-appsec-program/</loc>
		<lastmod>2019-06-25T18:37:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-nancy-snokes-oriwap-one-random-insecure-web-application-please/</loc>
		<lastmod>2019-06-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/https-phishing-the-rise-of-url-based-attacks/</loc>
		<lastmod>2019-06-25T19:22:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/integrating-grc-compliance-regulations-and-futurproofing-your-cybersecurity-program/</loc>
		<lastmod>2019-06-25T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-joy-of-tech-too-many-amazon-boxes/</loc>
		<lastmod>2019-06-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/abcs-of-ueba-h-is-for-hijacking/</loc>
		<lastmod>2019-06-25T21:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/breakthrough-listen-teams-up-with-seti-institute-to-host-out-of-this-world-wireless-research-conference/</loc>
		<lastmod>2019-06-25T23:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/10-most-glaring-cybersecurity-issues-of-us-government/</loc>
		<lastmod>2019-06-26T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/achieving-warp-speed-making-sure-your-security-infrastructure-is-up-to-snuff-will-supercharge-your-incident-responses/</loc>
		<lastmod>2019-06-26T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/christopher-bailey-appointed-ceo-of-nudata-security/</loc>
		<lastmod>2019-06-26T07:50:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/my-take-lets-not-lose-sight-of-why-iran-is-pushing-back-with-military-cyber-strikes/</loc>
		<lastmod>2019-06-26T08:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/panicking-the-right-way-in-go/</loc>
		<lastmod>2019-06-26T10:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/video-streaming-a-hidden-threat-to-enterprise-quality-of-experience-qoe/</loc>
		<lastmod>2019-06-26T10:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/christopher-bailey-from-cto-to-ceo-but-always-solving-problems/</loc>
		<lastmod>2019-06-26T12:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/our-account-of-hosting-with-kinsta-managed-wordpress-hosting/</loc>
		<lastmod>2019-06-26T12:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quick-hit-above-the-fold-hard-wrapping-text-at-n-characters/</loc>
		<lastmod>2019-06-26T12:48:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bitglass-security-spotlight-canadas-largest-credit-union-suffers-massive-data-breach/</loc>
		<lastmod>2019-06-26T12:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/1-1-million-in-two-weeks-florida-cities-pay-out-big-to-ransomware-gangs/</loc>
		<lastmod>2019-06-26T12:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/transforming-into-a-multicloud-environment/</loc>
		<lastmod>2019-06-26T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-become-a-cybercrime-investigator/</loc>
		<lastmod>2019-06-26T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/it-auditor-salary/</loc>
		<lastmod>2019-06-26T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/mining-packets-via-the-command-line-repost/</loc>
		<lastmod>2019-06-26T13:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fresh-start-in-education-improves-threat-protection-with-avast-avast/</loc>
		<lastmod>2019-06-26T14:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aws-reinforce-2019-day-1-recap/</loc>
		<lastmod>2019-06-26T14:39:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-cloud-security-concerns-that-still-keep-cybersecurity-pros-up-at-night/</loc>
		<lastmod>2019-06-26T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-doug-c00p3r-copelands-an-implantable-computer/</loc>
		<lastmod>2019-06-26T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/protecting-against-rising-phishing-attacks-and-the-human-element/</loc>
		<lastmod>2019-06-26T16:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/using-sd-wan-to-expand-revenue-opportunities/</loc>
		<lastmod>2019-06-26T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-in-repo-repository-routing-helps-protect-against-dependency-hijacking-attacks/</loc>
		<lastmod>2019-06-26T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/linkedins-vast-army-of-phantom-profiles/</loc>
		<lastmod>2019-06-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-vulnerability-discovered-in-kubernetes-kubectl-cp-command-can-allow-malicious-directory-traversal-attack-on-a-targeted-system/</loc>
		<lastmod>2019-06-26T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/magecart-activity-and-campaign-enhancements/</loc>
		<lastmod>2019-06-26T17:54:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/stay-alert-privacy-concerns-for-the-coming-months/</loc>
		<lastmod>2019-06-26T18:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-difference-between-root-certificates-and-intermediate-certificates/</loc>
		<lastmod>2019-06-26T18:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/top-3-operational-open-source-risk-factors/</loc>
		<lastmod>2019-06-26T18:58:35+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->