<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/06/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot-says-tcg/</loc>
		<lastmod>2019-06-26T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-fletcher-heislers-modern-appsec-gotchas/</loc>
		<lastmod>2019-06-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/idaptive-the-home-run-machine/</loc>
		<lastmod>2019-06-26T19:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-dark-net-diversifies-how-vendors-make-a-living-selling-vertical-specific-threats/</loc>
		<lastmod>2019-06-26T20:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fake-instagram-verification/</loc>
		<lastmod>2019-06-26T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-privacy-driven-security-culture/</loc>
		<lastmod>2019-06-26T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-motivated-reasoning-olympics/</loc>
		<lastmod>2019-06-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/see-bromium-at-isc2-secure-summit/</loc>
		<lastmod>2019-06-26T21:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devsecops-without-compromise/</loc>
		<lastmod>2019-06-26T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-to-expect-from-the-security-and-risk-management-market-in-2019-recap-from-the-gartner-security-and-risk-management-summit/</loc>
		<lastmod>2019-06-26T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/attck-structure-part-i-a-taxonomy-of-adversarial-behavior/</loc>
		<lastmod>2019-06-27T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-home-security-episode-locks-doors-cameras-and-more/</loc>
		<lastmod>2019-06-27T04:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/different-insider-threat-personas-and-how-to-detect-them/</loc>
		<lastmod>2019-06-27T06:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-businesses-need-iam-to-push-their-zero-trust-frameworks-forward/</loc>
		<lastmod>2019-06-27T07:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/threat-intelligence-best-practices/</loc>
		<lastmod>2019-06-27T09:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-problem-of-string-concatenation-and-format-string-vulnerabilities/</loc>
		<lastmod>2019-06-27T10:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/use-constexpr-for-faster-smaller-and-safer-code/</loc>
		<lastmod>2019-06-27T10:50:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-impact-of-gdpr-one-year-in/</loc>
		<lastmod>2019-06-27T12:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-improve-your-office-365-secure-score/</loc>
		<lastmod>2019-06-27T12:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/aws-reinforce-2019-recap-a-look-back-at-the-first-aws-security-show/</loc>
		<lastmod>2019-06-27T14:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ferruh-mavituna-is-interviewed-about-netsparker-by-enis-hulli-host-of-glocal/</loc>
		<lastmod>2019-06-27T14:10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/where-in-the-world-is-peter-carlisle-episode-6-tokyo/</loc>
		<lastmod>2019-06-27T14:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/live-from-aws-reinforce-learnings-from-security-enablement-for-devops-at-att/</loc>
		<lastmod>2019-06-27T14:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phishing-number-one-cause-of-data-breaches-lessons-from-verizon-dbir/</loc>
		<lastmod>2019-06-27T14:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/just-in-time-access-right-access-right-resources-right-reasons/</loc>
		<lastmod>2019-06-27T14:25:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/after-e24-million-stolen-by-typosquatting-a-cryptocurrency-exchange-six-people-arrested/</loc>
		<lastmod>2019-06-27T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/secure-file-sharing-the-next-nist-standard/</loc>
		<lastmod>2019-06-27T14:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-chad-calease-a-few-things-right-insights-from-live-and-simulated-incident-response/</loc>
		<lastmod>2019-06-27T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/youve-been-hacked-now-what-learn-from-the-experts/</loc>
		<lastmod>2019-06-27T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-ways-to-stand-out-in-a-cybersecurity-job-interview/</loc>
		<lastmod>2019-06-27T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cybersecurity-engineer-job-description/</loc>
		<lastmod>2019-06-27T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/pushing-vendors-to-abandon-sms/</loc>
		<lastmod>2019-06-27T16:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/questions-to-ask-when-considering-a-credential-screening-solution/</loc>
		<lastmod>2019-06-27T16:09:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/the-ciso-speaks-scott-niebuhr-of-the-aerospace-corp-on-cyber-security-staffing-challenge/</loc>
		<lastmod>2019-06-27T16:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cybereason-uncovering-operation-soft-cell/</loc>
		<lastmod>2019-06-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/breach-at-cloud-solution-provider-pcm-inc/</loc>
		<lastmod>2019-06-27T17:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/a-new-eu-cybersecurity-regulation-and-why-its-important/</loc>
		<lastmod>2019-06-27T18:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/personalized-customer-support-that-garners-a-personalized-thank-you/</loc>
		<lastmod>2019-06-27T18:54:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-zach-zenners-the-resilient-reddit-c2/</loc>
		<lastmod>2019-06-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/daniel-storis-securing-jenkins/</loc>
		<lastmod>2019-06-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-trust-your-cybersecurity/</loc>
		<lastmod>2019-06-27T21:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-design-and-implement-a-vendor-management-process/</loc>
		<lastmod>2019-06-27T21:23:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/do-google-ads-secretly-track-stack-overflow-users/</loc>
		<lastmod>2019-06-27T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/modernize-access-to-on-premise-apps-using-an-adc-and-idaptive-idaas/</loc>
		<lastmod>2019-06-27T22:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/devsecops-is-not-a-role-or-technology-its-a-culture-to-wholly-embrace/</loc>
		<lastmod>2019-06-27T23:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-happens-when-your-ciso-has-one-of-those-days/</loc>
		<lastmod>2019-06-28T00:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/intelligence-driven-threat-detection/</loc>
		<lastmod>2019-06-28T03:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/inter-skimmer-for-all/</loc>
		<lastmod>2019-06-28T04:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phil-dunkelberger-discusses-fido-and-secure-authentication/</loc>
		<lastmod>2019-06-28T04:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-smbs-believe-their-data-is-unsafe-in-the-cloud/</loc>
		<lastmod>2019-06-28T10:13:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-businesses-can-learn-from-a-classic-movie/</loc>
		<lastmod>2019-06-28T11:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/visualize-network-activity-in-amazon-virtual-private-clouds-to-spot-threats-faster/</loc>
		<lastmod>2019-06-28T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/two-weeks-with-the-apple-watch/</loc>
		<lastmod>2019-06-28T12:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cloud-hopper-the-chinese-group-that-hacked-eight-major-u-s-computer-service-firms-to-boost-economic-interests-reuters-reports/</loc>
		<lastmod>2019-06-28T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/quick-hit-dig-ging-into-r-project-org-dns-records-with-processx/</loc>
		<lastmod>2019-06-28T12:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/avast-ceo-vince-steckler-gives-a-qa-on-his-ten-years-at-the-top-avast/</loc>
		<lastmod>2019-06-28T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/fortune-100-passwords-email-archives-and-corporate-secrets-left-exposed-on-unsecured-amazon-s3-server/</loc>
		<lastmod>2019-06-28T14:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-matthew-southworths-christian-bobadillas-behind-the-locked-door-we-built-an-escape-room-for-security-awareness/</loc>
		<lastmod>2019-06-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/business-focused-approach-to-security-assurance-is-more-evolution-than-revolution/</loc>
		<lastmod>2019-06-28T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/enhancing-customer-value-building-customer-relationships-and-strengthening-team-collaboration/</loc>
		<lastmod>2019-06-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/rsac-2019-apj-ambassador-qa-mihoko-matsubara/</loc>
		<lastmod>2019-06-28T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/tron-and-transition/</loc>
		<lastmod>2019-06-28T16:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/checkmarx-named-a-june-2019-gartner-peer-insights-customers-choice-for-application-security-testing/</loc>
		<lastmod>2019-06-28T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/new-nist-iot-cyebrsecurity-document-published/</loc>
		<lastmod>2019-06-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/congressional-hearings-perspectives-on-tsas-policies-to-prevent-unlawful-profiling/</loc>
		<lastmod>2019-06-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-guidelines-for-a-successful-office-365-migration/</loc>
		<lastmod>2019-06-28T17:38:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/microsoft-to-require-multi-factor-authentication-for-cloud-solution-providers/</loc>
		<lastmod>2019-06-28T18:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/3-tips-to-action-consumer-trust-with-data-security-and-privacy/</loc>
		<lastmod>2019-06-28T18:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/securing-technology-innovators-web-layer-assets/</loc>
		<lastmod>2019-06-28T18:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/securing-your-business-applications-are-you-prepared/</loc>
		<lastmod>2019-06-28T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cyber-weakness-and-the-impact-on-the-economy/</loc>
		<lastmod>2019-06-28T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-xena-olsens-jared-pecks-f-attribution/</loc>
		<lastmod>2019-06-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/leaky-aws-s3-buckets-exposes-netflix-td-bank-and-fords-data-2/</loc>
		<lastmod>2019-06-28T19:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-reading-in-the-original/</loc>
		<lastmod>2019-06-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/10-data-privacy-and-encryption-laws-every-business-needs-to-know/</loc>
		<lastmod>2019-06-28T21:03:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/ea-origin-fixed-flaw-that-put-gamers-at-risk-avast/</loc>
		<lastmod>2019-06-28T21:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/nexus-intelligence-insights-cve-2018-1109-braces-regular-expression-denial-of-service-redos-attack/</loc>
		<lastmod>2019-06-28T21:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/developers-we-must-evolve/</loc>
		<lastmod>2019-06-28T21:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-two-factor-or-multi-factor-authentication-2/</loc>
		<lastmod>2019-06-28T21:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/undocumented-excel-variable-used-in-malicious-spam-run-targeting-japanese-users/</loc>
		<lastmod>2019-06-28T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/massive-1800forbail-wordpress-hacks/</loc>
		<lastmod>2019-06-28T22:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/an-iot-worm-silex-developed-by-a-14-year-old-resulted-in-malware-attack-and-taking-down-2000-devices/</loc>
		<lastmod>2019-06-29T02:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/europol-operation-arrests-six-in-28-million-crypto-scam/</loc>
		<lastmod>2019-06-29T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/trickbot-new-injects-new-host/</loc>
		<lastmod>2019-06-29T14:23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-alyssa-millers-inside-out-security-building-castles-not-warehouses/</loc>
		<lastmod>2019-06-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/experts-discuss-dark-patterns-and-deceptive-ui-designs-what-are-they-what-do-they-do-how-do-we-stop-them/</loc>
		<lastmod>2019-06-29T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/introduction-to-the-finite-state-supply-chain-assessment-of-huawei/</loc>
		<lastmod>2019-06-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2014-wolfgang-goerlichs-wibbly-wobbly-designing-security-for-systems-that-are-bigger-on-the-inside/</loc>
		<lastmod>2019-06-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/dear-ciso-all-organizations-need-perpetually-updated-data-visibility/</loc>
		<lastmod>2019-06-30T08:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/circle-city-con-2019-closing-ceremonies/</loc>
		<lastmod>2019-06-30T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/make-refreshing-segmented-column-charts-with-ggchicklet/</loc>
		<lastmod>2019-06-30T15:26:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/bens-book-of-the-month-review-of-practical-cloud-security-a-guide-for-secure-design-and-deployment/</loc>
		<lastmod>2019-06-30T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/xkcd-predictive-models/</loc>
		<lastmod>2019-06-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/showmecon-2019-welcome/</loc>
		<lastmod>2019-06-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/us-cyber-attack-on-iran-poor-government-cybersecurity-malvertising-campaigns/</loc>
		<lastmod>2019-07-01T04:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-avast-ceo-ondrej-vlcek-looks-ahead/</loc>
		<lastmod>2019-07-01T05:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/canada-day-2019-la-fete-du-canada-2019/</loc>
		<lastmod>2019-07-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/insider-threat-detection-a-serious-problem-for-u-s-businesses/</loc>
		<lastmod>2019-07-01T07:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/wanted-effective-cisos-that-happily-stay-longer/</loc>
		<lastmod>2019-07-01T09:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/it-pro-arrested-after-demonstrating-bug-in-kindergarten-software/</loc>
		<lastmod>2019-07-01T11:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tripwire-patch-priority-index-for-june-2019/</loc>
		<lastmod>2019-07-01T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-avoid-common-software-vulnerability-management-mistakes/</loc>
		<lastmod>2019-07-01T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-isolation-could-prevent-the-next-wannacry/</loc>
		<lastmod>2019-07-01T14:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/why-insurance-providers-need-to-adopt-zero-trust-internet/</loc>
		<lastmod>2019-07-01T14:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/disa-cloud-based-internet-isolation-cbii-awarded-to-the-by-light-professional-it-services-llc-and-menlo-security-team/</loc>
		<lastmod>2019-07-01T14:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/where-detection-and-prevention-fail-isolation-succeeds/</loc>
		<lastmod>2019-07-01T14:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/only-4-percent-of-users-click-on-phishing-emails-yet-those-4-percent-never-learn/</loc>
		<lastmod>2019-07-01T14:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/gartner-report-on-remote-browser-isolation-a-year-later/</loc>
		<lastmod>2019-07-01T14:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/sandboxes-are-vulnerable-but-not-obsolete-can-a-secure-web-gateway-with-internet-isolation-save-the-day/</loc>
		<lastmod>2019-07-01T14:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cyber-security-engineer-salary/</loc>
		<lastmod>2019-07-01T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/impostor-syndrome-burnout-and-the-challenges-of-a-career-in-security/</loc>
		<lastmod>2019-07-01T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/siderophile-expose-your-crates-unsafety/</loc>
		<lastmod>2019-07-01T15:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-integration-a-qa-with-fortinets-phil-quade/</loc>
		<lastmod>2019-07-01T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-matt-thelens-a-practical-approach-to-purple-teaming/</loc>
		<lastmod>2019-07-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/protect-detect-deter-respond-is-not-a-security-strategy/</loc>
		<lastmod>2019-07-01T16:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pce-premature-cyber-escalation/</loc>
		<lastmod>2019-07-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/its-not-just-you-theyre-after-its-your-supply-chain-too/</loc>
		<lastmod>2019-07-01T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-dave-chronister-s-some-assembly-required-instructions-not-included/</loc>
		<lastmod>2019-07-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-does-a-cybersecurity-analyst-do/</loc>
		<lastmod>2019-07-01T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/robert-m-lees-jeff-hass-little-bobby-comics-intelligence-problem/</loc>
		<lastmod>2019-07-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-tech-a-couple-of-tools-that-deserve-wide-use-to-preserve-the-integrity-of-u-s-elections/</loc>
		<lastmod>2019-07-01T19:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/human-creativity-gives-us-the-upper-hand-against-sophisticated-cybersecurity-attacks/</loc>
		<lastmod>2019-07-01T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-cloud-native-ci-cd-projects-openshift-and-tekton/</loc>
		<lastmod>2019-07-01T20:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/an-attack-on-sks-keyserver-network-a-write-only-program-poisons-two-high-profile-openpgp-certificates/</loc>
		<lastmod>2019-07-01T20:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cyber-security-roundup-for-june-2019/</loc>
		<lastmod>2019-07-01T21:58:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wannalocker-targets-banks-in-brazil-avast/</loc>
		<lastmod>2019-07-01T23:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-know-if-you-are-under-ddos-attack/</loc>
		<lastmod>2019-07-01T23:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/silex-malware-deadly-new-virus-bricks-1000s-of-iot-devices/</loc>
		<lastmod>2019-07-02T07:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/talking-cloud-technology-is-yesterdays-news/</loc>
		<lastmod>2019-07-02T08:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/state-of-the-art-proof-of-work-randomx/</loc>
		<lastmod>2019-07-02T10:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/14-reasons-professionals-give-for-why-network-security-is-getting-harder/</loc>
		<lastmod>2019-07-02T11:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/baltimore-allocates-10-million-to-emergency-funding-in-wake-of-ransomware-attack/</loc>
		<lastmod>2019-07-02T11:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-pci-compliance-challenge-for-local-authorities/</loc>
		<lastmod>2019-07-02T11:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/student-newspaper-hack-journalism-under-attack/</loc>
		<lastmod>2019-07-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/insecure-default-password-hashing-in-cmss/</loc>
		<lastmod>2019-07-02T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-os-command-injection/</loc>
		<lastmod>2019-07-02T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-are-email-injection-attacks/</loc>
		<lastmod>2019-07-02T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hackers-the-third-pillar-of-security/</loc>
		<lastmod>2019-07-02T13:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/florida-city-fires-it-director-after-meeting-ransomware-actors-demands/</loc>
		<lastmod>2019-07-02T13:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-poor-security-worse-than-no-security/</loc>
		<lastmod>2019-07-02T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/keyfactor-acquires-spanish-digital-identity-firm-redtrust/</loc>
		<lastmod>2019-07-02T14:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pci-pal-continues-global-momentum-with-new-company-appointments/</loc>
		<lastmod>2019-07-02T14:26:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-most-essential-tool-for-online-security/</loc>
		<lastmod>2019-07-02T14:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-hawk/</loc>
		<lastmod>2019-07-02T14:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-analyst-degree-requirements-certifications-and-skill-sets/</loc>
		<lastmod>2019-07-02T14:59:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/social-engineer-newsletter-vol-09-issue-118/</loc>
		<lastmod>2019-07-02T15:41:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-valerie-thomas-the-dark-side-of-physical-access-control-systems/</loc>
		<lastmod>2019-07-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/encryption-helped-win-americas-revolutionary-war/</loc>
		<lastmod>2019-07-02T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/italian-regulator-fines-facebook-e1-million-in-cambridge-analytica-scandal/</loc>
		<lastmod>2019-07-02T16:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/state-of-georgia-jurisprudence-stymied-by-ransomware/</loc>
		<lastmod>2019-07-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-you-still-need-that-ddos-appliance/</loc>
		<lastmod>2019-07-02T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-kevin-l-johnson-s-the-art-of-cyberwar-a-foundation-and-framework-for-the-development-of-ttps/</loc>
		<lastmod>2019-07-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/abcs-of-ueba-i-is-for-insider-threat/</loc>
		<lastmod>2019-07-02T18:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-i-powered-malware-will-asia-pacific-be-ground-zero/</loc>
		<lastmod>2019-07-02T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hipaa-compliance-and-cybersecurity-how-the-two-work-together/</loc>
		<lastmod>2019-07-02T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ai-the-unveiling/</loc>
		<lastmod>2019-07-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/5-years-of-fighting-ddos-with-the-power-of-akamai/</loc>
		<lastmod>2019-07-02T19:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/alert-logic-critical-watch-report-2019-reveals-majority-of-smb-devices-exposed-to-risk-from-unsupported-microsoft-os-versions/</loc>
		<lastmod>2019-07-02T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ensuring-data-security-in-slack/</loc>
		<lastmod>2019-07-02T19:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nist-800-63-3-digital-identity-guidelines-a-primer/</loc>
		<lastmod>2019-07-02T19:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/empowering-employees-to-reduce-security-incidents/</loc>
		<lastmod>2019-07-02T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-were-making-dfars-compliance-affordable-and-efficient/</loc>
		<lastmod>2019-07-02T20:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/flaw-reinforces-browser-extensions-as-potential-attack-vector/</loc>
		<lastmod>2019-07-02T21:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/addressing-theft-threats-from-all-angles/</loc>
		<lastmod>2019-07-02T21:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phishing-and-security-awareness-best-practices-for-healthcare-updated-2019/</loc>
		<lastmod>2019-07-02T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/patch-now-or-pay-later-report/</loc>
		<lastmod>2019-07-02T22:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/editors-question-how-important-is-cybersecurity-education-for-young-people-for-closing-the-cyberskills-gap/</loc>
		<lastmod>2019-07-02T22:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/thirty-four-years-instructor-machinist-cnc-and-cad-cam-part-1/</loc>
		<lastmod>2019-07-02T22:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/thirty-four-years-networking-and-software-development-part-2/</loc>
		<lastmod>2019-07-02T22:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tips-for-choosing-the-right-ci-cd-tools/</loc>
		<lastmod>2019-07-02T22:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/5-industries-at-risk-for-credential-stuffing-and-ato/</loc>
		<lastmod>2019-07-02T23:31:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/anonymous-access-in-nexus-repository-is-not-a-zero-day-vulnerability/</loc>
		<lastmod>2019-07-03T01:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/end-users-as-the-strongest-link/</loc>
		<lastmod>2019-07-03T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/lake-city-fires-its-it-director-after-paying-hackers-460k-in-ransom/</loc>
		<lastmod>2019-07-03T08:15:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/abusing-microsofts-azure-domains-to-host-phishing-attacks/</loc>
		<lastmod>2019-07-03T10:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/senate-passes-bill-to-help-defend-u-s-energy-grid-against-digital-attacks/</loc>
		<lastmod>2019-07-03T11:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sox-not-just-for-foxes-and-baseball-a-sarbanes-oxley-it-compliance-primer/</loc>
		<lastmod>2019-07-03T11:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/us-cyber-command-warns-nation-state-hackers-are-exploiting-old-microsoft-outlook-bug-make-sure-youre-patched/</loc>
		<lastmod>2019-07-03T11:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-5-security-issues-in-cloud-computing/</loc>
		<lastmod>2019-07-03T12:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bianlian-a-new-wave-emerges/</loc>
		<lastmod>2019-07-03T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ncipher-security-in-intelligent-cio-middle-east/</loc>
		<lastmod>2019-07-03T13:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/modern-analytics-and-end-to-end-visibility/</loc>
		<lastmod>2019-07-03T13:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-cost-of-ransomware-attacks-on-cities-2/</loc>
		<lastmod>2019-07-03T15:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-hudson-harris-human-centered-design-and-you-hack-your-life/</loc>
		<lastmod>2019-07-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-avoid-a-vendor-breach-in-5-simple-steps/</loc>
		<lastmod>2019-07-03T16:22:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-cybersecurity-hiring-managers-are-really-looking-out-for-or-should-be/</loc>
		<lastmod>2019-07-03T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-privacy-laws-have-changed-security-auditor-requirements/</loc>
		<lastmod>2019-07-03T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/incident-response-lessons-learned-from-jpl-cybersecurity-fails/</loc>
		<lastmod>2019-07-03T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/dataedge-2019-alex-stamos-the-platform-challenge-balancing-safety-privacy-and-freedom/</loc>
		<lastmod>2019-07-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/introducing-veracodes-new-analytics-capabilities/</loc>
		<lastmod>2019-07-03T17:26:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-trends-plaguing-healthcare-cybersecurity-how-to-fight-them/</loc>
		<lastmod>2019-07-03T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/addressing-the-cybersecurity-talent-shortage-takes-a-village/</loc>
		<lastmod>2019-07-03T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/shoemecon-2019-kurt-aubuchons-the-rising-geopolitical-cyber-power/</loc>
		<lastmod>2019-07-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/webinars-software-audits-for-ma-and-secure-programming/</loc>
		<lastmod>2019-07-03T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-kpis-for-the-smb/</loc>
		<lastmod>2019-07-03T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avoiding-smart-contract-gridlock-with-slither/</loc>
		<lastmod>2019-07-03T18:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-apple-siri-remotes-plea-for-help/</loc>
		<lastmod>2019-07-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/toyota-releases-car-hacking-tool-pasta-avast/</loc>
		<lastmod>2019-07-03T21:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-3-enterprise-saas-data-protection-trends/</loc>
		<lastmod>2019-07-03T21:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thirty-four-years-the-system-office-novell-directories-and-building-a-state-backbone-part-3/</loc>
		<lastmod>2019-07-04T00:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wordpress-plugin-wp-statistics-unauthenticated-stored-xss-under-certain-configurations/</loc>
		<lastmod>2019-07-04T02:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/on-the-occasion-of-independence-day-2019-president-theodore-roosevelts-independence-day-speech-1903/</loc>
		<lastmod>2019-07-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/us-journalist-detained-when-returning-to-us/</loc>
		<lastmod>2019-07-04T11:38:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/derp-ddos-attacker-who-brought-down-ea-sony-and-steam-jailed-for-27-months/</loc>
		<lastmod>2019-07-04T14:36:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/most-cisos-believe-companies-stake-their-reputations-on-cybersecurity-budgets-survey-shows/</loc>
		<lastmod>2019-07-04T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/next-generation-distributed-authorization/</loc>
		<lastmod>2019-07-04T15:05:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/youtubes-ban-on-instructional-hacking-and-phishing-videos-receives-backlash-from-the-infosec-community/</loc>
		<lastmod>2019-07-04T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/4-fundamentals-that-make-your-vulnerability-management-vm-program-less-effective/</loc>
		<lastmod>2019-07-05T04:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/chinese-border-patrol-installs-high-tech-surveillance-on-travelers-phones/</loc>
		<lastmod>2019-07-05T11:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/vulnerabilities-in-us-defense-could-lead-to-major-breach-in-two-years-says-black-hat-survey/</loc>
		<lastmod>2019-07-05T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/orvibo-smart-home-devices-leaked-billions-of-records-avast/</loc>
		<lastmod>2019-07-05T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-scott-holmans-cracking-the-code-hacking-the-human-mind/</loc>
		<lastmod>2019-07-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/unprotected-elasticsearch-database-exposes-2-billion-user-records-from-smart-home-devices/</loc>
		<lastmod>2019-07-05T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/its-combinatorial-thats-why/</loc>
		<lastmod>2019-07-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-andy-thompsons-confessions-of-really-bad-sysadmins/</loc>
		<lastmod>2019-07-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/protect-before-you-detect-flawedammyy-and-the-case-for-isolation/</loc>
		<lastmod>2019-07-05T18:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/repository-management-an-easy-way-to-minimize-risk/</loc>
		<lastmod>2019-07-05T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-coordinate-precision/</loc>
		<lastmod>2019-07-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/7-common-vpn-problems-the-not-so-good-the-bad-and-the-ugly/</loc>
		<lastmod>2019-07-05T19:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/spam-that-fits-your-website/</loc>
		<lastmod>2019-07-05T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/10-types-of-phishing-attacks-and-phishing-scams/</loc>
		<lastmod>2019-07-05T20:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-john-clark-s-sync-your-sht-why-its-time-you-paid-attention-to-time/</loc>
		<lastmod>2019-07-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-apple-watch-accessories/</loc>
		<lastmod>2019-07-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-vadon-willis-how-to-screw-up-your-incident-response-investigation-in-10-steps-or-less/</loc>
		<lastmod>2019-07-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/trump-administration-debating-encryption-crackdown/</loc>
		<lastmod>2019-07-07T02:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/sign-in-with-apple/</loc>
		<lastmod>2019-07-07T09:45:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-tim-graces-control-of-unclassified-information-in-non-federal-it-systems-or-what-you-dont-know-can-cost-you/</loc>
		<lastmod>2019-07-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/robert-m-lees-jeff-hass-little-bobby-comics-dns/</loc>
		<lastmod>2019-07-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/book-review-the-spy-in-moscow-station/</loc>
		<lastmod>2019-07-07T17:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-mike-morris-why-should-your-employees-know-how-to-phish/</loc>
		<lastmod>2019-07-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/even-dropbox-and-box-arent-safe/</loc>
		<lastmod>2019-07-07T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-leverage-devops-and-automation-to-bolster-security/</loc>
		<lastmod>2019-07-08T03:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/amazon-alexa-recordings-facebook-malware-campaign-top-3-tips-to-stay-private-on-vacation/</loc>
		<lastmod>2019-07-08T04:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/drivers-license-photo-database-used-by-fbi-ice-for-facial-recognition/</loc>
		<lastmod>2019-07-08T12:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-identify-and-eliminate-vpn-vulnerabilities/</loc>
		<lastmod>2019-07-08T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-are-one-time-passwords-and-their-pros-and-cons/</loc>
		<lastmod>2019-07-08T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/preventing-and-repairing-security-breaches/</loc>
		<lastmod>2019-07-08T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bitglass-at-aws-reinforce-2019-next-gen-casbs/</loc>
		<lastmod>2019-07-08T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ico-to-fine-british-airways-183-39-million-under-gdpr-over-2018-breach/</loc>
		<lastmod>2019-07-08T14:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/british-airways-faces-183m-fine-following-data-breach/</loc>
		<lastmod>2019-07-08T14:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/covert-online-investigation-tools-how-yesterdays-diy-is-todays-negative-roi/</loc>
		<lastmod>2019-07-08T15:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/defining-the-sd-branch/</loc>
		<lastmod>2019-07-08T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/national-trade-association-discloses-data-breach-tied-to-alleged-phishing-attack/</loc>
		<lastmod>2019-07-08T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/british-airways-faces-record-183-million-gdpr-fine-after-data-breach/</loc>
		<lastmod>2019-07-08T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/two-years-after-wannacry-nhs-still-not-properly-safeguarded-against-new-attacks/</loc>
		<lastmod>2019-07-08T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-david-vaughns-the-making-of-ch0mps-how-the-bitcoin-crash-facilitated-the-making-of-an-affordable-monster/</loc>
		<lastmod>2019-07-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nearly-thirty-percent-of-most-popular-vpns-worldwide-owned-by-hidden-chinese-organizations/</loc>
		<lastmod>2019-07-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/whos-behind-the-gandcrab-ransomware/</loc>
		<lastmod>2019-07-08T17:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-difference-between-format-preserving-encryption-and-tokenization/</loc>
		<lastmod>2019-07-08T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cardiac-biometric/</loc>
		<lastmod>2019-07-08T17:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ask-the-experts-whats-the-worst-web-application-security-issue/</loc>
		<lastmod>2019-07-08T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/rubygems-strong_password-v0-0-7-hijacked-infected-thread-and-attacker-account-isolated-for-now/</loc>
		<lastmod>2019-07-08T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/british-airways-set-to-face-a-record-breaking-fine-of-183m-by-the-ico-over-customer-data-breach/</loc>
		<lastmod>2019-07-08T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/google-project-zero-reveals-an-imessage-bug-that-bricks-iphone-causing-repetitive-crash-and-respawn-operations/</loc>
		<lastmod>2019-07-08T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/canonical-the-company-behind-the-ubuntu-linux-distribution-was-hacked-ubuntu-source-code-unaffected/</loc>
		<lastmod>2019-07-08T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-cliff-smiths-redesigning-password-authentication-for-the-modern-web/</loc>
		<lastmod>2019-07-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-citizens-bank-brings-security-to-its-community-of-local-banks/</loc>
		<lastmod>2019-07-08T18:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/developers-rejoice-auto-remediation-now-available-in-eclipse-intellij-and-visual-studio/</loc>
		<lastmod>2019-07-08T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-shadow-biosphere/</loc>
		<lastmod>2019-07-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/which-country-is-1-in-cybersecurity/</loc>
		<lastmod>2019-07-08T19:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/rsac-2019-apj-ambassador-qa-my-ngoc-nguyen/</loc>
		<lastmod>2019-07-08T19:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/study-49-of-itdms-feel-cloud-apps-are-the-biggest-targets-of-digital-threats/</loc>
		<lastmod>2019-07-08T19:46:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-security-teams-need-to-virtual-patch/</loc>
		<lastmod>2019-07-08T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/this-is-what-happens-when-automation-meets-orchestration/</loc>
		<lastmod>2019-07-08T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/7-things-you-should-monitor-in-wordpress-activity-logs/</loc>
		<lastmod>2019-07-09T00:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/rethinking-data-loss-protection/</loc>
		<lastmod>2019-07-09T01:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/attck-structure-part-ii-from-taxonomy-to-ontology/</loc>
		<lastmod>2019-07-09T04:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thales-study-reveals-49-of-it-decision-makers-feel-cloud-apps-are-the-biggest-targets-of-digital-threats/</loc>
		<lastmod>2019-07-09T07:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cloud-audit-protection-against-security-threats/</loc>
		<lastmod>2019-07-09T08:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/7-key-benefits-of-security-with-the-addition-of-biometrics/</loc>
		<lastmod>2019-07-09T08:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-it-time-to-test-your-business-card-payment-processes/</loc>
		<lastmod>2019-07-09T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/healthcare-needs-cybersecurity-pros-that-anticipate-what-threat-actors-will-do-next-qa-with-dr-rebecca-wynn/</loc>
		<lastmod>2019-07-09T11:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-defenses-improve-against-email-phishing-but-not-all-phishing-attacks/</loc>
		<lastmod>2019-07-09T11:09:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cell-networks-hacked-by-probable-nation-state-attackers/</loc>
		<lastmod>2019-07-09T11:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/suzanne-spaulding-how-to-build-resiliency-against-cyberattacks-2/</loc>
		<lastmod>2019-07-09T11:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/everything-you-need-to-know-about-office-365-cloud-app-security/</loc>
		<lastmod>2019-07-09T12:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/record-gdpr-fine-provides-stark-data-and-payment-protection-warning-to-business-owners/</loc>
		<lastmod>2019-07-09T12:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cyberark-docs-privileged-access-security-documentation-for-all/</loc>
		<lastmod>2019-07-09T13:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pci-ssc-asia-pacific-community-meeting-2019/</loc>
		<lastmod>2019-07-09T13:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/vonage-campus-2019/</loc>
		<lastmod>2019-07-09T13:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/endless-vulnerabilities-email-is-inherently-flawed/</loc>
		<lastmod>2019-07-09T14:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/executives-changing-views-on-cybersecurity/</loc>
		<lastmod>2019-07-09T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/we-are-a-best-place-to-work-four-years-in-a-row/</loc>
		<lastmod>2019-07-09T14:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stretching-left-with-threat-stack-application-security-monitoring/</loc>
		<lastmod>2019-07-09T14:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/latest-ico-ruling-underscores-the-importance-of-data-security-and-compliance/</loc>
		<lastmod>2019-07-09T14:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/overcoming-security-challenges-impacting-multi-cloud-environments/</loc>
		<lastmod>2019-07-09T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/summer-reading-dive-into-the-security-classics/</loc>
		<lastmod>2019-07-09T14:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/summer-reading-and-listening-dive-in-developers/</loc>
		<lastmod>2019-07-09T15:12:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/misconfigured-elasticsearch-cluster-exposed-over-90-million-records/</loc>
		<lastmod>2019-07-09T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-york-passes-a-law-that-further-expands-cyber-protection/</loc>
		<lastmod>2019-07-09T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/white-hat-hacker-in-dark-cybersecurity/</loc>
		<lastmod>2019-07-09T15:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/trust-and-the-contact-centre/</loc>
		<lastmod>2019-07-09T15:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-defender-atp-detects-astaroth-trojan-a-fileless-info-stealing-backdoor/</loc>
		<lastmod>2019-07-09T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-zero-day-vulnerability-on-mac-zoom-client-allows-hackers-to-enable-users-camera-leaving-750k-companies-exposed/</loc>
		<lastmod>2019-07-09T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-justin-l-baumans-penetration-testing-the-good-bad-and-the-ugly-of-vendor-management-reporting-and-risk-management-or-lack-thereof/</loc>
		<lastmod>2019-07-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sodin-ransomware/</loc>
		<lastmod>2019-07-09T16:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xss-auditors-abuses-updates-and-protection/</loc>
		<lastmod>2019-07-09T16:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ai-in-cybersecurity-expected-to-surpass-38-billion/</loc>
		<lastmod>2019-07-09T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-certification-overview-and-career-path/</loc>
		<lastmod>2019-07-09T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/an-overview-of-the-new-security-framework-for-windows-10/</loc>
		<lastmod>2019-07-09T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/join-synopsys-at-codenomi-con-and-black-hat-usa-2019/</loc>
		<lastmod>2019-07-09T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thirty-four-years-security-and-firewalling-part-4/</loc>
		<lastmod>2019-07-09T16:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/video-hacking-the-extraterrestrial-internet-where-fiction-meets-reality/</loc>
		<lastmod>2019-07-09T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-australian-signals-directorates-essential-eight-maturity-model-down-unders-security-guide/</loc>
		<lastmod>2019-07-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/phishing-as-a-service-turn-key-phishing-kits/</loc>
		<lastmod>2019-07-09T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-isaiah-sarjus-why-your-red-team-shouldnt-be-snowflakes/</loc>
		<lastmod>2019-07-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-advisory-targeting-ad-fs-with-external-brute-force-attacks/</loc>
		<lastmod>2019-07-09T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/visualize-your-cybersecurity-risks-with-apptegas-risk-rating/</loc>
		<lastmod>2019-07-09T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thirty-four-years-system-administration-backups-and-data-centers-part-5/</loc>
		<lastmod>2019-07-09T18:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thirty-four-years-building-out-disaster-recovery-part-6/</loc>
		<lastmod>2019-07-09T18:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-deep-dive-into-icedid-malware-part-i-unpacking-hooking-and-process-injection/</loc>
		<lastmod>2019-07-09T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/daniel-storis-deepest-secret/</loc>
		<lastmod>2019-07-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/icegram-persistent-cross-site-scripting/</loc>
		<lastmod>2019-07-09T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nist-800-63-a-enrollment-and-identity-proofing/</loc>
		<lastmod>2019-07-09T20:42:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/menlo-security-secures-75-million-funding-round-to-deliver-zero-trust-internet/</loc>
		<lastmod>2019-07-09T20:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-gets-teeth-british-airways-and-marriott-fined/</loc>
		<lastmod>2019-07-09T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/meet-the-latest-epms-requirements-and-boost-your-data-security-strategy/</loc>
		<lastmod>2019-07-09T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/business-continuity-communication-and-natural-disasters-what-you-should-know/</loc>
		<lastmod>2019-07-09T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/12-global-data-protection-trends-keeping-ceos-more-secure/</loc>
		<lastmod>2019-07-09T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/patch-tuesday-lowdown-july-2019-edition/</loc>
		<lastmod>2019-07-09T22:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sap-security-notes-july-19-critical-vulnerability-affecting-solution-manager/</loc>
		<lastmod>2019-07-09T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/july-2019-patch-tuesday-77-vulns-15-critical-dhcp-rce-exploited-privesc-sql-adobe-vulns/</loc>
		<lastmod>2019-07-10T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/reading-between-the-lines-of-nist-sp-800-171-rev-2-and-800-171b-drafts/</loc>
		<lastmod>2019-07-10T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/astaroth-trojan-resurfaces-targets-brazil-through-fileless-campaign/</loc>
		<lastmod>2019-07-10T02:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/attackers-are-thinking-about-phishing-differently-so-should-you/</loc>
		<lastmod>2019-07-10T02:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-data-scientist-pursues-snowkiting-hobby-avast/</loc>
		<lastmod>2019-07-10T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/9-cybersecurity-terms-you-need-to-know/</loc>
		<lastmod>2019-07-10T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-cyber-security-exercises-work-three-real-world-examples/</loc>
		<lastmod>2019-07-10T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/where-in-the-world-is-peter-carlisle-episode-7-buenos-aires/</loc>
		<lastmod>2019-07-10T06:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/vert-threat-alert-july-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-07-10T06:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wanted-effective-cisos-who-happily-stay-longer/</loc>
		<lastmod>2019-07-10T08:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/details-of-the-cloud-hopper-attacks/</loc>
		<lastmod>2019-07-10T10:51:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/marriott-faces-99-2-million-fine-after-hack-exposed-393-million-hotel-guest-records/</loc>
		<lastmod>2019-07-10T12:19:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bots-in-the-boardroom/</loc>
		<lastmod>2019-07-10T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/malvertising-campaign-redirects-to-rig-exploit-kit-eris-ransomware/</loc>
		<lastmod>2019-07-10T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/phishing-attacks-against-commercial-vessels-on-the-rise-alerts-us-coast-guard/</loc>
		<lastmod>2019-07-10T12:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zoom-isolated-safe-video-calling/</loc>
		<lastmod>2019-07-10T12:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-3-reasons-email-security-should-be-top-of-mind-for-everyone/</loc>
		<lastmod>2019-07-10T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/securing-payment-card-transactions/</loc>
		<lastmod>2019-07-10T14:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/computer-geeks-boosts-revenue-using-avast-business-cloudcare/</loc>
		<lastmod>2019-07-10T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-leads-charge-for-better-iot-security-avast/</loc>
		<lastmod>2019-07-10T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-isolation-mitigates-the-zoom-vulnerability/</loc>
		<lastmod>2019-07-10T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-bares-its-fangs-e315-million-in-penalties-over-just-three-days/</loc>
		<lastmod>2019-07-10T15:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/code-exposure-the-vulnerabilities-in-your-code-where-they-originate/</loc>
		<lastmod>2019-07-10T15:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-ryan-wisniewski-s-0day-to-heroday-bringing-a-company-from-scorched-earth-to-a-modern-security-organization/</loc>
		<lastmod>2019-07-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/weak-kneed-oversight-the-clowns-of-biometric-data-security/</loc>
		<lastmod>2019-07-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fire-up-your-cyber-security-career-with-these-9-job-related-tips/</loc>
		<lastmod>2019-07-10T17:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bitglass-security-spotlight-ea-origin-leaves-the-data-of-300-million-accounts-exposed/</loc>
		<lastmod>2019-07-10T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-kevin-johnsons-the-great-explainer-feynman-and-standing-on-the-shoulders-of-giants/</loc>
		<lastmod>2019-07-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/get-ready-for-a-ransomware-tsunami/</loc>
		<lastmod>2019-07-10T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-emergency-preparedness/</loc>
		<lastmod>2019-07-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nexus-intelligence-insights-cve-2019-13354-strong_password-embedded-malicious-code-rubygems/</loc>
		<lastmod>2019-07-10T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-your-business-requires-more-than-slack/</loc>
		<lastmod>2019-07-10T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/did-cyber-terror-win/</loc>
		<lastmod>2019-07-10T20:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-does-a-director-of-fraud-and-identity-do-2/</loc>
		<lastmod>2019-07-10T20:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-become-an-information-security-professional/</loc>
		<lastmod>2019-07-10T20:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-3-best-vpn-alternatives-for-enterprises/</loc>
		<lastmod>2019-07-10T20:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/announcing-the-2020-rsa-conference-theme-human-element/</loc>
		<lastmod>2019-07-10T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ico-to-fine-marriott-over-124-million-for-compromising-383-million-users-data-last-year/</loc>
		<lastmod>2019-07-10T22:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-secrets-revealed-in-new-exhibit-at-london-science-museum-avast/</loc>
		<lastmod>2019-07-10T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/magento-killer/</loc>
		<lastmod>2019-07-11T00:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-first-anniversary-of-the-gdpr-how-a-risk-based-approach-can-help-you-achieve-gdpr-compliance/</loc>
		<lastmod>2019-07-11T07:05:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/swimlane-research-team-open-sources-pyattack/</loc>
		<lastmod>2019-07-11T08:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/swimlanes-pyattack-works-with-mitre-attampck-framework/</loc>
		<lastmod>2019-07-11T08:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-do-you-protect-your-children-when-they-go-online/</loc>
		<lastmod>2019-07-11T09:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/loocipher-can-encrypted-files-be-recovered-from-hell/</loc>
		<lastmod>2019-07-11T10:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-critical-microsoft-cloud-security-issues/</loc>
		<lastmod>2019-07-11T11:43:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/closing-the-cyber-skills-gap-advice-from-a-ceo-cto-and-educator/</loc>
		<lastmod>2019-07-11T12:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/threat-actors-are-increasing-their-use-of-free-hosts/</loc>
		<lastmod>2019-07-11T14:22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/apple-says-its-walkie-talkie-app-could-be-exploited-to-spy-on-iphones/</loc>
		<lastmod>2019-07-11T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/magecart-actors-using-spray-and-pray-tactics-to-find-misconfigured-buckets/</loc>
		<lastmod>2019-07-11T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zeronorth-platform-update-scale-risk-management-and-visibility-with-deeper-integrations-extended-orchestration-capabilities/</loc>
		<lastmod>2019-07-11T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/apple-patched-vulnerability-in-macs-zoom-client-plans-to-address-video-on-by-default/</loc>
		<lastmod>2019-07-11T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-ypuffy/</loc>
		<lastmod>2019-07-11T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-analyst-job-description/</loc>
		<lastmod>2019-07-11T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/glass-box-solutions-are-critical-for-cybersecurity-reporting-to-executive-management/</loc>
		<lastmod>2019-07-11T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/using-components-with-known-vulnerabilities/</loc>
		<lastmod>2019-07-11T15:31:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bitdefender-expands-sandbox-workflows-and-use-cases-with-on-prem-deployment/</loc>
		<lastmod>2019-07-11T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/protecting-enterprises-from-state-sponsored-hackers/</loc>
		<lastmod>2019-07-11T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybercrime-risk-calculator-avast-business/</loc>
		<lastmod>2019-07-11T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/awards-recognize-avast-excellence-avast/</loc>
		<lastmod>2019-07-11T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-john-wagnons-tlsv1-3-minor-version-major-changes/</loc>
		<lastmod>2019-07-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-a-man-in-the-middle-attack-and-how-to-avoid-it/</loc>
		<lastmod>2019-07-11T16:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-partners-can-lessen-cyber-risk-for-smb-customers-offering-digital-experiences/</loc>
		<lastmod>2019-07-11T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pgp-under-duress/</loc>
		<lastmod>2019-07-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tufinnovate-boston-2019-day-one/</loc>
		<lastmod>2019-07-11T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/workday-credentials-exciting-times-for-identity-and-authentication-assurance-vendors/</loc>
		<lastmod>2019-07-11T17:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/showmecon-2019-jayson-streets-i-pwn-thee-i-pwn-thee-not/</loc>
		<lastmod>2019-07-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-observes-surge-in-dns-hijacking-in-brazil-avast/</loc>
		<lastmod>2019-07-11T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-lunar-cycles/</loc>
		<lastmod>2019-07-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-world-of-infinite-choice-in-open-source-software/</loc>
		<lastmod>2019-07-11T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fec-campaigns-can-use-discounted-cybersecurity-services/</loc>
		<lastmod>2019-07-11T20:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-shadow-it/</loc>
		<lastmod>2019-07-11T21:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ensuring-security-in-a-connected-world-with-a-new-tcg-subgroup/</loc>
		<lastmod>2019-07-11T21:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-new-chapter-in-bot-management-begins-today-video/</loc>
		<lastmod>2019-07-11T21:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/divvycloud-named-a-2019-red-hot-company-on-dca-lives-annual-shortlist-2/</loc>
		<lastmod>2019-07-11T21:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/rsac-2019-apj-ambassador-qa-magda-chelly/</loc>
		<lastmod>2019-07-11T21:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-vulnerability-found-in-jira-server-and-data-center-allows-attackers-to-remotely-execute-code-on-systems/</loc>
		<lastmod>2019-07-12T01:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ges-2-models-of-hospital-anesthesia-machines-found-with-vulnerabilities-says-it-wont-harm-unless-connected-to-a-hospital-network/</loc>
		<lastmod>2019-07-12T01:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/on-librabfts-use-of-broadcasts/</loc>
		<lastmod>2019-07-12T10:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/mayors-say-theyll-no-longer-pay-ransoms-connected-to-security-events/</loc>
		<lastmod>2019-07-12T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tufinnovate-boston-2019-day-two/</loc>
		<lastmod>2019-07-12T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-one-year-anniversary-a-risk-based-approach-to-gdpr-is-key-for-achieving-compliance/</loc>
		<lastmod>2019-07-12T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/6-point-office-365-post-migration-checklist/</loc>
		<lastmod>2019-07-12T14:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-david-kennedys-keynote/</loc>
		<lastmod>2019-07-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/introducing-jonathan-daly-to-onapsis/</loc>
		<lastmod>2019-07-12T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/metropolitan-london-police-face-identity-recognition-tests-proven-fatally-flawed/</loc>
		<lastmod>2019-07-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/twitter-will-deprecate-support-for-tls-1-0-tls-1-1-on-july-15/</loc>
		<lastmod>2019-07-12T17:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-robert-olsons-operationalizing-the-mitre-attck-framework/</loc>
		<lastmod>2019-07-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tata-communications-and-thales-join-forces-to-address-businesses-data-security-concerns-around-iot/</loc>
		<lastmod>2019-07-12T18:40:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/disappointed-by-cloud-security-and-high-cost-organizations-move-data-back-on-premises/</loc>
		<lastmod>2019-07-12T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-deciphering-airbnb-reviews/</loc>
		<lastmod>2019-07-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-much-does-remote-access-cost-5-factors-to-consider/</loc>
		<lastmod>2019-07-12T19:45:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/webinar-def-con-goons-badges-and-talks-inside-the-largest-hacker-con-in-the-world/</loc>
		<lastmod>2019-07-12T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/five-insights-from-and-about-the-first-aws-reinforce/</loc>
		<lastmod>2019-07-12T22:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/attack-patterns-uncover-defensive-strategies/</loc>
		<lastmod>2019-07-12T23:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/agent-smith-malware-hits-25-million-android-devices-avast/</loc>
		<lastmod>2019-07-13T00:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/federal-agencies-moving-to-the-cloud-must-take-stock-of-information-systems/</loc>
		<lastmod>2019-07-13T00:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-adds-telemetry-files-in-a-security-only-update-without-prior-notice-to-users/</loc>
		<lastmod>2019-07-13T00:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-introduces-passwordless-feature-in-its-windows-10-devices-replaces-it-with-windows-hello-face-authentication-fingerprints-or-a-pin/</loc>
		<lastmod>2019-07-13T00:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/25-million-android-devices-infected-with-agent-smith-a-new-mobile-malware/</loc>
		<lastmod>2019-07-13T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wolf-goerlich-chats-about-cybersecurity-and-the-value-of-local-groups-and-events/</loc>
		<lastmod>2019-07-13T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ncipher-security-in-sc-magazine/</loc>
		<lastmod>2019-07-13T05:52:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-fines-handed-down-in-europe-avast/</loc>
		<lastmod>2019-07-13T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-adam-hogans-markets-for-malware/</loc>
		<lastmod>2019-07-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-trained-a-neural-net/</loc>
		<lastmod>2019-07-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/garry-kasparaov-asks-can-ai-be-evil-avast/</loc>
		<lastmod>2019-07-13T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-matthew-gracies-the-tip-of-the-stinger-efficiently-using-threat-intelligence-with-thehive/</loc>
		<lastmod>2019-07-13T18:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/war-stories-just-shut-off-telnet/</loc>
		<lastmod>2019-07-14T05:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/we-dont-take-vendor-pitches/</loc>
		<lastmod>2019-07-14T05:51:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-damian-huisings-calls-to-arms-us-elections-hacking/</loc>
		<lastmod>2019-07-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-youre-a-minor-wizard-billy/</loc>
		<lastmod>2019-07-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-rose-songers-the-overlooked-cyber-security-risk-3rd-party-risk-management/</loc>
		<lastmod>2019-07-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zoom-zero-day-gdpr-fines-google-assistant-recordings/</loc>
		<lastmod>2019-07-15T04:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hacking-cars-getting-arrested-and-a-career-in-cybersecurity/</loc>
		<lastmod>2019-07-15T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/syracuse-ransomware-operators-increase-their-demands-as-victims-miss-payment-deadlines/</loc>
		<lastmod>2019-07-15T11:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/local-governments-targeted-by-global-cybercrime-syndicates-2/</loc>
		<lastmod>2019-07-15T13:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fbi-wants-to-invest-in-social-media-surveillance-tool/</loc>
		<lastmod>2019-07-15T12:17:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/guest-essay-6-unexpected-ways-that-a-cyber-attack-can-negatively-impact-your-business/</loc>
		<lastmod>2019-07-15T12:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/free-decryptor-released-for-ims00rry-ransomware/</loc>
		<lastmod>2019-07-15T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/climbing-the-vulnerability-management-mountain-gearing-up-and-taking-step-one/</loc>
		<lastmod>2019-07-15T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/u-s-coast-guard-releases-cybersecurity-measures-for-commercial-vessels/</loc>
		<lastmod>2019-07-15T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/poor-healthcare-industry-security-hygiene-places-lives-at-risk/</loc>
		<lastmod>2019-07-15T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/global-visibility-into-your-saas-applications/</loc>
		<lastmod>2019-07-15T12:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/us-mayors-agree-to-boycott-future-ransomware-attacks-following-hacking-spree-on-city-systems/</loc>
		<lastmod>2019-07-15T14:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/paying-the-piper-what-we-learned-from-the-british-airways-fine-2/</loc>
		<lastmod>2019-07-15T15:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/prevent-data-breaches-identity-logs-and-machine-learning/</loc>
		<lastmod>2019-07-15T15:25:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/infocytes-mid-market-threat-and-incident-response-report-reveals-persistent-threats-and-vulnerabilities-can-remain-for-years/</loc>
		<lastmod>2019-07-15T15:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/palantirs-surveillance-service-for-law-enforcement/</loc>
		<lastmod>2019-07-15T15:41:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-revil-the-new-gandcrab-ransomware/</loc>
		<lastmod>2019-07-15T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-ian-thornton-trumps-the-politics-of-cyber/</loc>
		<lastmod>2019-07-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-hidden-challenge-of-the-cloud-security-skills-gap/</loc>
		<lastmod>2019-07-15T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-lightweight/</loc>
		<lastmod>2019-07-15T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/anti-spam-legislation-for-system-administrators/</loc>
		<lastmod>2019-07-15T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-analyst-salary/</loc>
		<lastmod>2019-07-15T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cissp-domain-1-security-and-risk-management-what-you-need-to-know-for-the-exam/</loc>
		<lastmod>2019-07-15T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/due-care-vs-due-diligence-and-the-cissp/</loc>
		<lastmod>2019-07-15T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/risk-management-concepts-and-the-cissp-part-1/</loc>
		<lastmod>2019-07-15T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/earning-cpe-credits-to-maintain-the-cissp/</loc>
		<lastmod>2019-07-15T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-ssl-store-and-manageengine-team-up-to-simplify-certificate-management/</loc>
		<lastmod>2019-07-15T17:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/apple-inc-guardian-of-all-things-privacy-suspends-leaky-app/</loc>
		<lastmod>2019-07-15T17:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/much-like-amazon-prime-day-digital-assistant-and-iot-device-security-is-an-epic-deal/</loc>
		<lastmod>2019-07-15T17:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-adam-len-comptons-david-boyds-unix-the-other-white-meat/</loc>
		<lastmod>2019-07-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/webinars-software-supply-chain-and-open-source-scans/</loc>
		<lastmod>2019-07-15T18:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/robert-m-lees-jeff-hass-little-bobby-comics-defense/</loc>
		<lastmod>2019-07-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/application-security-for-modern-applications/</loc>
		<lastmod>2019-07-15T19:24:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-prevent-insider-data-breaches-at-your-business/</loc>
		<lastmod>2019-07-15T19:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-researcher-finds-apparent-android-app-scam/</loc>
		<lastmod>2019-07-15T20:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/quick-hit-a-different-diminutive-look-at-distributions-with-ggeconodist/</loc>
		<lastmod>2019-07-15T21:21:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/getting-over-mfa-implementation-hesitation/</loc>
		<lastmod>2019-07-15T21:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-issue-brief-state-cyber-disruption-response-plans/</loc>
		<lastmod>2019-07-15T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-evolution-of-cybersecurity-unconventional-controls-reinforce-successful-security-programs/</loc>
		<lastmod>2019-07-15T23:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/book-review-of-cold-war-thriller-the-spy-in-moscow-station/</loc>
		<lastmod>2019-07-16T04:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-cost-of-a-hacked-website-survey/</loc>
		<lastmod>2019-07-16T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/moving-to-the-cloud-as-easy-as-1-2-3-4-5-6/</loc>
		<lastmod>2019-07-16T07:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/highlights-from-the-2019-southeast-asia-encryption-trends-study-2/</loc>
		<lastmod>2019-07-16T08:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/measuring-security-continuum-shift-where-are-you-on-endpoints/</loc>
		<lastmod>2019-07-16T08:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/risk-assessments-are-essential-for-gdpr-compliance/</loc>
		<lastmod>2019-07-16T09:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/12-events-at-black-hat-usa-2019-you-wont-want-to-miss/</loc>
		<lastmod>2019-07-16T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/evite-reveals-security-incident-potentially-involving-unauthorized-access/</loc>
		<lastmod>2019-07-16T11:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/open-invitation-to-help-develop-infosec-community-resources/</loc>
		<lastmod>2019-07-16T11:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/education-cybersecurity-initiatives-the-main-rule-is-not-to-overdo/</loc>
		<lastmod>2019-07-16T11:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/quest-diagnostics-breach-underscores-importance-of-securing-all-touchpoints/</loc>
		<lastmod>2019-07-16T12:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-cloud-application-security/</loc>
		<lastmod>2019-07-16T12:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ransomware-amounts-rise-3x-in-q2-as-ryuk-sodinokibi-spread/</loc>
		<lastmod>2019-07-16T12:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/eus-satellite-navigation-system-galileo-suffers-major-outage-nears-100-hours-of-downtime/</loc>
		<lastmod>2019-07-16T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/have-crypto-miners-infiltrated-your-public-cloud/</loc>
		<lastmod>2019-07-16T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nist-proposes-secure-software-development-framework-2/</loc>
		<lastmod>2019-07-16T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/shiftleft-ocular-identifies-business-logic-flaws-10x-faster-than-manual-code-reviews/</loc>
		<lastmod>2019-07-16T13:37:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-importance-of-cybersecurity-for-online-gaming/</loc>
		<lastmod>2019-07-16T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pentesting-as-part-of-an-organizational-security-program/</loc>
		<lastmod>2019-07-16T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/exploring-the-viability-of-signature-recognition-biometrics/</loc>
		<lastmod>2019-07-16T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-most-organizations-still-cant-defend-against-dcshadow/</loc>
		<lastmod>2019-07-16T15:15:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/trust-is-a-must-for-wary-australian-consumers-new-study-reveals-data-security-influences-purchasing-habits/</loc>
		<lastmod>2019-07-16T15:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/modernize-your-iam-platform-seven-simple-steps/</loc>
		<lastmod>2019-07-16T15:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/</loc>
		<lastmod>2019-07-16T15:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/meet-the-worlds-biggest-bulletproof-hoster/</loc>
		<lastmod>2019-07-16T15:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-breach-research-we-need/</loc>
		<lastmod>2019-07-16T15:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-brian-kings-hack-for-show-report-for-dough/</loc>
		<lastmod>2019-07-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/low-hanging-the-fruits-are/</loc>
		<lastmod>2019-07-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/16-cloud-security-experts-share-the-most-costly-security-technology-misconceptions-when-it-comes-to-cloud-migration/</loc>
		<lastmod>2019-07-16T17:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zoom-vulnerability/</loc>
		<lastmod>2019-07-16T17:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-hackers-are-targeting-your-web-apps-and-how-to-stop-them/</loc>
		<lastmod>2019-07-16T17:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/slashnext-real-time-phishing-threat-intelligence-now-integrated-with-threatq/</loc>
		<lastmod>2019-07-16T17:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-jason-nesters-early-detection-through-deception/</loc>
		<lastmod>2019-07-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/tls-1-3-everything-you-need-to-know/</loc>
		<lastmod>2019-07-16T18:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/daniel-storis-cors-explained/</loc>
		<lastmod>2019-07-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/join-onapsis-at-black-hat-usa-2019/</loc>
		<lastmod>2019-07-16T19:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-deep-dive-into-icedid-malware-part-ii-analysis-of-the-core-icedid-payload-parent-process/</loc>
		<lastmod>2019-07-16T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-partners-can-grow-their-business-and-skillsets-with-nse-8-certification/</loc>
		<lastmod>2019-07-16T19:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/much-energy-inspiration-and-deep-dives-into-security-at-rsa-conference-2019-apj/</loc>
		<lastmod>2019-07-16T19:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/eliminate-shadow-it-with-secure-content-access-that-doesnt-slow-workflows/</loc>
		<lastmod>2019-07-16T21:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stolen-payment-data-infected-ecommerce-website-to-darknet-markets/</loc>
		<lastmod>2019-07-16T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cloudflare-rca-major-outage-was-a-lot-more-than-a-regular-expression-went-bad/</loc>
		<lastmod>2019-07-16T22:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nist-800-63-b-authentication-and-lifecycle-management-guidelines/</loc>
		<lastmod>2019-07-16T23:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/local-admin-passwords-the-hidden-security-risk/</loc>
		<lastmod>2019-07-16T23:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/oracles-july-2019-cpu-patches-three-critical-vulnerabilities-in-e-business-suite-reported-by-onapsis/</loc>
		<lastmod>2019-07-17T01:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/back-to-basics-infosec-for-small-and-medium-sized-businesses/</loc>
		<lastmod>2019-07-17T03:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/introducing-continuous-password-protection-for-active-directory/</loc>
		<lastmod>2019-07-17T06:22:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/u-s-healthcare-industry-needs-a-shot-in-the-arm-when-it-comes-to-data-protection-70-experienced-a-breach-less-than-38-are-encrypting-even-as-threats-increase/</loc>
		<lastmod>2019-07-17T07:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/best-practices-companies-can-take-to-stop-crypto-miners-from-hijacking-servers/</loc>
		<lastmod>2019-07-17T07:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-manage-your-wordpress-users/</loc>
		<lastmod>2019-07-17T09:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hackers-steal-32-million-from-japanese-cryptocurrency-exchange-bitpoint/</loc>
		<lastmod>2019-07-17T11:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/guardians-of-the-cloud-the-latest-security-findings/</loc>
		<lastmod>2019-07-17T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ransomware-attack-disrupts-some-services-at-onondaga-county-libraries/</loc>
		<lastmod>2019-07-17T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-launch-at-impact-privileged-access-security-solution-version-11/</loc>
		<lastmod>2019-07-17T12:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/mobile-security-theres-a-bad-app-uprising/</loc>
		<lastmod>2019-07-17T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fortinet-receives-6th-consecutive-recommend-rating-in-nss-labs-2019-ngfw-group-test/</loc>
		<lastmod>2019-07-17T13:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/introducing-cyberark-alero-reduce-risk-from-remote-vendors/</loc>
		<lastmod>2019-07-17T15:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-cisos-and-cat-herders-have-in-common/</loc>
		<lastmod>2019-07-17T15:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/g-summit-europe/</loc>
		<lastmod>2019-07-17T15:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-engineer-interview-questions-and-answers/</loc>
		<lastmod>2019-07-17T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-2-network-based-attacks/</loc>
		<lastmod>2019-07-17T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-top-3-emerging-technologies-posing-a-cyber-threat-our-critical-national-infrastructure/</loc>
		<lastmod>2019-07-17T15:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-top-3-emerging-technologies-posing-a-cyber-threat-to-our-critical-national-infrastructure/</loc>
		<lastmod>2019-07-17T15:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-3-cloud-security-trends-for-2019/</loc>
		<lastmod>2019-07-17T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-amber-welchs-data-access-rights-exploits-under-new-privacy-laws/</loc>
		<lastmod>2019-07-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-dennis-goodletts-eval-villain-simplifying-dom-xss-and-js-reversing/</loc>
		<lastmod>2019-07-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/webinar-tomorrow-dr-mcguire-presents-findings-from-behind-the-dark-net-black-mirror-study/</loc>
		<lastmod>2019-07-17T16:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-10-facts-from-av-tests-annual-cybersecurity-report/</loc>
		<lastmod>2019-07-17T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/integrated-risk-management-magic-quadrant-2019-in-review/</loc>
		<lastmod>2019-07-17T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-first-news-memory/</loc>
		<lastmod>2019-07-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-move-security-up-the-devops-priority-list/</loc>
		<lastmod>2019-07-17T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-jeremy-mios-public-partnership-panel-for-security-response/</loc>
		<lastmod>2019-07-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-build-the-best-vendor-access-program-in-3-easy-steps/</loc>
		<lastmod>2019-07-17T18:51:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ducks-in-a-row/</loc>
		<lastmod>2019-07-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hospitals-clinics-in-los-angeles-hit-by-data-breach/</loc>
		<lastmod>2019-07-17T19:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/consumer-surveillance-good-but-risks-lurk-in-the-background/</loc>
		<lastmod>2019-07-17T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/phishing-drills-critical-to-better-cyber-resilience/</loc>
		<lastmod>2019-07-17T19:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/artificial-intelligence-in-cyber-security-the-savior-or-enemy-of-your-business/</loc>
		<lastmod>2019-07-17T20:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hacker-group-magecart-attacking-misconfigured-s3-buckets-2/</loc>
		<lastmod>2019-07-17T20:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/party-like-a-russian-carders-edition/</loc>
		<lastmod>2019-07-17T20:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/convenience-and-privacy-in-online-business-communications-can-you-have-both/</loc>
		<lastmod>2019-07-17T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/google-pulls-stalker-apps-identified-by-avast-avast/</loc>
		<lastmod>2019-07-17T22:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-security-job-1-by-richard-stiennon/</loc>
		<lastmod>2019-07-17T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/we-spend-billions-on-information-security-so-why-do-companies-continue-to-get-owned/</loc>
		<lastmod>2019-07-17T23:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/moving-soon/</loc>
		<lastmod>2019-07-17T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/6-reasons-why-encryption-back-doors-wont-deter-criminals/</loc>
		<lastmod>2019-07-18T00:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/citizen-engagement-helps-welsh-police-reduce-road-fatalities/</loc>
		<lastmod>2019-07-18T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/communication-the-forgotten-security-tool/</loc>
		<lastmod>2019-07-18T04:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pci-pal-secures-a-place-on-the-g-cloud-11-framework-2/</loc>
		<lastmod>2019-07-18T08:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/multi-cloud-security-best-practices-guide/</loc>
		<lastmod>2019-07-18T08:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-a-csrf-attack/</loc>
		<lastmod>2019-07-18T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/does-youtube-ban-hacking-videos/</loc>
		<lastmod>2019-07-18T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-the-high-orbit-ion-cannon/</loc>
		<lastmod>2019-07-18T09:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-convert-a-selenium-login-script-into-a-login-sequence-file/</loc>
		<lastmod>2019-07-18T09:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/doh-mozilla-cloudflare-and-google-vs-the-world/</loc>
		<lastmod>2019-07-18T09:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-defend-against-clickjacking-attacks/</loc>
		<lastmod>2019-07-18T09:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-build-improves-auto-login-detection-of-dom-xss-wafs-cdns-and-reverse-proxies/</loc>
		<lastmod>2019-07-18T09:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/billions-of-iot-user-records-leaked-via-an-unprotected-database/</loc>
		<lastmod>2019-07-18T09:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/social-engineering-effective-in-cyber-threats/</loc>
		<lastmod>2019-07-18T09:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/one-in-10-firms-loses-over-10-million-from-a-cyber-attack/</loc>
		<lastmod>2019-07-18T11:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-observed-nation-state-attacks-targeting-10000-of-its-customers/</loc>
		<lastmod>2019-07-18T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-microsoft-cloud-secure-office-365-apps-security/</loc>
		<lastmod>2019-07-18T12:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-defender-advanced-threat-protection-queries/</loc>
		<lastmod>2019-07-18T12:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/running-queries-on-microsoft-defender-advanced-threat-protection/</loc>
		<lastmod>2019-07-18T12:27:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-normalization-of-ddos-attacks/</loc>
		<lastmod>2019-07-18T12:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/just-in-time-access-just-how-you-want-it/</loc>
		<lastmod>2019-07-18T13:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stretch-right-with-threat-stack-application-security-monitoring/</loc>
		<lastmod>2019-07-18T13:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-business-email-compromise-bec-attacks-impact-everyone/</loc>
		<lastmod>2019-07-18T14:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/geolocation-sale-bill-vetoed-by-hawaii-governor/</loc>
		<lastmod>2019-07-18T14:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/passion-or-interest/</loc>
		<lastmod>2019-07-18T14:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-a-letter-from-elizabeth-denham/</loc>
		<lastmod>2019-07-18T15:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/akamai-load-balancing-to-lock-in-quality/</loc>
		<lastmod>2019-07-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/announcing-the-2019-cyberark-marketplace-community-integration-award-winner-for-greatest-cybersecurity-impact/</loc>
		<lastmod>2019-07-18T15:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/thousands-of-nhs-computers-are-still-running-windows-xp-from-beyond-the-grave/</loc>
		<lastmod>2019-07-18T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-spencer-mcintyres-automating-windows-kernel-analysis-with-symbolic-execution/</loc>
		<lastmod>2019-07-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-cyber-security-exercises-can-keep-you-in-shape/</loc>
		<lastmod>2019-07-18T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-how-hacking-works/</loc>
		<lastmod>2019-07-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/facebookery-circa-2018/</loc>
		<lastmod>2019-07-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-help/</loc>
		<lastmod>2019-07-18T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-analyst-certifications/</loc>
		<lastmod>2019-07-18T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/houston-i-mean-bulgaria-weve-got-a-problem/</loc>
		<lastmod>2019-07-18T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bsides-cleveland-2019-thomas-reeds-incident-response-on-macos/</loc>
		<lastmod>2019-07-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/daniel-storis-777/</loc>
		<lastmod>2019-07-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sql-injection-attacks-sqli-web-based-application-security-part-4/</loc>
		<lastmod>2019-07-18T20:10:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/deepfakes-is-an-emerging-threat-vector/</loc>
		<lastmod>2019-07-18T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-industry-can-contribute-its-expertise-to-cyberspace-peace/</loc>
		<lastmod>2019-07-18T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/for-efficiency-and-effectiveness-threat-detection-needs-a-structure/</loc>
		<lastmod>2019-07-18T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-strange-case-of-the-malicious-favicon/</loc>
		<lastmod>2019-07-18T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/devops-at-the-us-patent-and-trademark-office/</loc>
		<lastmod>2019-07-18T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/employment-phishing-and-social-engineering-attacks-endanger-jobseekers-and-organizations-2/</loc>
		<lastmod>2019-07-18T21:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/upping-the-security-ante-how-to-get-teams-buy-in-for-zero-trust/</loc>
		<lastmod>2019-07-18T23:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/securing-software-development-nist-joins-the-parade/</loc>
		<lastmod>2019-07-18T23:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-faceapp-safe-to-use-avast/</loc>
		<lastmod>2019-07-19T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/behind-the-scenes-of-application-security-is-a-plumbing-problem/</loc>
		<lastmod>2019-07-19T01:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/firefox-70-will-bring-new-security-measures-to-ensure-user-safety-from-cyberattacks/</loc>
		<lastmod>2019-07-19T05:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/leveraging-cloud-apis-for-comprehensive-security/</loc>
		<lastmod>2019-07-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/retail-world-feature-data-security-influences-purchasing-habits/</loc>
		<lastmod>2019-07-19T13:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/google-raises-award-amounts-for-chromium-bug-bounty-program/</loc>
		<lastmod>2019-07-19T13:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/faceapp-concerns-myth-or-mess/</loc>
		<lastmod>2019-07-19T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ccpa-countdown-a-mixed-bag-of-amendments-advance-with-five-months-to-go/</loc>
		<lastmod>2019-07-19T14:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-a-high-priority-for-2019-uk-organizations-say/</loc>
		<lastmod>2019-07-19T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-introduction-of-gdpr-one-year-on/</loc>
		<lastmod>2019-07-19T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-whitney-merrills-keynote-privacy-vs-security-its-a-log-story/</loc>
		<lastmod>2019-07-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-much-do-privileged-access-management-pam-solutions-cost/</loc>
		<lastmod>2019-07-19T16:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-phishing-protection-protocol-that-covers-6-non-email-attack-vectors/</loc>
		<lastmod>2019-07-19T16:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/quickbooks-cloud-hosting-firm-insynq-hit-in-ransomware-attack/</loc>
		<lastmod>2019-07-19T16:40:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/instagram-2fa-bypass-a-tale-of-superlative-bug-hunting-skills-indolent-multi-factor-authentication/</loc>
		<lastmod>2019-07-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pinning-down-a-phishing-definition/</loc>
		<lastmod>2019-07-19T17:06:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/with-proposed-british-airways-marriott-fines-that-gdpr-iceberg-is-getting-a-lot-bigger/</loc>
		<lastmod>2019-07-19T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-sarah-jones-a-brief-history-of-attribution-mistakes/</loc>
		<lastmod>2019-07-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-facebooks-fine/</loc>
		<lastmod>2019-07-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/google-plans-to-remove-xss-auditor-used-for-detecting-xss-vulnerabilities-from-its-chrome-web-browser/</loc>
		<lastmod>2019-07-19T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-universal-bypass-tricks-cylance-ai-antivirus-into-accepting-all-top-10-malware-revealing-a-new-attack-surface-for-machine-learning-based-security/</loc>
		<lastmod>2019-07-19T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/extreme-endurance-required/</loc>
		<lastmod>2019-07-19T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/test-notifications/</loc>
		<lastmod>2019-07-19T21:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microsoft-reports-nation-state-political-attacks-avast/</loc>
		<lastmod>2019-07-19T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/an-analysis-of-l0rdix-rat-panel-and-builder/</loc>
		<lastmod>2019-07-19T23:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fortinet-breaks-ground-on-new-energy-efficient-headquarters-facility/</loc>
		<lastmod>2019-07-20T00:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/understanding-docker-container-escapes/</loc>
		<lastmod>2019-07-20T01:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ex-microsoft-employee-arrested-for-stealing-over-10m-from-store-credits-using-a-test-account/</loc>
		<lastmod>2019-07-20T03:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-david-j-biancos-quality-over-quantity-determining-your-cti-detection-efficacy/</loc>
		<lastmod>2019-07-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-expiration-date-high-score/</loc>
		<lastmod>2019-07-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-mitchell-edwards-language-and-culture-in-threat-intelligence/</loc>
		<lastmod>2019-07-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-matt-bromileys-bec-revisited-dropping-by-on-our-favorite-prince/</loc>
		<lastmod>2019-07-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/robert-m-lees-jeff-hass-little-bobby-comics-zero-day-noobs/</loc>
		<lastmod>2019-07-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/another-look-at-insider-threats/</loc>
		<lastmod>2019-07-21T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-katie-nickels-brian-beyers-attck-your-cti-with-lessons-learned-from-4-years-in-the-trenches/</loc>
		<lastmod>2019-07-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-6-windows-security-settings-to-configure-right-now/</loc>
		<lastmod>2019-07-21T21:54:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/faceapp-privacy-panic-facebooks-5-billion-dollar-fine-amazon-brushing-scams/</loc>
		<lastmod>2019-07-22T04:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/up-your-data-security-game-today/</loc>
		<lastmod>2019-07-22T04:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/six-system-and-software-vulnerabilities-to-watch-out-for-in-2019/</loc>
		<lastmod>2019-07-22T05:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-tech-early-adopters-find-smart-zero-trust-access-improves-security-without-stifling-innovation/</loc>
		<lastmod>2019-07-22T08:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/website-file-changes-monitor-1-2-new-scan-now-button-improvements/</loc>
		<lastmod>2019-07-22T09:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/infographic-what-is-the-hidden-cost-of-security/</loc>
		<lastmod>2019-07-22T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gartner-soar-market-guide-highlights-insights-from-swimlane-ceo-cody-cornell/</loc>
		<lastmod>2019-07-22T10:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gartner-soar-market-guide-insights-from-ceo-cody-cornell/</loc>
		<lastmod>2019-07-22T10:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hackers-expose-russian-fsb-cyberattack-projects/</loc>
		<lastmod>2019-07-22T11:17:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-does-a-vulnerability-verification-specialist-do/</loc>
		<lastmod>2019-07-22T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/three-adware-apps-used-clever-tactics-to-hide-on-android-devices/</loc>
		<lastmod>2019-07-22T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/icloud-account-hacker-jailed-for-three-years-after-preying-on-rappers-and-sports-celebrities/</loc>
		<lastmod>2019-07-22T14:01:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/can-private-attorneys-help-prevent-cybercrime/</loc>
		<lastmod>2019-07-22T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/remote-access-solutions-which-is-the-most-secure-3/</loc>
		<lastmod>2019-07-22T15:54:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/mitre-attck-vulnerability-spotlight-dll-search-order-hijacking/</loc>
		<lastmod>2019-07-22T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-7-common-vulnerabilities/</loc>
		<lastmod>2019-07-22T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-amy-r-bejtlichs-analytic-tradecraft-in-the-real-world/</loc>
		<lastmod>2019-07-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/idaptive-named-one-of-crns-emerging-vendors-in-security-for-2019/</loc>
		<lastmod>2019-07-22T16:22:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stocked-the-creative-process-of-street-skating-and-what-open-source-folks-can-learn-from-it/</loc>
		<lastmod>2019-07-22T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/kazakhstan-government-intercepts-nationwide-https-traffic-to-re-encrypt-with-a-govt-issued-root-certificate-cyber-security-or-cyber-surveillance/</loc>
		<lastmod>2019-07-22T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/adware-packed-fake-apps-still-making-their-way-to-google-play/</loc>
		<lastmod>2019-07-22T16:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/detect-prevent-newly-observed-malicious-automation-attacks/</loc>
		<lastmod>2019-07-22T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/csaba-fitzls-getting-root-with-benign-appstore-apps/</loc>
		<lastmod>2019-07-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/black-hat-usa-2019-come-visit-us-challenge-your-security-assumptions-by-tracey-moon/</loc>
		<lastmod>2019-07-22T17:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/webinars-devsecops-javascript-security-and-automotive-security/</loc>
		<lastmod>2019-07-22T17:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-customer-ideas-portal-add-your-voice-to-our-roadmap/</loc>
		<lastmod>2019-07-22T17:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-juan-andres-guerrero-saades-unsolved-mysteries-revisiting-the-apt-cold-case-files/</loc>
		<lastmod>2019-07-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/unicorn-power-2/</loc>
		<lastmod>2019-07-22T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-curse-of-erich-2/</loc>
		<lastmod>2019-07-22T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/faqs-joining-knowbe4-2/</loc>
		<lastmod>2019-07-22T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/an-alien-no-more-2/</loc>
		<lastmod>2019-07-22T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cyber-threats-and-financial-services/</loc>
		<lastmod>2019-07-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-deep-dive-into-icedid-malware-part-iii-analysis-of-child-processes/</loc>
		<lastmod>2019-07-22T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-they-came-in-peace/</loc>
		<lastmod>2019-07-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-you-should-know-about-the-equifax-data-breach-settlement/</loc>
		<lastmod>2019-07-22T19:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/reset-email-account-passwords-after-website-infection-follow-up/</loc>
		<lastmod>2019-07-22T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-account-takeover-botnets-outsmart-traditional-security-controls/</loc>
		<lastmod>2019-07-22T20:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/manual-vulnerability-detection/</loc>
		<lastmod>2019-07-22T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pypi-cheese-shop-malware-illustrates-software-supply-chain-risk-vector/</loc>
		<lastmod>2019-07-22T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-blocky/</loc>
		<lastmod>2019-07-22T23:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/you-got-the-ciso-job-now-what-3-tips-to-start-on-solid-ground/</loc>
		<lastmod>2019-07-23T01:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-4-questions-industrial-cisos-need-to-ask-when-evaluating-a-cybersecurity-tool/</loc>
		<lastmod>2019-07-23T03:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/another-look-at-global-insider-cybersecurity-threats/</loc>
		<lastmod>2019-07-23T04:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cloud-security-and-managing-third-party-risks/</loc>
		<lastmod>2019-07-23T05:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ftc-approves-record-5b-fine-for-facebook/</loc>
		<lastmod>2019-07-23T05:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/counter-todays-cyber-threats-with-actionable-threat-intelligence/</loc>
		<lastmod>2019-07-23T06:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/second-annual-long-island-ciso-roundtable/</loc>
		<lastmod>2019-07-23T07:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/protecting-americas-critical-infrastructure/</loc>
		<lastmod>2019-07-23T07:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-organizations-need-to-take-phishing-threats-against-their-employees-seriously/</loc>
		<lastmod>2019-07-23T08:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/whats-new-in-nozomi-networks-v19-0-ics-security-solution/</loc>
		<lastmod>2019-07-23T08:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-shift-in-mindset-7-practical-ideas-every-ciso-should-know-about-threat-hunting/</loc>
		<lastmod>2019-07-23T11:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/science-fiction-writers-helping-imagine-future-threats/</loc>
		<lastmod>2019-07-23T11:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/applying-machine-learning-to-network-centric-security/</loc>
		<lastmod>2019-07-23T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/driving-investment-in-digital-risk-management/</loc>
		<lastmod>2019-07-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-new-why-of-cybersecurity/</loc>
		<lastmod>2019-07-23T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/epp-3-perspectives-on-endpoint-security-strategies/</loc>
		<lastmod>2019-07-23T12:10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cyber-incidents-in-education-escalate-into-frustration/</loc>
		<lastmod>2019-07-23T12:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/detecting-and-mitigating-https-floodswithout-decryption-keys/</loc>
		<lastmod>2019-07-23T12:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fincen-bec-far-worse-than-previously-believed/</loc>
		<lastmod>2019-07-23T12:38:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bricata-included-as-a-representative-vendor-in-a-new-market-guide-for-intrusion-detection-and-prevention-systems-by-gartner-inc/</loc>
		<lastmod>2019-07-23T13:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/just-enough-windows-server/</loc>
		<lastmod>2019-07-23T13:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/good-news-bad-news-a-look-at-the-cyber-incident-and-breach-trends-report/</loc>
		<lastmod>2019-07-23T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/data-collecting-firms-have-only-one-shot-at-seeding-trust-in-their-userbase-new-research-shows/</loc>
		<lastmod>2019-07-23T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/safe-t-a-progressive-approach-to-zero-trust-access/</loc>
		<lastmod>2019-07-23T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/are-digital-supply-chains-exposing-your-business-data-avast/</loc>
		<lastmod>2019-07-23T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-joe-slowiks-meet-me-in-the-middle-threat-indications-and-warning-in-principle-practices-bec-revisited-dropping-by-on-our-favorite-prince/</loc>
		<lastmod>2019-07-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/are-you-spending-in-the-right-places-to-break-the-cyber-kill-chain/</loc>
		<lastmod>2019-07-23T16:19:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-3-second-ddos-mitigation-sla-is-3x-faster-and-the-industrys-best/</loc>
		<lastmod>2019-07-23T16:24:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-teach-developers-secure-coding-without-slowing-them-down/</loc>
		<lastmod>2019-07-23T16:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/rsa-conference-2019-apj-a-success-with-thought-provoking-and-useful-topics/</loc>
		<lastmod>2019-07-23T16:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/corporate-mobile-security-isnt-cutting-it/</loc>
		<lastmod>2019-07-23T16:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-the-state-of-kansas-keeps-employees-citizens-cybersecure/</loc>
		<lastmod>2019-07-23T16:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/supply-chain-threats-in-2019-and-beyond/</loc>
		<lastmod>2019-07-23T16:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/verizon-dbir-2019-analysis/</loc>
		<lastmod>2019-07-23T16:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-6-analyzing-vulnerability-scan-results/</loc>
		<lastmod>2019-07-23T16:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/satya-nadellas-microsoft-agrees-to-pay-criminal-fine-to-settle-federal-anti-bribery-charges/</loc>
		<lastmod>2019-07-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/international-cybercriminals-exploited-citrix-internal-systems-for-six-months-using-password-spraying-technique/</loc>
		<lastmod>2019-07-23T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-charity-wrights-happy-hunting-lessons-in-cti-psychology-from-tvs-favorite-serial-killer/</loc>
		<lastmod>2019-07-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/daniel-storis-marketing-strategy/</loc>
		<lastmod>2019-07-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/june-2019-appsec-intelligence-report-attack-addition/</loc>
		<lastmod>2019-07-23T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cloud-application-security-architecture-for-saas-security/</loc>
		<lastmod>2019-07-23T19:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/georgia-weidman-discusses-penetration-testing-and-running-a-successful-cybersecurity-business/</loc>
		<lastmod>2019-07-23T19:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/globalsign-launches-new-iot-developer-program-to-facilitate-iot-security-integrations/</loc>
		<lastmod>2019-07-23T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-pki-helps-ease-some-of-todays-biggest-security-challenges/</loc>
		<lastmod>2019-07-23T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-weekly-interview-securing-identity-with-conditional-access/</loc>
		<lastmod>2019-07-23T20:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/one-common-theme-one-common-goal/</loc>
		<lastmod>2019-07-23T20:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/lancaster-university-says-phishing-attack-behind-data-breach/</loc>
		<lastmod>2019-07-23T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-is-it-important-for-your-hosting-partner-to-be-certified-against-iso-27001-2/</loc>
		<lastmod>2019-07-23T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/faceapp-warns-us-once-again-always-read-the-tos/</loc>
		<lastmod>2019-07-23T22:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/using-process-oriented-design-pod-to-increase-the-dependability-of-devops-processes/</loc>
		<lastmod>2019-07-24T05:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/repost-getting-to-know-philip-schreiber-of-ncipher-security/</loc>
		<lastmod>2019-07-24T06:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/governors-association-says-states-need-cyber-disruption-response/</loc>
		<lastmod>2019-07-24T08:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/looking-for-love-in-all-the-wrong-places-aka-the-cyber-security-talent-shortage/</loc>
		<lastmod>2019-07-24T08:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/protecting-telephone-based-payment-card-data-what-you-need-to-know/</loc>
		<lastmod>2019-07-24T09:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/three-romanians-receive-jail-time-for-perpetrating-phishing-scheme/</loc>
		<lastmod>2019-07-24T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bitglass-security-spotlight-trickbot-malware-continues-to-breach-millions-of-emails/</loc>
		<lastmod>2019-07-24T13:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/amazon-inspector-a-cloud-based-vulnerability-assessment-tool/</loc>
		<lastmod>2019-07-24T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-1-introduction-to-threat-management/</loc>
		<lastmod>2019-07-24T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-4-environmental-reconnaissance-techniques-and-analysis/</loc>
		<lastmod>2019-07-24T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/priming-the-payments-ecosystem-for-explosive-growth-2/</loc>
		<lastmod>2019-07-24T14:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/20-phishing-statistics-to-keep-you-from-getting-hooked-in-2019/</loc>
		<lastmod>2019-07-24T14:28:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-cisos-must-do-when-cyberattacks-spread-like-wildfire/</loc>
		<lastmod>2019-07-24T14:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-you-need-to-know-about-exploit-kits/</loc>
		<lastmod>2019-07-24T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-regulatory-compliance-how-does-it-affect-wordpress-security/</loc>
		<lastmod>2019-07-24T15:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-identity-aware-proxies-are-key-to-adaptive-access-controls/</loc>
		<lastmod>2019-07-24T16:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-michael-raggis-schroedingers-backslash-tracking-the-chinese-apt-goblin-panda-with-rtf-metadata/</loc>
		<lastmod>2019-07-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/imperva-blocks-our-largest-ddos-l7-brute-force-attack-ever-peaking-at-292000-rps/</loc>
		<lastmod>2019-07-24T16:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-the-low-orbit-ion-cannon-loic/</loc>
		<lastmod>2019-07-24T16:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-cti-summit-2019-marika-chauvins-toni-gidwanis-how-to-get-promoted-developing-metrics-to-show-how-threat-intel-works/</loc>
		<lastmod>2019-07-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/lawmakers-smartphones-and-the-battle-of-information/</loc>
		<lastmod>2019-07-24T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-ics-security-summit-2019-jason-christophers-creating-a-security-metrics-program-how-to-measure-success/</loc>
		<lastmod>2019-07-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/key-findings-from-fortinets-2019-state-of-devops-security-report/</loc>
		<lastmod>2019-07-24T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-continuous-long-term-security-awareness-training-will-build-tomorrows-cybersecurity-champions/</loc>
		<lastmod>2019-07-24T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-the-danger-of-faceapp/</loc>
		<lastmod>2019-07-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/developers-should-be-in-charge-of-application-security-whitesource-security-report/</loc>
		<lastmod>2019-07-24T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-best-security-tests-keep-it-real/</loc>
		<lastmod>2019-07-24T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/5-ways-cities-can-prevent-ransomware/</loc>
		<lastmod>2019-07-24T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-software-composition-analysis-sca-demands-precision/</loc>
		<lastmod>2019-07-24T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/neo-nazi-swatters-target-dozens-of-journalists/</loc>
		<lastmod>2019-07-24T20:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ssp-and-poam-guidance-for-dfars-compliance-according-to-nist/</loc>
		<lastmod>2019-07-24T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/causality-research-in-ai-how-does-my-car-make-decisions/</loc>
		<lastmod>2019-07-24T22:19:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-perform-a-website-security-audit-with-checklist/</loc>
		<lastmod>2019-07-24T23:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ask-the-experts-what-will-have-the-greatest-impact-on-ics-security-in-the-next-5-10-years/</loc>
		<lastmod>2019-07-25T04:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/5-best-cryptocurrencies-to-invest-in-2020/</loc>
		<lastmod>2019-07-25T07:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/multi-cloud-use-by-healthcare-providers-puts-patient-data-at-risk/</loc>
		<lastmod>2019-07-25T07:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/getting-started-in-digital-forensics/</loc>
		<lastmod>2019-07-25T07:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-protects-users-from-malware-targeting-banks/</loc>
		<lastmod>2019-07-25T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/would-you-take-company-information-if-you-were-leaving-your-job/</loc>
		<lastmod>2019-07-25T09:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cloud-application-security-checklist/</loc>
		<lastmod>2019-07-25T11:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nozomi-networks-helps-build-isa-global-cybersecurity-alliance/</loc>
		<lastmod>2019-07-25T11:45:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-csps-should-care-about-phishing/</loc>
		<lastmod>2019-07-25T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-secret-cost-of-a-frictionless-life/</loc>
		<lastmod>2019-07-25T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/black-hat-2019-best-sessions-for-secops/</loc>
		<lastmod>2019-07-25T12:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/shielding-data-privacy/</loc>
		<lastmod>2019-07-25T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/free-software-but-no-free-lunch/</loc>
		<lastmod>2019-07-25T13:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/amazon-prime-day-is-now-a-major-holiday-driving-up-traffic-by-more-than-14-in-the-u-s/</loc>
		<lastmod>2019-07-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/four-key-questions-to-ask-following-a-cyber-attack/</loc>
		<lastmod>2019-07-25T13:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/johannesburg-electricity-provider-falls-victim-to-ransomware-attack/</loc>
		<lastmod>2019-07-25T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zwillgens-ftc-team-on-the-meaning-of-the-ftc-facebook-settlement/</loc>
		<lastmod>2019-07-25T14:30:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/characteristics-of-a-world-class-appsec-program/</loc>
		<lastmod>2019-07-25T14:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/supply-chain-meets-blockchain-a-perfect-match/</loc>
		<lastmod>2019-07-25T15:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/romanian-cybercriminals-sentenced-for-phishing-campaign/</loc>
		<lastmod>2019-07-25T15:19:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-gift-of-access/</loc>
		<lastmod>2019-07-25T15:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-secure-browser-update-boosts-performance-avast/</loc>
		<lastmod>2019-07-25T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-blue-team-summit-2019-eric-conrads-threat-hunting-via-sysmon/</loc>
		<lastmod>2019-07-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/stegware-aka-steganography-malware-malware-of-the-month-july-2019/</loc>
		<lastmod>2019-07-25T16:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/understanding-ddos-mitigation-with-next-gen-testing-platforms/</loc>
		<lastmod>2019-07-25T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-access/</loc>
		<lastmod>2019-07-25T16:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-salary-and-job-data/</loc>
		<lastmod>2019-07-25T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-domain-5-vulnerability-management-process/</loc>
		<lastmod>2019-07-25T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/breaking-encryption-will-be-the-new-prohibition/</loc>
		<lastmod>2019-07-25T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/spearphone/</loc>
		<lastmod>2019-07-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-unsexy-threat-to-election-security/</loc>
		<lastmod>2019-07-25T17:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ensuring-compliance-with-eu-payment-services-directive-psd2/</loc>
		<lastmod>2019-07-25T17:19:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-blue-team-summit-2019-randy-marchanys-zero-trust-networks-the-future-is-here/</loc>
		<lastmod>2019-07-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/acunetix-team-summer-get-together/</loc>
		<lastmod>2019-07-25T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/chrome-removes-xss-protection/</loc>
		<lastmod>2019-07-25T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sql-injection-compromises-entire-country/</loc>
		<lastmod>2019-07-25T18:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-spreadsheets/</loc>
		<lastmod>2019-07-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/vlc-media-player-affected-by-a-major-vulnerability-in-a-3rd-library-libebml-updating-to-the-latest-version-may-help/</loc>
		<lastmod>2019-07-25T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/software-security-trends-from-experts-at-infosec-europe-2019/</loc>
		<lastmod>2019-07-25T20:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/victim-shaming-in-cybersecurity/</loc>
		<lastmod>2019-07-25T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/my-take-how-state-backed-cyber-ops-have-placed-the-world-in-a-constant-state-cyber-pearl-harbor/</loc>
		<lastmod>2019-07-25T22:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fake-google-domains-used-in-evasive-magento-skimmer/</loc>
		<lastmod>2019-07-25T22:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/lost-business-remains-top-contributor-to-data-breach-costs-for-a-fifth-straight-year/</loc>
		<lastmod>2019-07-25T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-do-i-manage-my-vendors-efficiently/</loc>
		<lastmod>2019-07-26T01:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-do-nations-hack-each-other/</loc>
		<lastmod>2019-07-26T02:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-will-brexit-affect-cybersecurity-for-uk-organizations/</loc>
		<lastmod>2019-07-26T06:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/where-in-the-world-is-peter-carlisle-episode-8-ho-chi-minh-city-aka-saigon/</loc>
		<lastmod>2019-07-26T06:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-10-uses-of-wireshark-for-hackers-part-i/</loc>
		<lastmod>2019-07-26T11:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/greece-spain-to-be-fined-for-not-transposing-eu-data-protection-law/</loc>
		<lastmod>2019-07-26T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/1h2019-identity-management-funding-analysis/</loc>
		<lastmod>2019-07-26T13:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/breach-costs-keep-creeping-upward-with-financial-fallout-lasting-years/</loc>
		<lastmod>2019-07-26T13:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/zegost-from-within-new-campaign-targeting-internal-interests/</loc>
		<lastmod>2019-07-26T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-top-five-web-application-authentication-vulnerabilities-we-find/</loc>
		<lastmod>2019-07-26T15:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-blue-team-summit-2019-david-mashburns-osint-not-just-offensive/</loc>
		<lastmod>2019-07-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-to-do-when-you-get-a-suspicious-email-avast/</loc>
		<lastmod>2019-07-26T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/behold-the-cybersecurity-and-infrastructure-security-agencys-5g-wireless-networks-market-penetration-and-risk-factors-infographic/</loc>
		<lastmod>2019-07-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-cybersecurity-primer-for-mid-sized-businesses/</loc>
		<lastmod>2019-07-26T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-become-an-oss-champion/</loc>
		<lastmod>2019-07-26T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sans-blue-team-summit-2019-jamie-williams-to-blue-with-attck-flavored-love/</loc>
		<lastmod>2019-07-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-york-becomes-fifth-state-to-define-a-breach-to-include-access-to-information/</loc>
		<lastmod>2019-07-26T18:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/state-of-louisiana-declares-state-of-emergency-following-malware-attacks/</loc>
		<lastmod>2019-07-26T18:37:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/beyond-regulation-open-banking-accelerators/</loc>
		<lastmod>2019-07-26T18:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-easier-to-accept/</loc>
		<lastmod>2019-07-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-devsecops-journey-achieving-security-at-speed-and-scale/</loc>
		<lastmod>2019-07-26T20:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/malware-spread-through-linkedin-attachments-avast/</loc>
		<lastmod>2019-07-26T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/city-power-johannesburg-hit-by-a-ransomware-attack-that-encrypted-all-its-databases-applications-and-network/</loc>
		<lastmod>2019-07-26T22:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/winnti-malware-chinese-hacker-group-attacks-major-german-corporations-for-years-german-public-media-investigation-reveals/</loc>
		<lastmod>2019-07-26T22:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/employee-training-and-awareness-a-key-component-of-your-cyber-security-program/</loc>
		<lastmod>2019-07-27T01:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ftc-fines-equifax-up-to-700m-for-2017-data-breach/</loc>
		<lastmod>2019-07-27T02:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ncsc-active-cyber-defence-report-2019-evidence-based-vulnerability-management/</loc>
		<lastmod>2019-07-27T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/two-new-testing-themed-addins-one-new-and-one-updated-cran-package/</loc>
		<lastmod>2019-07-27T12:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-global-appsec-tel-aviv-2019-owasp-leaders-meeting/</loc>
		<lastmod>2019-07-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-nws-warnings/</loc>
		<lastmod>2019-07-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-global-appsec-tel-aviv-2019-innovation-fair/</loc>
		<lastmod>2019-07-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/along-with-5b-fine-ftc-hands-down-privacy-controls-for-facebook/</loc>
		<lastmod>2019-07-28T01:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/understanding-security-features-in-the-google-cloud-platform-gcp/</loc>
		<lastmod>2019-07-28T02:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-taras-ivaschenkos-security-culture-here-be-hackers/</loc>
		<lastmod>2019-07-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/daniel-storis-how-to-cut-onions-without-tears-using-oracle/</loc>
		<lastmod>2019-07-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-pedro-fortunas-rhyming-with-hacks-the-ballad-of-supply-chain-attacks/</loc>
		<lastmod>2019-07-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-we-fight-for-crypto/</loc>
		<lastmod>2019-07-28T19:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/strengthening-your-defenses-against-api-abuse/</loc>
		<lastmod>2019-07-28T22:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/governors-announce-new-infrastructure-initiative/</loc>
		<lastmod>2019-07-28T23:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/equifax-settlement-android-video-file-exploit-encryption-backdoors/</loc>
		<lastmod>2019-07-29T04:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/surprise-healthcare-organizations-confident-in-their-cybersecurity-efforts/</loc>
		<lastmod>2019-07-29T08:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-regular-expressions-and-a-waf-choked-cloudflare/</loc>
		<lastmod>2019-07-29T09:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/dridexs-bag-of-tricks-an-analysis-of-its-masquerading-and-code-injection-techniques/</loc>
		<lastmod>2019-07-29T11:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/survey-results-the-state-of-data-security-in-apac-are-businesses-ready-for-their-digital-transformation/</loc>
		<lastmod>2019-07-29T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/video-def-con-goons-badges-and-talks-inside-the-largest-hacker-con-in-the-world/</loc>
		<lastmod>2019-07-29T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hack-the-box-htb-machines-walkthrough-series-netmon/</loc>
		<lastmod>2019-07-29T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/mitre-attck-vulnerability-spotlight-timestomping/</loc>
		<lastmod>2019-07-29T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-earning-ceus/</loc>
		<lastmod>2019-07-29T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-dangers-of-role-based-access-control-rbac/</loc>
		<lastmod>2019-07-29T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sephora-reveals-breach-might-have-affected-southeast-asian-customers/</loc>
		<lastmod>2019-07-29T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/securing-g-suite-with-bitglass/</loc>
		<lastmod>2019-07-29T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-yair-amits-igal-kreichmans-insights-from-the-trenches-must-have-secure-coding-lessons-in-mobile/</loc>
		<lastmod>2019-07-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/easy-vpn-transition-with-zero-trust-access/</loc>
		<lastmod>2019-07-29T20:59:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ransomware-versus-cities-sowing-chaos-as-well-as-cost/</loc>
		<lastmod>2019-07-29T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/us-based-company-marketing-bluekeep-exploits-reportedly-used-to-facilitate-pentesting-infected-systems/</loc>
		<lastmod>2019-07-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/enabling-faster-ddos-mitigation-for-cloud-assets/</loc>
		<lastmod>2019-07-29T17:21:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-tom-van-goethems-who-left-open-the-cookie-jar/</loc>
		<lastmod>2019-07-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fortinet-to-attend-black-hat-2019-in-las-vegas/</loc>
		<lastmod>2019-07-29T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-100-coins-exercise-cybersecurity-priorities-advice-from-leading-cisos/</loc>
		<lastmod>2019-07-29T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/threatx-at-black-hat-2019-find-out-how-we-can-cut-through-the-noise-of-your-job-in-more-ways-than-one/</loc>
		<lastmod>2019-07-29T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/robert-m-lees-jeff-hass-little-bobby-comics-both-of-you/</loc>
		<lastmod>2019-07-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-ciso-speaks-tim-callahan-on-how-aflac-is-approaching-application-security-and-devsecops/</loc>
		<lastmod>2019-07-29T20:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/come-to-the-cybersec-ai-prague-conference-avast/</loc>
		<lastmod>2019-07-29T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/purescript-npm-installers-infected-dependencies-prevented-it-from-running-successfully/</loc>
		<lastmod>2019-07-29T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/divvycloud-listed-in-crns-2019-emerging-vendors-list-2/</loc>
		<lastmod>2019-07-29T21:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/no-jail-time-for-wannacry-hero/</loc>
		<lastmod>2019-07-29T22:07:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-stop-a-ddos-attack-prevent-future-attacks/</loc>
		<lastmod>2019-07-29T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-we-know-about-the-capital-one-data-breach/</loc>
		<lastmod>2019-07-30T01:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/first-gen-casb-goes-phishing-again/</loc>
		<lastmod>2019-07-30T01:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/medical-device-security-with-special-guest-john-nye/</loc>
		<lastmod>2019-07-30T04:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-capitalone-cyber-security-incident/</loc>
		<lastmod>2019-07-30T04:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/equifax-the-tip-of-the-proverbial-penalties-iceberg/</loc>
		<lastmod>2019-07-30T08:03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/attorney-general-william-barr-on-encryption-policy/</loc>
		<lastmod>2019-07-30T08:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gdpr-checklist-for-small-businesses/</loc>
		<lastmod>2019-07-30T09:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/framework-aims-to-enhance-the-security-of-software/</loc>
		<lastmod>2019-07-30T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-important-distinction-between-threat-hunting-and-true-threat-hunting/</loc>
		<lastmod>2019-07-30T11:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/making-it-easier-than-ever-to-integrate-with-microsoft-azure-iot-hub-and-azure-device-provisioning-service/</loc>
		<lastmod>2019-07-30T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/woman-arrested-after-capital-one-hack-spills-personal-info-on-106-million-credit-card-applicants/</loc>
		<lastmod>2019-07-30T11:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/most-security-pros-think-recent-gdpr-fines-wont-significantly-affect-policies/</loc>
		<lastmod>2019-07-30T11:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-creation-of-captain-tripwire-a-cyber-security-comic-book/</loc>
		<lastmod>2019-07-30T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/equifaxs-700m-mistake-underscores-the-urgency-of-compliance-security-and-transparency/</loc>
		<lastmod>2019-07-30T13:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/people-want-more-control-of-their-personal-data-and-the-organizations-that-help-americans-gain-that-control-stand-to-benefit/</loc>
		<lastmod>2019-07-30T13:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-saas-companies-can-build-a-compliance-roadmap/</loc>
		<lastmod>2019-07-30T13:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/top-5-ways-to-ensure-a-smooth-veracode-dynamic-analysis-scan/</loc>
		<lastmod>2019-07-30T13:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-i-joined-hysolate/</loc>
		<lastmod>2019-07-30T13:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/capital-one-data-theft-impacts-106m-people/</loc>
		<lastmod>2019-07-30T13:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/join-us-at-the-identity-and-access-morning-briefing-august-15-2019/</loc>
		<lastmod>2019-07-30T14:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/return-on-investment-roi-of-cybersecurity-training/</loc>
		<lastmod>2019-07-30T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-maintaining-certification/</loc>
		<lastmod>2019-07-30T14:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cybersecurity-analyst-interview-questions-and-answers/</loc>
		<lastmod>2019-07-30T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/faceapp-and-the-friction-between-entertainment-and-data-privacy/</loc>
		<lastmod>2019-07-30T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/young-hackers-taking-their-choice/</loc>
		<lastmod>2019-07-30T14:36:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/microservices-enablers-devops-and-identity/</loc>
		<lastmod>2019-07-30T14:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-ott-service-changing-how-new-zealanders-watch-sports/</loc>
		<lastmod>2019-07-30T14:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/why-cisos-hate-service-providers/</loc>
		<lastmod>2019-07-30T15:18:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ex-amazon-employee-hacks-capital-ones-firewall-to-access-its-amazon-s3-database-100m-us-and-60m-canadian-users-affected/</loc>
		<lastmod>2019-07-30T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-philippe-de-rycks-common-api-security-pitfalls/</loc>
		<lastmod>2019-07-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/2019-cyberark-americas-partner-excellence-awards-at-impact-chicago/</loc>
		<lastmod>2019-07-30T16:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-capital-one-data-breach-and-what-can-you-do-to-protect-yourself/</loc>
		<lastmod>2019-07-30T16:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/richard-a-clarke-interviewed/</loc>
		<lastmod>2019-07-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/solving-log-storage-how-you-can-save-money-and-meet-compliance-requirements/</loc>
		<lastmod>2019-07-30T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/blue-by-default/</loc>
		<lastmod>2019-07-30T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-lukas-weichselbaums-security-for-modern-webapps-new-web-platform-security-features-to-protect-your-application/</loc>
		<lastmod>2019-07-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/one-year-certificate-validity-is-about-to-be-on-the-ballot-again/</loc>
		<lastmod>2019-07-30T18:01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sevillage-at-derbycon-9-0/</loc>
		<lastmod>2019-07-30T18:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/xkcd-inbox/</loc>
		<lastmod>2019-07-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-organizations-need-to-start-thinking-like-developers/</loc>
		<lastmod>2019-07-30T19:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-are-vpns-and-remote-access-software-priced/</loc>
		<lastmod>2019-07-30T19:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/3-use-cases-where-source-code-scanning-doesnt-cut-it/</loc>
		<lastmod>2019-07-30T19:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/reverse-hardening-wordpress-config/</loc>
		<lastmod>2019-07-30T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-can-the-security-experience-and-process-be-made-simpler-for-end-users/</loc>
		<lastmod>2019-07-30T21:07:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/ai-is-on-our-side-avast/</loc>
		<lastmod>2019-07-30T21:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/capital-one-breach-highlights-importance-of-constant-vigilance/</loc>
		<lastmod>2019-07-30T21:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/capital-one-data-breach-impacts-100-million-customers-2/</loc>
		<lastmod>2019-07-30T21:49:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-new-network-security-equation-were-discovering-by-accident-itiiot/</loc>
		<lastmod>2019-07-30T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/pos-security-what-why-and-how-3/</loc>
		<lastmod>2019-07-30T23:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/perimeter-81-partners-with-sentinelone-to-deliver-fully-automated-zero-trust-network-security-and-endpoint-protection/</loc>
		<lastmod>2019-07-30T22:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/adoption-exposure-your-software-security-needs-integration-and-automation/</loc>
		<lastmod>2019-07-30T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/silver-bullet-thinking-wont-keep-data-safe-the-case-of-capital-one/</loc>
		<lastmod>2019-07-30T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/supply-chain-vulnerabilities-from-legacy-approaches/</loc>
		<lastmod>2019-07-31T01:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/research-is-skewing-up/</loc>
		<lastmod>2019-07-31T02:19:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/getting-to-nse-level-8-a-conversation-with-sylvia-schlaphof/</loc>
		<lastmod>2019-07-31T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/new-york-businesses-must-now-report-a-breach-even-if-private-data-was-merely-viewed/</loc>
		<lastmod>2019-07-31T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/four-emerging-digital-payments-standards-you-dont-want-to-catch-you-by-surprise/</loc>
		<lastmod>2019-07-31T09:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/real-time-observations-in-security-hygiene/</loc>
		<lastmod>2019-07-31T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/game-console-hacking-part-1-lab-setup/</loc>
		<lastmod>2019-07-31T14:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/capital-one-benefits-from-responsible-disclosure-program-following-massive-data-breach/</loc>
		<lastmod>2019-07-31T13:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/gadsden-independent-school-district-discloses-malware-attack/</loc>
		<lastmod>2019-07-31T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/key-considerations-for-secure-coding-training/</loc>
		<lastmod>2019-07-31T14:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/understanding-the-difference-between-it-and-cyber-security/</loc>
		<lastmod>2019-07-31T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/part-1-introduction-and-resources-of-the-data-breach/</loc>
		<lastmod>2019-07-31T14:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/part-2-standard-ways-to-de-identify-personal-data/</loc>
		<lastmod>2019-07-31T14:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/part-3-machine-learning-ways-to-de-identify-personal-data-homomorphic-encryption/</loc>
		<lastmod>2019-07-31T14:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/part-4-standard-ways-to-process-datasets-with-qi-values/</loc>
		<lastmod>2019-07-31T14:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/part-5-machine-learning-methods-to-process-datasets-with-qi-values/</loc>
		<lastmod>2019-07-31T14:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/replacing-legacy-systems-with-identity-enabled-microservices/</loc>
		<lastmod>2019-07-31T14:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/google-project-zero-reveals-six-interactionless-bugs-that-can-affect-ios-via-apples-imessage/</loc>
		<lastmod>2019-07-31T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/security-considerations-for-cloud-hosted-services/</loc>
		<lastmod>2019-07-31T14:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/what-is-secure-remote-access-software/</loc>
		<lastmod>2019-07-31T15:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/glass-class-the-searchable-log-of-all-conversation-and-knowledge/</loc>
		<lastmod>2019-07-31T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-adi-belnikovs-iris-levaris-testing-security-in-the-right-way/</loc>
		<lastmod>2019-07-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/historical-hidden-cellular-network-insecurity-the-litany-thereof/</loc>
		<lastmod>2019-07-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/a-new-approach-to-application-security-testing/</loc>
		<lastmod>2019-07-31T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/threat-hunting-with-osquery/</loc>
		<lastmod>2019-07-31T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/cysa-renewal-requirements/</loc>
		<lastmod>2019-07-31T17:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/avast-business-helps-edison-power-constructors-increase-efficiency-avast/</loc>
		<lastmod>2019-07-31T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/owasp-appsec-tel-aviv-2019-aaron-guzmans-vehicle-security-trends-implications-for-automotive-suppliers/</loc>
		<lastmod>2019-07-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/instead-of-asking-a-ciso-what-keeps-you-up-at-night-ask-this-instead/</loc>
		<lastmod>2019-07-31T18:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/1-7-million-still-missing-after-north-carolina-county-hit-by-business-email-compromise-scam/</loc>
		<lastmod>2019-07-31T18:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-joy-of-tech-siri-is-listening-in/</loc>
		<lastmod>2019-07-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/meeting-nrc-regulations-and-the-nuclear-event/</loc>
		<lastmod>2019-07-31T19:58:32+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->