<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/07/apollo-11-software-lessons-still-relevant-today/</loc>
		<lastmod>2019-07-31T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hondas-misconfigured-database-exposes-40gb-of-internal-data-3/</loc>
		<lastmod>2019-07-31T21:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bens-book-of-the-month-review-of-firewalls-dont-stop-dragons-a-step-by-step-guide-to-computer-security-for-non-techies/</loc>
		<lastmod>2019-07-31T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/securing-the-expanding-network-edge/</loc>
		<lastmod>2019-07-31T22:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/dont-get-burned-with-holiday-fraud/</loc>
		<lastmod>2019-07-31T22:57:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/writing-better-risk-statements/</loc>
		<lastmod>2019-07-31T22:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/enzoic-a-2019-it-world-award-gold-winner/</loc>
		<lastmod>2019-08-01T00:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/evaluating-your-macs-security-by-ashley-zaya/</loc>
		<lastmod>2019-08-01T00:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/every-security-team-is-a-software-team-now-why-you-should-attend-the-black-hat-keynote/</loc>
		<lastmod>2019-08-01T06:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-johannesburg-ransomware-attack-crippling-a-city-to-darkness/</loc>
		<lastmod>2019-08-01T07:51:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fraudsters-are-trying-to-steal-8-7-million-every-single-day-through-business-email-compromise/</loc>
		<lastmod>2019-08-01T08:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/roundtable-huge-capital-one-breach-shows-too-little-is-being-done-to-preserve-data-privacy/</loc>
		<lastmod>2019-08-01T08:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-6-top-tips-of-things-to-do-at-black-hat-usa-2019/</loc>
		<lastmod>2019-08-01T10:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/casbs-is-it-time-to-remove-the-broker-from-cloud-access-security-broker/</loc>
		<lastmod>2019-08-01T11:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/repost-recognising-the-need-for-greater-regulation-for-the-iot/</loc>
		<lastmod>2019-08-01T11:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cisa-warns-of-insecure-can-bus-networks-affecting-aircraft/</loc>
		<lastmod>2019-08-01T12:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/staff-and-it-leadership-at-odds-over-data-security/</loc>
		<lastmod>2019-08-01T13:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/join-threat-stack-19000-infosec-professionals-at-black-hat-usa-2019/</loc>
		<lastmod>2019-08-01T13:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/data-erasure-the-right-to-be-forgotten/</loc>
		<lastmod>2019-08-01T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/pci-pal-shortlisted-for-payment-solution-in-the-credit-collections-technology-awards/</loc>
		<lastmod>2019-08-01T14:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/4-critical-elements-your-next-security-solution-must-have/</loc>
		<lastmod>2019-08-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/minu-1-capture-the-flag-ctf-walkthrough/</loc>
		<lastmod>2019-08-01T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-history-and-relevance/</loc>
		<lastmod>2019-08-01T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mitre-attck-vulnerability-spotlight-obfuscated-files-or-information/</loc>
		<lastmod>2019-08-01T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/report-financial-services-can-do-cyber-security-better-with-the-right-tools/</loc>
		<lastmod>2019-08-01T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/exposed-internal-database-reveals-vulnerable-unpatched-systems-at-honda/</loc>
		<lastmod>2019-08-01T15:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/learn-how-to-become-ceh-certified/</loc>
		<lastmod>2019-08-01T15:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/detect-unknown-cyber-threats-with-network-traffic-analysis/</loc>
		<lastmod>2019-08-01T15:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-get-started-in-a-cyber-security-career/</loc>
		<lastmod>2019-08-01T15:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-against-narrowband-iot-security-risks/</loc>
		<lastmod>2019-08-01T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-geoffrey-hills-bringing-rapid-prototyping-to-the-threat-model-process/</loc>
		<lastmod>2019-08-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/stronger-together-imperva-api-security-is-integrated-with-red-hat-3scale-api-management/</loc>
		<lastmod>2019-08-01T16:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whats-the-vulnerability-magecart-takes-advantage-of/</loc>
		<lastmod>2019-08-01T16:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cyberark-privileged-cloud-reduces-risk-with-pam-saas/</loc>
		<lastmod>2019-08-01T16:12:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/accelerating-the-cloud-on-ramp-with-security-driven-networking/</loc>
		<lastmod>2019-08-01T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/equifax-settlement-dont-get-phished-by-scammers/</loc>
		<lastmod>2019-08-01T17:26:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-itsik-mantins-ori-or-meirs-how-nlp-can-help-us-understand-web-attackers/</loc>
		<lastmod>2019-08-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/now-accepting-applications-for-2020-fellowship-program/</loc>
		<lastmod>2019-08-01T18:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/join-bitdefender-at-black-hat-2019-for-a-legendary-experience/</loc>
		<lastmod>2019-08-01T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/from-e-commerce-to-enterprise-employee-how-i-overcame-my-fears-and-doubts/</loc>
		<lastmod>2019-08-01T18:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-when-im-back-at-a-keyboard/</loc>
		<lastmod>2019-08-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/neapolitan-backdoor-injection/</loc>
		<lastmod>2019-08-01T19:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/nist-proposes-standards-to-secure-government-sdlc/</loc>
		<lastmod>2019-08-01T20:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/equifax-breach-victims-may-not-even-get-the-promised-125-ftc-urges-them-to-opt-for-10-year-free-credit-monitoring-services/</loc>
		<lastmod>2019-08-01T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/join-signal-sciences-at-black-hat-2019/</loc>
		<lastmod>2019-08-01T21:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-5-network-security-risks-and-threats/</loc>
		<lastmod>2019-08-01T21:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-2019-braving-the-heat-and-chaos-in-search-of-peace-of-mind/</loc>
		<lastmod>2019-08-02T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/decrypting-l0rdix-rats-c2/</loc>
		<lastmod>2019-08-02T02:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/livezilla-live-chat-technical-advisory/</loc>
		<lastmod>2019-08-02T03:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/encrypt-your-cloud-data/</loc>
		<lastmod>2019-08-02T04:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/waterisac-15-security-fundamentals-you-need-to-know/</loc>
		<lastmod>2019-08-02T05:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/crytic-continuous-assurance-for-smart-contracts/</loc>
		<lastmod>2019-08-02T10:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-privacy-laws-hurt-defendants/</loc>
		<lastmod>2019-08-02T11:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/4-business-benefits-of-professional-email-services-for-smbs/</loc>
		<lastmod>2019-08-02T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-spear-phishing-makes-bec-attacks-so-effective/</loc>
		<lastmod>2019-08-02T12:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/6-takeaways-from-the-capital-one-data-breach/</loc>
		<lastmod>2019-08-02T13:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/grasshoppers-dead-cow-and-controlled-chaos-what-were-looking-forward-to-at-black-hat-usa/</loc>
		<lastmod>2019-08-02T14:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/installing-john-the-ripper-on-microsofts-windows-subsystem-for-linux-wsl/</loc>
		<lastmod>2019-08-02T14:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-need-for-domain-experts-and-non-trivial-conclusions/</loc>
		<lastmod>2019-08-02T15:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-privilege-escalation-and-why-is-it-important/</loc>
		<lastmod>2019-08-02T15:31:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-inon-shkedys-testing-and-hacking-apis/</loc>
		<lastmod>2019-08-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/csa-releases-new-research-top-threats-to-cloud-computing-egregious-eleven/</loc>
		<lastmod>2019-08-06T10:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/facebook-plans-on-backdooring-whatsapp/</loc>
		<lastmod>2019-08-02T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/united-states-army-cyber-command-announces-release-of-dod-identity-awareness-and-protection-management-guide/</loc>
		<lastmod>2019-08-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-malware-the-landscape-of-new-evolving-cyber-threats-in-2019/</loc>
		<lastmod>2019-08-02T17:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/8-ways-to-encourage-cyber-security-awareness/</loc>
		<lastmod>2019-08-02T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-krzysztof-kotowicz-mike-samuels-trusted-types-end-to-end-injection-safety-at-scale/</loc>
		<lastmod>2019-08-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-carrot-and-the-stick-trends-and-considerations-in-the-equifax-ftc-settlement/</loc>
		<lastmod>2019-08-02T18:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/csa-releases-the-six-pillars-of-devsecops-report-paper-identifies-areas-critical-to-successful-devsecops-integration-within-an-organization/</loc>
		<lastmod>2019-08-07T10:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-icon-swap/</loc>
		<lastmod>2019-08-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-a-surf-loving-aussie-developed-sonatypes-most-popular-extension/</loc>
		<lastmod>2019-08-02T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/governors-announce-initiative-to-address-aging-infrastructure/</loc>
		<lastmod>2019-08-02T19:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/javascript-template-attacks-how-browsers-give-away-the-store/</loc>
		<lastmod>2019-08-02T20:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-evolution-of-black-hat-and-cybersecurity-by-paul-lee/</loc>
		<lastmod>2019-08-02T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/filecoder-ransomware-targets-android-devices-avast/</loc>
		<lastmod>2019-08-02T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-we-can-learn-from-the-capital-one-hack/</loc>
		<lastmod>2019-08-02T21:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/65k-attempts-to-steal-credit-card-info-from-online-stores-blocked-in-july/</loc>
		<lastmod>2019-08-02T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-malicious-use-of-pastebin/</loc>
		<lastmod>2019-08-03T00:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-to-expect-at-black-hat-2019/</loc>
		<lastmod>2019-08-03T01:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/researchers-reveal-vulnerability-that-can-bypass-payment-limits-in-contactless-visa-card/</loc>
		<lastmod>2019-08-03T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-you-need-to-know-about-lookback-malware-how-to-detect-it/</loc>
		<lastmod>2019-08-03T14:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-tin-zaws-uninvited-guests-understanding-malicious-web-bots-with-owasp-handbook/</loc>
		<lastmod>2019-08-03T17:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-unpopular-opinions/</loc>
		<lastmod>2019-08-03T17:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-tomer-zaits-maxim-zavodchiks-webhooks-hookups-abusing-api-developers/</loc>
		<lastmod>2019-08-03T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-katy-antons-injecting-security-controls-in-software-applications/</loc>
		<lastmod>2019-08-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-local-governments-can-address-cybersecurity/</loc>
		<lastmod>2019-08-04T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-if-meeting-someone-for-the-first-time/</loc>
		<lastmod>2019-08-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-kevin-codys-dissecting-mobile-application-privacy-and-analytics/</loc>
		<lastmod>2019-08-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/securing-devices-for-defcon/</loc>
		<lastmod>2019-08-04T22:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/capital-one-data-breach-equifax-settlement-payouts-nextdoor-app-scams/</loc>
		<lastmod>2019-08-05T04:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/moving-to-the-cloud-and-how-you-shift-your-security-management-strategy/</loc>
		<lastmod>2019-08-05T07:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-2019-sans-security-awareness-report-awareness-training-is-rising/</loc>
		<lastmod>2019-08-05T07:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wanted-cybersecurity-imagery/</loc>
		<lastmod>2019-08-05T08:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-cyber-security-alliance-aims-to-fight-back/</loc>
		<lastmod>2019-08-05T08:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/leveraging-board-governance-for-cybersecurity/</loc>
		<lastmod>2019-08-05T08:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-practice-cyber-safety-on-social-media-as-an-industry-professional/</loc>
		<lastmod>2019-08-05T09:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-unthought-about-risks-of-encryption/</loc>
		<lastmod>2019-08-05T09:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-to-expect-at-black-hat-usa-2019/</loc>
		<lastmod>2019-08-05T10:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-risk-of-weak-online-banking-passwords/</loc>
		<lastmod>2019-08-05T14:04:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/regulating-international-trade-in-commercial-spyware/</loc>
		<lastmod>2019-08-05T14:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/murfreesboro-discloses-security-incident-involving-water-resources-portal/</loc>
		<lastmod>2019-08-05T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-brexit-impacts-the-future-of-europes-cybersecurity-posture-2/</loc>
		<lastmod>2019-08-05T14:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/beware-of-germanwiper-the-ransomware-that-is-not-ransomware/</loc>
		<lastmod>2019-08-05T14:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/logichub-extends-soar-beyond-incident-response-to-autonomous-threat-detection/</loc>
		<lastmod>2019-08-05T15:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-michal-braverman-blumenstyks-the-importance-of-the-cloud-and-the-developers-communities-in-fighting-cyber-crime/</loc>
		<lastmod>2019-08-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ask-the-experts-whats-the-best-way-to-prevent-ransomware-attacks/</loc>
		<lastmod>2019-08-05T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/michael-farnum-chats-about-ics-security/</loc>
		<lastmod>2019-08-05T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/alert-threat-of-online-skimming-to-payment-security/</loc>
		<lastmod>2019-08-05T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apple-suspends-human-surveillance-of-siri-queries/</loc>
		<lastmod>2019-08-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/changing-the-conversation-leverage-business-priorities-to-manage-cyber-risk/</loc>
		<lastmod>2019-08-05T17:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-toyota-unlocked-decades-ago-drives-software-supply-chain-management-today/</loc>
		<lastmod>2019-08-05T17:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-lewis-arderns-owasp-top-10-for-javascript-developers/</loc>
		<lastmod>2019-08-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-cisos-and-navy-seals-have-in-common/</loc>
		<lastmod>2019-08-05T18:25:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/three-keys-to-infusing-security-into-your-corporate-culture/</loc>
		<lastmod>2019-08-05T18:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-other-certifications-security-pentest-casp/</loc>
		<lastmod>2019-08-05T18:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/where-to-find-the-best-study-materials-to-pass-the-comptia-cysa-exam/</loc>
		<lastmod>2019-08-05T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ics-scada-security-overview/</loc>
		<lastmod>2019-08-05T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-dodd-8570-overview/</loc>
		<lastmod>2019-08-05T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersec-ai-is-bringing-top-experts-to-prague-avast/</loc>
		<lastmod>2019-08-05T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/robert-m-lees-jeff-hass-little-bobby-comics-callback-ip/</loc>
		<lastmod>2019-08-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/blockchain-a-distributed-ledger-technology-dlt/</loc>
		<lastmod>2019-08-05T19:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cloud-security-posture-management-why-you-need-it-now/</loc>
		<lastmod>2019-08-05T21:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-local-governments-can-address-cybersecurity-challenges/</loc>
		<lastmod>2019-08-05T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/malicious-plugin-used-to-encrypt-wordpress-posts/</loc>
		<lastmod>2019-08-05T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/coalfire-pci-compliance-contrast-security/</loc>
		<lastmod>2019-08-05T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/42crunch-adds-openapi-editing-tools-to-its-api-security-platform/</loc>
		<lastmod>2019-08-06T13:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-5-business-advantages-of-sd-wan/</loc>
		<lastmod>2019-08-05T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/10-top-features-to-look-for-in-an-sd-wan-solution/</loc>
		<lastmod>2019-08-05T23:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortinet-wins-over-customers-with-its-distinguished-secure-sd-wan-solution-2/</loc>
		<lastmod>2019-08-05T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-2019-on-your-mark-get-set-go/</loc>
		<lastmod>2019-08-06T01:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hi-mom-im-on-the-today-show-with-symantecs-varun-kohli/</loc>
		<lastmod>2019-08-06T01:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/investor-perspective-getting-beyond-protect-monitor-and-secure-story-category-and-success/</loc>
		<lastmod>2019-08-06T01:58:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/martina.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-jira-misconfiguration-exposed-employees-and-project-details-of-nasa-google-yahoo-and-many-others-alleges-grofers-lead-infra-security-engineer/</loc>
		<lastmod>2019-08-06T01:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/esas-e3-web-security-negligence-endangers-more-than-2000-game-media-journalists-investors-after-accidental-leak-exposes-pii-data/</loc>
		<lastmod>2019-08-06T01:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/scaling-up-transitioning-your-smb-go-to-market-to-the-enterprise/</loc>
		<lastmod>2019-08-07T01:52:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-race-is-on-crypto-agility-vs-quantum-computing-who-is-ahead/</loc>
		<lastmod>2019-08-06T05:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/simple-security-configuration-can-help-your-sensitive-data-from-being-stolen/</loc>
		<lastmod>2019-08-06T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/yolanda-be-cool/</loc>
		<lastmod>2019-08-06T07:04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/byod-the-cloud-and-casb-the-best-combination-since-pbj/</loc>
		<lastmod>2019-08-06T08:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/data-protection-more-than-just-data-security/</loc>
		<lastmod>2019-08-06T08:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/healthcare-captcha-the-cure-thats-worse-than-the-disease/</loc>
		<lastmod>2019-08-06T08:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-manage-the-headache-of-defending-industrial-it-infrastructures-industrial-iot-part-1/</loc>
		<lastmod>2019-08-06T10:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/better-encrypted-group-chat/</loc>
		<lastmod>2019-08-06T10:50:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/8-actionable-tips-a-ciso-can-use-to-communicate-to-the-board-or-c-suite/</loc>
		<lastmod>2019-08-06T11:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/do-you-know-how-third-parties-really-impact-your-business-objectives/</loc>
		<lastmod>2019-08-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/digital-transformation-a-new-line-item-for-todays-business-leaders/</loc>
		<lastmod>2019-08-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/network-security-keys-to-adopting-zero-trust-micro-segmentation/</loc>
		<lastmod>2019-08-07T07:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto19491930-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto19491930]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-establish-enterprise-requirements-for-devops/</loc>
		<lastmod>2019-08-06T13:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-10-practices-for-securing-cloud-workloads/</loc>
		<lastmod>2019-08-06T13:09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/transforming-into-code-signing/</loc>
		<lastmod>2019-08-06T14:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/banking-start-up-exposes-pins-for-500000-customers-on-the-verge-of-us-launch/</loc>
		<lastmod>2019-08-06T14:26:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mitre-attck-vulnerability-spotlight-valid-accounts-2/</loc>
		<lastmod>2019-08-06T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-benefits-for-employers/</loc>
		<lastmod>2019-08-06T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/introduction-to-scada-security/</loc>
		<lastmod>2019-08-06T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-salary-data/</loc>
		<lastmod>2019-08-06T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortinet-reports-increased-yoy-threat-activity-for-q2-2019/</loc>
		<lastmod>2019-08-06T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/computer-weekly-feature-developing-innovative-security-analytics-approaches-in-the-digital-age/</loc>
		<lastmod>2019-08-06T14:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/machine-learning-era-no-chance-for-error/</loc>
		<lastmod>2019-08-06T15:12:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/4-steps-to-prevent-a-third-party-data-breach/</loc>
		<lastmod>2019-08-06T15:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-ovidiu-cicals-automated-cyber-security-platform-at-scale/</loc>
		<lastmod>2019-08-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/staving-off-the-monetary-consequences-of-a-data-breach/</loc>
		<lastmod>2019-08-06T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bad-actors-using-dating-scams-to-recruit-money-mules-warns-fbi/</loc>
		<lastmod>2019-08-06T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ibm-from-bad-to-worse-ransomeware-destructive-malware-attacks-have-doubled/</loc>
		<lastmod>2019-08-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-solve-windows-10-taskbar-issues-across-domains/</loc>
		<lastmod>2019-08-06T17:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-capital-one-got-wrong-and-right-after-the-breach/</loc>
		<lastmod>2019-08-06T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-elena-kravchenkos-three-levels-of-complexity-threat-modeling-of-containerized-application/</loc>
		<lastmod>2019-08-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threat-alert-germanwiper-2/</loc>
		<lastmod>2019-08-06T19:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinars-cloud-security-and-open-source-licensing/</loc>
		<lastmod>2019-08-06T18:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/online-account-origination-fraud-when-new-users-are-bad-news/</loc>
		<lastmod>2019-08-06T18:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-from-facebook/</loc>
		<lastmod>2019-08-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mimecast-introduced-community-based-tailored-threat-intelligence-tool-at-black-hat-2019/</loc>
		<lastmod>2019-08-06T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iot-edge-controller-trusted-identity-at-the-device-level/</loc>
		<lastmod>2019-08-06T19:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/divvycloud-is-it-world-awards-2019-silver-winner-in-cloud-security-2/</loc>
		<lastmod>2019-08-06T20:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/vulnerable-vendors-make-you-vulnerable/</loc>
		<lastmod>2019-08-06T20:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/keeping-your-cybersecurity-skills-relevant-in-2019/</loc>
		<lastmod>2019-08-06T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/autoloaded-server-side-swiper/</loc>
		<lastmod>2019-08-06T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/healthcare-is-in-cybercriminals-crosshairs/</loc>
		<lastmod>2019-08-06T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/continuous-authorization-with-devsecops/</loc>
		<lastmod>2019-08-06T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-did-ransomware-become-a-lasting-threat-avast/</loc>
		<lastmod>2019-08-06T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-against-swapgs-attack-with-bitdefender-hypervisor-introspection/</loc>
		<lastmod>2019-08-07T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bypassing-kpti-using-the-speculative-behavior-of-the-swapgs-instruction/</loc>
		<lastmod>2019-08-07T01:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/thinking-like-a-smartphone-eavesdropper/</loc>
		<lastmod>2019-08-07T02:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/from-the-depths-of-counterfeit-smartphones/</loc>
		<lastmod>2019-08-07T10:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-a-magecart-attack-and-how-can-you-protect-your-business/</loc>
		<lastmod>2019-08-07T10:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/following-capital-one-data-breach-github-gets-sued-and-aws-security-questioned-by-a-u-s-senator/</loc>
		<lastmod>2019-08-07T10:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/15-hot-tools-to-come-out-of-black-hat-and-def-con/</loc>
		<lastmod>2019-08-07T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rsa-labs-project-iris-edge-monitoring-and-analytics-for-iot/</loc>
		<lastmod>2019-08-07T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-can-utilities-companies-meet-the-pci-compliance-challenge/</loc>
		<lastmod>2019-08-07T12:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/att-announces-launch-of-public-bug-bounty-program/</loc>
		<lastmod>2019-08-07T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ask-the-experts-how-it-and-ot-can-collaborate-in-the-name-of-ics-security/</loc>
		<lastmod>2019-08-07T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/prevention-is-the-way-to-go-when-it-comes-to-wordpress-security/</loc>
		<lastmod>2019-08-07T12:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/good-bots-vs-bad-bots-whats-the-impact-on-your-business/</loc>
		<lastmod>2019-08-07T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/forming-a-backup-strategy-4-steps-to-follow/</loc>
		<lastmod>2019-08-07T13:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/digital-defense-inc-debuts-frontline-network-map/</loc>
		<lastmod>2019-08-07T14:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/need-help-with-sales-put-your-ciso-in-front-of-customers/</loc>
		<lastmod>2019-08-07T14:20:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/meet-the-2019-morphisec-women-in-cybersecurity-scholarship-winners-2/</loc>
		<lastmod>2019-08-07T15:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/att-workers-bribed-to-install-malware-on-company-network-and-unlock-iphones/</loc>
		<lastmod>2019-08-07T14:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avast-protects-250k-users-from-clipsa-malware-avast/</loc>
		<lastmod>2019-08-07T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bitglass-security-spotlight-capital-one-suffers-data-breach-affecting-100-million-customers/</loc>
		<lastmod>2019-08-07T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-history-of-human-identity-in-pictures-part-1-2/</loc>
		<lastmod>2019-08-07T15:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/leveraging-ai-to-win-the-cybercrime-arms-race/</loc>
		<lastmod>2019-08-07T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-guy-barnhart-magens-crypto-failures-and-not-just-in-bitcoin/</loc>
		<lastmod>2019-08-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/wyden-wants-answers/</loc>
		<lastmod>2019-08-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-looming-threat-of-malicious-backdoors-in-software-source-code/</loc>
		<lastmod>2019-08-07T17:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/marrying-new-and-existing-technologies-with-the-zero-trust-approach/</loc>
		<lastmod>2019-08-07T17:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/network-isolation-with-virtual-endpoints/</loc>
		<lastmod>2019-08-07T17:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/are-gaming-companies-and-forums-taking-security-seriously/</loc>
		<lastmod>2019-08-07T17:20:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/leapfrog-leappad-ultimate-security-vulnerabilities/</loc>
		<lastmod>2019-08-07T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/detailing-veracodes-hmac-api-authentication/</loc>
		<lastmod>2019-08-07T17:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-ursnif-variant-spreading-by-word-document/</loc>
		<lastmod>2019-08-07T17:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-liran-tals-black-clouds-and-silver-linings-in-node-js-security/</loc>
		<lastmod>2019-08-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/is-your-iam-vendor-keeping-up-with-the-cloud/</loc>
		<lastmod>2019-08-07T18:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/guide-to-application-security-what-to-look-for-and-why/</loc>
		<lastmod>2019-08-07T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/luke-kingma-and-lou-patrick-mackays-futurism-giddy-up/</loc>
		<lastmod>2019-08-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-learned-the-marriott-breach/</loc>
		<lastmod>2019-08-07T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mitre-attck-vulnerability-spotlight-pass-the-hash/</loc>
		<lastmod>2019-08-07T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-create-a-more-diverse-cybersecurity-workforce/</loc>
		<lastmod>2019-08-07T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/physical-security-for-ics-scada-environments/</loc>
		<lastmod>2019-08-07T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ssl-tls-encryption-and-email-servers/</loc>
		<lastmod>2019-08-07T20:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/magento-skimmers-from-atob-to-alibaba/</loc>
		<lastmod>2019-08-07T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/live-from-black-hat-usa-communications-key-role-in-security/</loc>
		<lastmod>2019-08-07T20:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/live-from-black-hat-usa-four-key-takeaways-from-dino-dai-zovis-keynote/</loc>
		<lastmod>2019-08-07T21:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/02/why-grc-needs-irm/</loc>
		<lastmod>2019-08-07T21:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whats-new-in-3-1-new-dashboard-exciting-integrations-and-a-free-product/</loc>
		<lastmod>2019-08-07T21:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/leaders-on-gartner-recognition/</loc>
		<lastmod>2019-08-07T21:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/who-owns-your-wireless-service-crooks-do/</loc>
		<lastmod>2019-08-07T22:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-10-best-practices-for-securing-cloud-workflows/</loc>
		<lastmod>2019-08-08T00:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-homograph-phishing-attack-impersonates-bank-of-valletta-leverages-valid-tls-certificate/</loc>
		<lastmod>2019-08-08T02:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/tricky-chinese-targeted-trojan-bypasses-authentication/</loc>
		<lastmod>2019-08-08T02:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/best-practices-for-it-security-teams-in-the-age-of-cloud/</loc>
		<lastmod>2019-08-08T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/living-the-7-habits-of-highly-effective-cybersecurity/</loc>
		<lastmod>2019-08-08T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/microsoft-reveals-russian-hackers-fancy-bear-are-the-culprit-for-iot-network-breach-in-the-u-s/</loc>
		<lastmod>2019-08-08T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/att-employees-were-bribed-over-1-million-for-assisting-hackers-to-illegally-unlock-cellphones-says-doj/</loc>
		<lastmod>2019-08-08T04:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/pentest-everything-you-need-to-know-about-comptias-new-certification-2/</loc>
		<lastmod>2019-08-08T07:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/saefko-a-new-multi-layered-rat/</loc>
		<lastmod>2019-08-08T08:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/patch-your-cisco-220-smart-switches-now-critical-flaws-exposed/</loc>
		<lastmod>2019-08-08T10:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/246-findings-from-our-smart-contract-audits-an-executive-summary/</loc>
		<lastmod>2019-08-08T10:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-data-loss-prevention-methods-for-cloud-applications/</loc>
		<lastmod>2019-08-08T11:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/state-farm-says-security-incident-might-have-exposed-customers-data/</loc>
		<lastmod>2019-08-08T11:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-many-c-level-execs-own-your-security-infrastructure/</loc>
		<lastmod>2019-08-08T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/capital-one-breach-crime-board%e2%80%8a-%e2%80%8acase-of-speculative-sleuthing/</loc>
		<lastmod>2019-08-08T12:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/5-reasons-to-prioritize-privileged-access-management-pam/</loc>
		<lastmod>2019-08-08T13:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/where-in-the-world-is-peter-carlisle-episode-9-amsterdam/</loc>
		<lastmod>2019-08-08T13:09:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avoid-data-breaches-with-a-secure-inner-perimeter-around-your-digital-assets/</loc>
		<lastmod>2019-08-08T13:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-rise-of-the-fintech-sector/</loc>
		<lastmod>2019-08-08T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-the-financial-services-sector-must-mitigate-the-threat-of-cyber-attacks/</loc>
		<lastmod>2019-08-08T14:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/we-dont-need-no-stinking-patches-why-organizations-dont-patch/</loc>
		<lastmod>2019-08-08T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/clear-message-sent-dont-roll-the-dice-on-data-privacy-compliance/</loc>
		<lastmod>2019-08-08T14:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/identity-management-is-coming-to-the-internet-of-things/</loc>
		<lastmod>2019-08-08T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/navigating-the-mayhem-of-bot-management/</loc>
		<lastmod>2019-08-08T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-the-future-of-securing-power-grid-intelligent-devices/</loc>
		<lastmod>2019-08-08T15:48:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bec-attacks-a-closer-look-at-invoice-scams/</loc>
		<lastmod>2019-08-08T15:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-14-identity-and-access-management-security/</loc>
		<lastmod>2019-08-08T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-10-digital-forensic-tools-and-investigation-techniques/</loc>
		<lastmod>2019-08-08T15:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/types-of-ics/</loc>
		<lastmod>2019-08-08T15:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-9-analyzing-common-symptoms/</loc>
		<lastmod>2019-08-08T15:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-vladimir-de-turkheims-securing-node-js-and-javascript/</loc>
		<lastmod>2019-08-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/supply-chain-attack-against-the-electron-development-platform/</loc>
		<lastmod>2019-08-08T16:11:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-buffer-overflow-attacks-work/</loc>
		<lastmod>2019-08-08T16:36:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cryptocurrency-exchange-binance-offers-290000-bounty-to-unmask-blackmailer/</loc>
		<lastmod>2019-08-08T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/let-the-shilling-begin/</loc>
		<lastmod>2019-08-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-free-consumer-tools-arent-really-free/</loc>
		<lastmod>2019-08-08T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-case-study-in-the-ease-of-cybercrime/</loc>
		<lastmod>2019-08-08T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-wojciech-regulas-building-hacking-modern-ios-apps/</loc>
		<lastmod>2019-08-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/live-from-black-hat-usa-the-inevitable-marriage-of-devops-security/</loc>
		<lastmod>2019-08-08T18:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-researcher-elliot-alderson-talks-trump-and-facebook-google-and-huawei-and-teaching-kids-online-privacy-podcast/</loc>
		<lastmod>2019-08-08T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/interstellar-is-developing-slingshot-a-new-rust-based-blockchain-architecture-to-support-zero-knowledge-smart-contracts-and-more/</loc>
		<lastmod>2019-08-08T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/googles-project-zero-reveals-several-serious-zero-day-vulnerabilities-in-a-fully-remote-attack-surface-of-the-iphone/</loc>
		<lastmod>2019-08-08T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-sort-of-a-homecoming-why-i-joined-sonatype/</loc>
		<lastmod>2019-08-08T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/facebookery-always-watching/</loc>
		<lastmod>2019-08-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/financial-services-cybersecurity-still-porous-report/</loc>
		<lastmod>2019-08-08T19:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/kubernetes-pentest-methodology-part-1/</loc>
		<lastmod>2019-08-08T19:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threat-report-the-necessity-of-cyber-hygiene/</loc>
		<lastmod>2019-08-08T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/6-email-security-best-practices-to-keep-your-business-safe-in-2019/</loc>
		<lastmod>2019-08-08T21:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/nudata-security-wins-gold-and-silver-in-the-14th-annual-2019-it-world-award-in-cio-of-the-year-company-of-the-year-and-women-in-technology/</loc>
		<lastmod>2019-08-08T22:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cyber-security-roundup-for-july-2019/</loc>
		<lastmod>2019-08-08T22:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/grappling-with-the-security-talent-shortage-maybe-automation-can-help/</loc>
		<lastmod>2019-08-09T09:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-day-in-the-life-of-alessandro-gario-senior-security-engineer/</loc>
		<lastmod>2019-08-09T12:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/live-from-black-hat-usa-making-big-things-better-the-dead-cow-way/</loc>
		<lastmod>2019-08-09T13:36:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apple-increases-maximum-bug-bounty-program-payout-to-1m/</loc>
		<lastmod>2019-08-09T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/activate-your-shield-against-open-source-invasions/</loc>
		<lastmod>2019-08-09T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/morale-recruitment-retention-and-browsing/</loc>
		<lastmod>2019-08-09T15:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-tal-melameds-owasp-serverless-top-10/</loc>
		<lastmod>2019-08-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/teach-your-children-well/</loc>
		<lastmod>2019-08-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-simon-kenin-ziv-mador-magecart-a-growing-threat-to-e-commerce-sites/</loc>
		<lastmod>2019-08-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/insynq-ransom-attack-began-with-phishing-email/</loc>
		<lastmod>2019-08-09T18:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-dark-matter/</loc>
		<lastmod>2019-08-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/att-insider-ring-charged-with-unlocking-phones-avast/</loc>
		<lastmod>2019-08-09T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-usa-2019-conference-highlights-ibms-warshipping-os-threat-intelligence-bots-apples-1m-bug-bounty-programs-and-much-more/</loc>
		<lastmod>2019-08-10T01:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cncf-led-open-source-kubernetes-security-audit-reveals-37-flaws-in-kubernetes-cluster-recommendations-proposed/</loc>
		<lastmod>2019-08-10T01:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iiot-apocalypse-now-or-later/</loc>
		<lastmod>2019-08-10T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bsides-las-vegas-2019-day-1-breaking-ground/</loc>
		<lastmod>2019-08-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-mission-misinformation/</loc>
		<lastmod>2019-08-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bsides-las-vegas-2019-day-2-common-ground/</loc>
		<lastmod>2019-08-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hacker-jeopardy-wrong-answers-only-edition/</loc>
		<lastmod>2019-08-10T19:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bsides-las-vegas-2019-day-two-proving-ground/</loc>
		<lastmod>2019-08-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-geologic-time/</loc>
		<lastmod>2019-08-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bsides-las-vegas-2019-day-two-ground-floor/</loc>
		<lastmod>2019-08-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-from-the-massive-uk-power-outage/</loc>
		<lastmod>2019-08-11T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bsides-las-vegas-imessage-exploit-5g-and-stingray-surveillance/</loc>
		<lastmod>2019-08-12T04:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-importance-of-cybersecurity-education/</loc>
		<lastmod>2019-08-12T07:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/uk-fines-jump-since-gdpr-implementation/</loc>
		<lastmod>2019-08-12T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/outsourcing-cost-cutting-and-the-boeing-737-max-debacle/</loc>
		<lastmod>2019-08-12T10:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/microsoft-contractors-also-listen-to-skype-and-cortana-audio-recordings-joining-amazon-google-and-apple-in-privacy-violation-scandals/</loc>
		<lastmod>2019-08-12T10:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/evaluating-the-nsas-telephony-metadata-program/</loc>
		<lastmod>2019-08-12T11:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/attackers-using-excel-4-0-macro-dropper-to-spread-servhelper-backdoor/</loc>
		<lastmod>2019-08-12T11:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ask-the-experts-how-industrial-organizations-can-strengthen-their-security-posture/</loc>
		<lastmod>2019-08-12T11:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-build-a-mature-vulnerability-management-program/</loc>
		<lastmod>2019-08-12T11:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bitglass-sales-kick-off-fun-concise-and-effective/</loc>
		<lastmod>2019-08-12T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/expanding-the-digital-risk-conversation/</loc>
		<lastmod>2019-08-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/guest-essay-why-the-next-round-of-cyber-attacks-could-put-many-smbs-out-of-business/</loc>
		<lastmod>2019-08-12T13:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/social-engineer-newsletter-vol-09-issue-119/</loc>
		<lastmod>2019-08-12T13:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ensuring-security-is-a-priority-at-big-events-this-summer/</loc>
		<lastmod>2019-08-12T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/prevent-data-breaches-making-sure-the-algorithms-work/</loc>
		<lastmod>2019-08-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/gdpr-outlook-after-first-record-fines-whats-next/</loc>
		<lastmod>2019-08-12T14:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-2019-recap-transformation-the-new-cybersecurity-culture/</loc>
		<lastmod>2019-08-12T15:12:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-ruth-esmeralda-barbacils-valentina-palacins-once-upon-a-time-in-the-west-a-story-on-dns-attacks/</loc>
		<lastmod>2019-08-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/boeing-say-it-aint-so/</loc>
		<lastmod>2019-08-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/blackberrys-ai-intelligent-security-has-broad-implications/</loc>
		<lastmod>2019-08-12T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/16-business-email-mobile-phishing-tricks-to-be-aware-of-in-2019/</loc>
		<lastmod>2019-08-12T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-analyst-resume-tips/</loc>
		<lastmod>2019-08-12T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/malware-analysis-and-reverse-engineering/</loc>
		<lastmod>2019-08-12T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-3-securing-corporate-environment/</loc>
		<lastmod>2019-08-12T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinars-devops-security-tool-abuse-coverity-and-threadfix/</loc>
		<lastmod>2019-08-12T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-yoram-golandskys-protecting-a-high-profile-enterprise/</loc>
		<lastmod>2019-08-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/introducing-camille/</loc>
		<lastmod>2019-08-12T18:52:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/robert-m-lees-jeff-hass-little-bobby-comics-different-versions/</loc>
		<lastmod>2019-08-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mssp-software-agnostic-vs-proprietary/</loc>
		<lastmod>2019-08-12T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/sec-investigating-data-leak-at-first-american-financial-corp/</loc>
		<lastmod>2019-08-12T20:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whats-the-most-vulnerable-part-of-your-network/</loc>
		<lastmod>2019-08-12T21:01:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/does-the-u-s-need-its-own-privacy-law-avast/</loc>
		<lastmod>2019-08-12T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/it-takes-a-village-to-hack-a-plane-a-car-or-your-pacemaker/</loc>
		<lastmod>2019-08-12T21:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/annual-research-from-whitehat-security-says-remediation-rates-for-app-vulnerabilities-continue-to-fall/</loc>
		<lastmod>2019-08-13T14:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/troldesh-ransomware-dropper/</loc>
		<lastmod>2019-08-12T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortinet-security-fabric-earns-nss-labs-recommendation-for-2019-breach-prevention-systems-group-test/</loc>
		<lastmod>2019-08-13T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ensuring-cybersecurity-at-big-events-this-summer/</loc>
		<lastmod>2019-08-13T00:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/jobs-as-code-selecting-the-best-tools-and-deconstructing-the-ci-cd-pipeline/</loc>
		<lastmod>2019-08-13T01:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/open-source-security-podcast-ep-151-the-darpa-cyber-grand-challenge-with-david-brumley/</loc>
		<lastmod>2019-08-13T01:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/developers-need-to-say-no-elliot-alderson-on-the-faceapp-controversy-in-a-bonus-podcast-episode-podcast/</loc>
		<lastmod>2019-08-13T02:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/at-defcon-27-darpas-10-million-voting-system-could-not-be-hacked-by-voting-village-hackers-due-to-a-bug/</loc>
		<lastmod>2019-08-13T02:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/capital-one-data-breach-a-reminder-to-lock-your-back-door/</loc>
		<lastmod>2019-08-13T07:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/text-redaction-tools-3-solutions-compared/</loc>
		<lastmod>2019-08-13T07:32:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/payments-and-security-putting-security-where-your-money-is/</loc>
		<lastmod>2019-08-13T09:18:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ceo-cyber-quiz-whats-your-it-security-iq/</loc>
		<lastmod>2019-08-13T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/abcs-of-ueba-j-is-for-json/</loc>
		<lastmod>2019-08-13T09:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/password-policy-manager-1-4-premium-trials-advantageous-pricing-plugin-improvements/</loc>
		<lastmod>2019-08-13T09:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/more-on-backdooring-or-not-whatsapp/</loc>
		<lastmod>2019-08-13T11:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/uc-browser-app-abuses-may-have-exposed-500-million-users/</loc>
		<lastmod>2019-08-13T11:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/an-ics-cyber-security-storm-is-brewing-how-to-prevent-staff-burnout/</loc>
		<lastmod>2019-08-13T11:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/capital-one-breach-underscores-need-to-protect-against-insider-threats/</loc>
		<lastmod>2019-08-13T12:59:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/building-a-culture-of-security-73-articles-summarizing-black-hat-usa-2019/</loc>
		<lastmod>2019-08-13T13:48:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avast-and-stanford-research-shows-global-internet-of-things-avast/</loc>
		<lastmod>2019-08-13T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/alleviating-digital-transformation-performance-and-security-concerns/</loc>
		<lastmod>2019-08-13T14:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-shiftleft-is-able-to-analyze-1-million-loc-under-15-minutes/</loc>
		<lastmod>2019-08-13T14:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-hard-is-it-to-build-a-botnet/</loc>
		<lastmod>2019-08-13T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/amazon-ebs-snapshots-exposed-publicly-leaking-sensitive-data-in-hundreds-of-thousands-security-analyst-reveals-at-defcon-27/</loc>
		<lastmod>2019-08-13T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/vulnerabilities-in-the-picture-transfer-protocol-ptp-allows-researchers-to-inject-ransomware-in-canons-dslr-camera/</loc>
		<lastmod>2019-08-13T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/you-can-now-use-fingerprint-or-screen-lock-instead-of-passwords-when-visiting-certain-google-services-thanks-to-fido2-based-authentication/</loc>
		<lastmod>2019-08-13T15:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-gdpr-ccpa-impact-healthcare-compliance/</loc>
		<lastmod>2019-08-13T15:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/best-practices-for-cloud-workload-protection-redesigning-cybersecurity-for-cloud-first-businesses/</loc>
		<lastmod>2019-08-13T15:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-matteo-meuccis-software-security-war-your-reports-are-dead/</loc>
		<lastmod>2019-08-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/machine-learning-development-are-you-in/</loc>
		<lastmod>2019-08-13T16:07:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mitre-attck-vulnerability-series-trusted-relationship/</loc>
		<lastmod>2019-08-13T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threat-hunting-with-kolide-and-osquery/</loc>
		<lastmod>2019-08-13T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/disassembly-101/</loc>
		<lastmod>2019-08-13T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-resources/</loc>
		<lastmod>2019-08-13T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/compromised-websites-hosting-troldesh-ransomware-samples/</loc>
		<lastmod>2019-08-13T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/tripwire-patch-priority-index-for-july-2019/</loc>
		<lastmod>2019-08-13T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/low-appetite-for-long-security-training-use-a-bite-sized-approach/</loc>
		<lastmod>2019-08-13T16:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-bi-directional-cloud-highway-critical-insights-into-todays-cloud-infrastructures/</loc>
		<lastmod>2019-08-13T16:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/us-election-systems-expose/</loc>
		<lastmod>2019-08-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-conduct-social-media-investigations-and-remain-anonymous/</loc>
		<lastmod>2019-08-13T17:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-astha-singhals-the-evolving-community-of-appsec/</loc>
		<lastmod>2019-08-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/phishing-c2-callbacks-your-organization-has-likely-already-been-compromised/</loc>
		<lastmod>2019-08-13T18:24:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/development-velocity-is-a-surprisingly-good-thing-says-researchers/</loc>
		<lastmod>2019-08-13T18:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-e-scooters/</loc>
		<lastmod>2019-08-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-license-and-security-risks-of-using-node-js/</loc>
		<lastmod>2019-08-13T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/raj-samani-talks-about-managing-risk-and-protecting-data-integrity/</loc>
		<lastmod>2019-08-13T19:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/device-protection-should-be-the-first-priority-in-a-corporate-vision-not-an-afterthought/</loc>
		<lastmod>2019-08-13T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cant-trust-anyone/</loc>
		<lastmod>2019-08-13T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/patch-tuesday-august-2019-edition/</loc>
		<lastmod>2019-08-13T21:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/vert-threat-alert-august-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-08-13T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-create-a-website-maintenance-plan-contract/</loc>
		<lastmod>2019-08-13T23:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/capital-one-experiences-third-largest-financial-hack-from-aws-insider/</loc>
		<lastmod>2019-08-14T00:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-2019-highlights/</loc>
		<lastmod>2019-08-14T06:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-avoid-getting-doxxed/</loc>
		<lastmod>2019-08-14T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/six-reasons-to-become-a-channel-partner/</loc>
		<lastmod>2019-08-14T07:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-learned-from-the-capital-one-attack/</loc>
		<lastmod>2019-08-14T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-manage-the-headache-of-defending-industrial-it-infrastructures-industrial-iot-part-2/</loc>
		<lastmod>2019-08-14T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/building-zero-trust-with-a-software-defined-perimeter-2/</loc>
		<lastmod>2019-08-14T10:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/attorney-general-barr-and-encryption/</loc>
		<lastmod>2019-08-14T11:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/meet-bluetana-the-scourge-of-pump-skimmers/</loc>
		<lastmod>2019-08-14T12:25:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/automation-for-netops-and-devops/</loc>
		<lastmod>2019-08-14T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-research-apache-solr-parameter-injection/</loc>
		<lastmod>2019-08-14T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-tech-trend-micro-inserts-x-factor-into-edr-endpoint-detection-and-response/</loc>
		<lastmod>2019-08-14T12:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hackers-steal-700000-guest-records-from-choice-hotels/</loc>
		<lastmod>2019-08-14T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-importance-of-cyber-security-in-the-world-of-telecommunications/</loc>
		<lastmod>2019-08-14T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/five-tools-for-a-defense-in-depth-strategy-for-endpoints/</loc>
		<lastmod>2019-08-14T13:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/microsoft-warns-of-wormable-vulnerabilities-in-windows/</loc>
		<lastmod>2019-08-14T13:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/glass-class-three-essential-requirements-for-securing-iaas/</loc>
		<lastmod>2019-08-14T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/16-phishing-scams-that-consumers-need-to-be-aware-of-in-2019/</loc>
		<lastmod>2019-08-14T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/debugging-for-malware-analysis/</loc>
		<lastmod>2019-08-14T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-8-incident-response-process/</loc>
		<lastmod>2019-08-14T14:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ftc-says-unroll-me-deceived-consumers-on-access-and-use-of-information/</loc>
		<lastmod>2019-08-14T15:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/osquery-security-use-cases-and-solutions/</loc>
		<lastmod>2019-08-14T15:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/hardening-defenses-with-mitre-attck-and-osquery-lessons-from-singapore-health-breach/</loc>
		<lastmod>2019-08-14T15:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/detecting-malicious-packages-in-repositories-like-pypi-using-osquery-for-complete-software-inventory/</loc>
		<lastmod>2019-08-14T15:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/video-incident-investigation-with-uptycs-and-osquery/</loc>
		<lastmod>2019-08-14T15:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/cloud-security-knowing-the-basics/</loc>
		<lastmod>2019-08-14T15:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/building-a-zero-trust-network-and-where-osquery-fits-gitlabs-real-life-roadmap-recap/</loc>
		<lastmod>2019-08-14T15:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/checking-mds-zombieload-mitigations-on-macos-with-osquery/</loc>
		<lastmod>2019-08-14T15:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/remote-desktop-vulnerabilities-identifying-the-exposure-and-patch-using-osquery/</loc>
		<lastmod>2019-08-14T15:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/threat-hunting-with-osquery-5-macos-malware-techniques-how-to-find-them/</loc>
		<lastmod>2019-08-14T15:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/the-first-curated-osquery-resource-hub/</loc>
		<lastmod>2019-08-14T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/modern-cisos-dont-say-this-word-anymore/</loc>
		<lastmod>2019-08-14T15:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/complying-with-apra-prudential-standard-cps-234/</loc>
		<lastmod>2019-08-14T15:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-from-harris-county-petrochemical-and-incident-response/</loc>
		<lastmod>2019-08-14T15:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-izar-tarandachs-what-do-you-mean-threat-model-every-story/</loc>
		<lastmod>2019-08-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cat-and-mouse-understanding-the-security-industrys-failure-to-stop-cyberattackers/</loc>
		<lastmod>2019-08-14T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/krebs-on-security-brilliant-expose-of-us-wireless-carriers/</loc>
		<lastmod>2019-08-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/as-cyberattacks-increase-so-does-the-price-of-cybersecurity-professionals/</loc>
		<lastmod>2019-08-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-switch-vulnerability-discovered-by-nozomi-networks-labs/</loc>
		<lastmod>2019-08-14T17:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/travolution-feature-how-can-the-travel-industry-protect-customer-data/</loc>
		<lastmod>2019-08-14T17:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/from-fast-company-to-inc-sonatype-continues-racking-up-notable-awards/</loc>
		<lastmod>2019-08-14T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-use-gitlab-ci-with-nexus/</loc>
		<lastmod>2019-08-14T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/infographic-financial-cybersecurity-by-the-numbers/</loc>
		<lastmod>2019-08-14T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-sujatha-yakasiris-docker-security-insights/</loc>
		<lastmod>2019-08-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/back-to-school-tips-the-abcs-of-online-security/</loc>
		<lastmod>2019-08-14T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-from-biometric-security-flaws/</loc>
		<lastmod>2019-08-14T18:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/government-institutions-risk-data-breaches-by-avoiding-cloud-security-automation-2/</loc>
		<lastmod>2019-08-14T18:48:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/linkedin-phishing-this-is-why-we-cant-have-nice-things/</loc>
		<lastmod>2019-08-14T18:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-useful-app/</loc>
		<lastmod>2019-08-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-its-time-to-update-your-endpoint-security-approach/</loc>
		<lastmod>2019-08-14T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-cyberwire-daily-podcast-ep-389-with-guest-speaker-david-brumley/</loc>
		<lastmod>2019-08-14T22:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-best-of-black-hat-and-def-con-2019-avast/</loc>
		<lastmod>2019-08-14T23:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iphone-can-be-hacked-via-a-legit-looking-malicious-lightning-usb-cable-worth-200-defcon-27-demo-shows/</loc>
		<lastmod>2019-08-15T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fraudsters-used-phishing-emails-to-target-hotels-in-north-america/</loc>
		<lastmod>2019-08-15T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinar-wireshark-for-hackers/</loc>
		<lastmod>2019-08-15T01:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/qualys-has-a-prescription-for-better-cybersecurity/</loc>
		<lastmod>2019-08-15T02:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mitre-attck-july-2019-update/</loc>
		<lastmod>2019-08-15T05:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-nerc/</loc>
		<lastmod>2019-08-15T05:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/better-faster-stronger-nexus-lifecycles-improved-jira-add-on-gives-developers-and-appsec-something-to-high-five-about/</loc>
		<lastmod>2019-08-15T06:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-prepare-for-the-california-consumer-privacy-act/</loc>
		<lastmod>2019-08-15T07:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-you-need-to-know-about-how-data-loss-prevention-software-works/</loc>
		<lastmod>2019-08-15T11:19:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/feature-release-19-3-secure-s3-buckets-microsoft-teams-compliance-heat-map-2/</loc>
		<lastmod>2019-08-15T12:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/behind-the-disguise-of-trojans/</loc>
		<lastmod>2019-08-15T12:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/training-exposure-addressing-secure-coding-education-in-your-software-security-program/</loc>
		<lastmod>2019-08-15T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/review-of-apache-struts-vulnerabilities-yields-24-updated-advisories/</loc>
		<lastmod>2019-08-15T12:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/biometric-authentication-key-to-remote-access-for-vendors/</loc>
		<lastmod>2019-08-15T13:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-take-a-primer-on-how-ransomware-arose-to-the-become-an-enduring-scourge/</loc>
		<lastmod>2019-08-15T13:24:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/repost-opinion-innovation-is-driving-the-future-of-encryption/</loc>
		<lastmod>2019-08-15T13:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-jobs-outlook/</loc>
		<lastmod>2019-08-15T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-ia-levels/</loc>
		<lastmod>2019-08-15T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-increasing-the-organizations-credibility/</loc>
		<lastmod>2019-08-15T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/assembly-basics/</loc>
		<lastmod>2019-08-15T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/demisto-uptycs-orchestrating-incident-response-activities/</loc>
		<lastmod>2019-08-15T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avast-premium-security-gives-complete-protection-online-avast/</loc>
		<lastmod>2019-08-15T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/report-nashville-company-pays-ex-employee-ransom-installments-only-to-stall-him-until-the-cops-make-the-bust/</loc>
		<lastmod>2019-08-15T14:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/clickjacking-attacks-what-they-are-and-how-to-prevent-them/</loc>
		<lastmod>2019-08-15T15:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortinet-announces-the-fortiddos-e-series-with-two-new-models-fortiddos-1500e-and-2000e/</loc>
		<lastmod>2019-08-15T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/5-things-you-should-know-about-whale-phishing/</loc>
		<lastmod>2019-08-15T15:59:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-isaiah-sarjus-how-online-dating-made-me-better-at-threat-modeling/</loc>
		<lastmod>2019-08-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/prevent-compliance-failures-with-complete-content-auditability/</loc>
		<lastmod>2019-08-15T16:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/warshipping/</loc>
		<lastmod>2019-08-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/more-than-a-million-people-have-their-biometric-data-exposed-in-massive-security-breach/</loc>
		<lastmod>2019-08-15T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-norman-malware-took-part-in-large-scale-cryptominer-infection/</loc>
		<lastmod>2019-08-15T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-shiri-ivstans-looking-towards-the-future-of-open-source-vulnerability-management/</loc>
		<lastmod>2019-08-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-experience-in-the-cissp-mentorship-program/</loc>
		<lastmod>2019-08-15T18:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-old-game-worlds/</loc>
		<lastmod>2019-08-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cia-triad-best-practices-for-securing-your-org/</loc>
		<lastmod>2019-08-15T19:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/about-infosec/</loc>
		<lastmod>2019-08-15T20:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-can-vendor-security-assessments-improve-supply-chain-risk-management/</loc>
		<lastmod>2019-08-15T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/key-ways-to-make-the-case-for-appsec-budget/</loc>
		<lastmod>2019-08-15T21:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-hackers-do-after-gaining-access-to-a-website/</loc>
		<lastmod>2019-08-15T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/video-gdpr-exploit-implications/</loc>
		<lastmod>2019-08-15T23:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-of-all-types-abound-in-aftermath-of-massive-capital-one-breach/</loc>
		<lastmod>2019-08-16T00:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iot-devices-why-risk-assessment-is-critical-to-cybersecurity/</loc>
		<lastmod>2019-08-16T04:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/when-it-comes-to-application-security-banks-pay-little-interest/</loc>
		<lastmod>2019-08-16T08:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/software-vulnerabilities-in-the-boeing-787/</loc>
		<lastmod>2019-08-16T11:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/police-recovered-300k-stolen-in-spotslyvania-schools-phishing-attack/</loc>
		<lastmod>2019-08-16T12:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-leverage-secure-access-workstations-for-the-cloud/</loc>
		<lastmod>2019-08-16T13:10:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/pci-compliance-checklist/</loc>
		<lastmod>2019-08-16T13:50:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/learn-how-fortinet-is-transforming-security-for-virtual-and-cloud-environments-at-vmworld-2019/</loc>
		<lastmod>2019-08-16T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-3-layered-cake-deploying-signal-sciences-in-kubernetes/</loc>
		<lastmod>2019-08-16T15:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-asher-genachowskis-chen-cohens-breaking-out-of-the-container-without-zero-day-can-that-happen-to-me/</loc>
		<lastmod>2019-08-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-is-the-ftc-allowing-the-harvesting-of-kids-data/</loc>
		<lastmod>2019-08-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fake-indian-income-tax-calculator-delivers-xrat-variant/</loc>
		<lastmod>2019-08-16T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/3-reasons-to-join-us-at-flight-boston/</loc>
		<lastmod>2019-08-16T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-tash-norris-are-we-making-our-engineers-blue/</loc>
		<lastmod>2019-08-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-software-security-and-devops-were-the-talk-of-the-town-at-black-hat-and-def-con-2019/</loc>
		<lastmod>2019-08-16T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-look-up-in-the-sky-its-apple-card/</loc>
		<lastmod>2019-08-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apply-a-java-deployment-rule-set-in-4-easy-steps/</loc>
		<lastmod>2019-08-16T19:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/idaptive-named-a-visionary/</loc>
		<lastmod>2019-08-16T19:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/biostar-2-exposes-28-million-biometric-records-avast/</loc>
		<lastmod>2019-08-16T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortiguard-labs-security-researcher-discovers-multiple-critical-vulnerabilities-in-adobe-photoshop/</loc>
		<lastmod>2019-08-16T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/devops-chat-podcast-2m-darpa-award-sparks-behavior-testing-with-forallsecures-mayhem-solution/</loc>
		<lastmod>2019-08-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-you-need-to-know-about-doxxing-and-how-to-prevent-it/</loc>
		<lastmod>2019-08-16T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/morphisec-vs-the-microsoft-ctf-exploit-twenty-year-old-design-flaw-no-match-for-morphisec-2/</loc>
		<lastmod>2019-08-16T21:59:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/friday-squid-blogging-robot-squid-propulsion/</loc>
		<lastmod>2019-08-16T21:05:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/key-themes-from-black-hat-conference-2019/</loc>
		<lastmod>2019-08-16T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/demystifying-pci-dss-compliance/</loc>
		<lastmod>2019-08-16T21:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-sasha-rosenbaums-can-we-automate-security/</loc>
		<lastmod>2019-08-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-serena-versus-the-drones/</loc>
		<lastmod>2019-08-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-nancy-garches-tanya-jancas-devsecops-with-owasp-devslop/</loc>
		<lastmod>2019-08-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/patching-the-iron-tail-is-easier-said-than-done/</loc>
		<lastmod>2019-08-18T02:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/do-american-tech-workers-do-vacations-all-wrong/</loc>
		<lastmod>2019-08-18T12:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-jayesh-singh-chauhans-defending-cloud-infrastructures-with-cloud-security-suite/</loc>
		<lastmod>2019-08-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/robert-m-lees-jeff-hass-little-bobby-comics-the-arrogator/</loc>
		<lastmod>2019-08-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-eugene-rojavskis-struts-2-must-die-the-life-and-inevitable-death-of-javas-spaghettiest-framework/</loc>
		<lastmod>2019-08-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lauded-nigerian-entrepreneur-may-be-a-bec-yahoo-boy/</loc>
		<lastmod>2019-08-18T23:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/biometric-security-data-breach-critical-windows-vulnerabilities-fbi-data-harvesting/</loc>
		<lastmod>2019-08-19T04:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/global-encryption-trends-studie-2019-das-bislang-groste-jahr/</loc>
		<lastmod>2019-08-19T05:48:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/das-problem-mit-schlusseln-key-management-und-warum-ein-starkes-enforcement-notig-ist/</loc>
		<lastmod>2019-08-19T05:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/das-neue-ncipher-security-bewahrte-technologie-neue-innovative-marke/</loc>
		<lastmod>2019-08-19T06:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-modern-iomt-against-cybersecurity-challenges/</loc>
		<lastmod>2019-08-19T06:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/psychological-tricks-of-the-malware-trade/</loc>
		<lastmod>2019-08-19T06:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-take-can-embedding-security-deep-inside-mobile-apps-point-the-way-to-securing-iot/</loc>
		<lastmod>2019-08-19T08:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/detect-call-center-fraud-with-security-analytics/</loc>
		<lastmod>2019-08-19T09:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/find-where-a-user-is-logged-on-in-a-domain-and-more/</loc>
		<lastmod>2019-08-19T09:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whats-it-like-being-a-cybersecurity-risk-analyst/</loc>
		<lastmod>2019-08-19T09:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/influence-operations-kill-chain/</loc>
		<lastmod>2019-08-19T11:14:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rsa-and-nist-agree-mfa-a-critical-technology-to-secure-ecommerce/</loc>
		<lastmod>2019-08-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bromium-to-speak-at-cyber-security-summit-chicago-aug-27/</loc>
		<lastmod>2019-08-19T13:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-rise-of-bulletproof-residential-networks/</loc>
		<lastmod>2019-08-19T13:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-black-hat-experience-with-bitglass/</loc>
		<lastmod>2019-08-19T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/20-month-prison-sentence-for-british-hacker-who-made-fortune-helping-sim-swap-fraudsters/</loc>
		<lastmod>2019-08-19T14:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/getting-into-cybersecurity-in-less-than-a-year/</loc>
		<lastmod>2019-08-19T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/saving-lives-with-ics-and-critical-infrastructure-security-2/</loc>
		<lastmod>2019-08-19T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-cysa-exam-information/</loc>
		<lastmod>2019-08-19T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ics-scada-access-controls/</loc>
		<lastmod>2019-08-19T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/tribe-of-hackers-red-team-edition/</loc>
		<lastmod>2019-08-19T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/safe-t-sdp-why-rip-and-replace-your-vpn/</loc>
		<lastmod>2019-08-19T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fast-dns-zone-apex-mapping-dnssec/</loc>
		<lastmod>2019-08-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/creating-a-differentiated-sd-wan-service-as-a-platform-for-revenue-generating-value-added-services-vas/</loc>
		<lastmod>2019-08-19T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/supermarket-chain-notifies-customers-of-payment-card-data-incident/</loc>
		<lastmod>2019-08-19T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-amichai-shulmans-yuval-rons-alexa-and-cortana-in-windowsland-hacking-an-innovative-partnership-and-other-adventures/</loc>
		<lastmod>2019-08-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cisos-in-the-boardroom-translating-tactical-cybersecurity-into-business-objectives/</loc>
		<lastmod>2019-08-19T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/greek-pandora-does-ancient-enmity-live-on-in-todays-ai/</loc>
		<lastmod>2019-08-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/introducing-the-new-veracode-software-composition-analysis/</loc>
		<lastmod>2019-08-19T17:50:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-makes-local-government-an-enticing-cyber-target/</loc>
		<lastmod>2019-08-19T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/owasp-appsec-tel-aviv-2019-amir-luckachs-nosql-web-application-vulnerabilities-and-mitigation/</loc>
		<lastmod>2019-08-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/daniel-storis-profile-pics-vs-real-life/</loc>
		<lastmod>2019-08-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/simply-healthcare-plans-makes-access-easy-with-idaptive/</loc>
		<lastmod>2019-08-19T19:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/better-security-more-efficient-ops-with-a-unified-approach-to-appsec/</loc>
		<lastmod>2019-08-19T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ec-council-coming-to-capitol-technology-university/</loc>
		<lastmod>2019-08-19T20:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/overcoming-hurdles-to-implementing-pam/</loc>
		<lastmod>2019-08-19T20:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinar-vulnerability-reporting-alternatives-to-nvd-data-feeds/</loc>
		<lastmod>2019-08-19T22:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/nexus-repository-now-supports-apt/</loc>
		<lastmod>2019-08-19T23:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/sucuri-can-help-secure-your-client-websites/</loc>
		<lastmod>2019-08-20T01:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ai-a-silver-bullet-for-security-it-is-not/</loc>
		<lastmod>2019-08-20T02:11:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/climbing-the-vulnerability-management-mountain-taking-the-first-steps-towards-enlightenment/</loc>
		<lastmod>2019-08-20T03:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-rise-of-hybrid-cloud-poses-new-security-challenges-are-you-prepared/</loc>
		<lastmod>2019-08-20T07:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-gdpr-and-cybersecurity-challenges-do-law-firms-face/</loc>
		<lastmod>2019-08-20T08:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/secure-sd-wan-needs-to-support-your-cloud-on-ramp-strategy-2/</loc>
		<lastmod>2019-08-20T08:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/shared-intel-malware-ridden-counterfeit-phones-place-consumers-companies-in-harms-way/</loc>
		<lastmod>2019-08-20T09:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-flaws-in-boeing-787-cis-ms-code-can-be-misused-by-hackers-security-researcher-says-at-black-hat-2019/</loc>
		<lastmod>2019-08-20T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-stratasan-addresses-its-growing-security-compliance-needs-for-healthcare-it-and-services-using-threat-stack/</loc>
		<lastmod>2019-08-20T10:34:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/as-ransomware-grows-the-need-for-phishing-threat-prevention-becomes-paramount/</loc>
		<lastmod>2019-08-20T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/one-environment-three-objectives-satisfied/</loc>
		<lastmod>2019-08-20T11:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/7-step-data-loss-prevention-checklist/</loc>
		<lastmod>2019-08-20T11:20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/worm-cryptominer-combo-lets-you-game-while-using-nsa-exploits-to-move-laterally/</loc>
		<lastmod>2019-08-20T11:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/doh-apple-botches-ios-update-leaves-iphones-open-to-jailbreaking/</loc>
		<lastmod>2019-08-20T12:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protect-the-key-or-dont-bother-encrypting-your-data/</loc>
		<lastmod>2019-08-20T12:41:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/four-things-security-can-do-to-keep-up-with-devops-ci-cd/</loc>
		<lastmod>2019-08-20T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-examination-process/</loc>
		<lastmod>2019-08-20T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-requirements/</loc>
		<lastmod>2019-08-20T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/reverse-engineering-packed-malware/</loc>
		<lastmod>2019-08-20T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-exam-policies-and-appeal-procedures/</loc>
		<lastmod>2019-08-20T13:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/remote-employees-the-pci-compliance-hurdle/</loc>
		<lastmod>2019-08-20T13:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-i-joined-zeronorth-as-ceo/</loc>
		<lastmod>2019-08-20T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/welcoming-our-new-ceo-to-zeronorth/</loc>
		<lastmod>2019-08-20T13:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/forbes-ciso-research-managing-risks-with-limited-resources/</loc>
		<lastmod>2019-08-20T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/kevin-ashton-named-the-internet-of-things-avast/</loc>
		<lastmod>2019-08-20T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-history-of-human-identity-in-pictures-part-2/</loc>
		<lastmod>2019-08-20T15:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-history-of-human-identity-in-pictures-part-ii/</loc>
		<lastmod>2019-08-20T15:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/performant-osquery-enterprise-grade-osquery-at-scale-considerations/</loc>
		<lastmod>2019-08-20T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-welcome-address-bsides-crew/</loc>
		<lastmod>2019-08-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/your-business-is-compliant-with-data-security-regulations-its-still-not-safe/</loc>
		<lastmod>2019-08-20T16:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-your-sast-tool-needs-to-understand-your-web-framework/</loc>
		<lastmod>2019-08-20T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/knobd/</loc>
		<lastmod>2019-08-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/launching-the-melbourne-scrubbing-centre/</loc>
		<lastmod>2019-08-20T17:45:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-andrew-blanes-turning-your-weapons-against-you/</loc>
		<lastmod>2019-08-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-conference-question/</loc>
		<lastmod>2019-08-20T19:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threats-on-apis-and-mobile-applications/</loc>
		<lastmod>2019-08-20T19:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/types-of-remote-access-pros-and-cons/</loc>
		<lastmod>2019-08-20T20:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/3-perspectives-on-browser-isolation/</loc>
		<lastmod>2019-08-20T21:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-bluetooth-vulnerability-knob-attack-can-manipulate-the-data-transferred-between-two-paired-devices/</loc>
		<lastmod>2019-08-20T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/reducing-investigation-time-how-to-quickly-parse-true-positives/</loc>
		<lastmod>2019-08-20T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-from-the-massive-united-kingdom-power-outage/</loc>
		<lastmod>2019-08-20T22:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/nexus-intelligence-insights-sonatype-2018-0413-flatmap-streams-back-back-again/</loc>
		<lastmod>2019-08-20T22:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/integrating-grc-compliance-regulations-and-futureproofing-your-cybersecurity-program/</loc>
		<lastmod>2019-08-20T22:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/verodin-wins-prestigious-black-unicorn-awards-2019-by-tracey-moon/</loc>
		<lastmod>2019-08-20T23:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/study-americans-wont-vote-for-candidates-who-approve-ransomware-payments/</loc>
		<lastmod>2019-08-21T02:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/forensics-in-the-cloud-what-you-need-to-know/</loc>
		<lastmod>2019-08-21T03:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/being-a-ciso-isnt-just-about-information-security-its-about-building-a-stronger-business-strategy/</loc>
		<lastmod>2019-08-21T03:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-take-heres-how-bulletproof-proxies-help-criminals-put-compromised-iot-devices-to-work/</loc>
		<lastmod>2019-08-21T08:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-importance-of-intelligence-driven-threat-detection/</loc>
		<lastmod>2019-08-21T09:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bitglass-security-spotlight-iphones-susceptible-to-a-hack-via-text/</loc>
		<lastmod>2019-08-21T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/forced-password-reset-check-your-assumptions/</loc>
		<lastmod>2019-08-21T11:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/digital-transformation-new-security-challenges-renewed-call-for-governance/</loc>
		<lastmod>2019-08-21T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-fundamentals-are-key-to-successful-cloud-migration/</loc>
		<lastmod>2019-08-21T12:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/time-to-transfer-risk-why-security-complexity-vpns-are-no-longer-sustainable/</loc>
		<lastmod>2019-08-21T13:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avast-secure-browser-now-available-for-mac-avast/</loc>
		<lastmod>2019-08-21T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/gao-us-federal-agencies-need-to-fully-establish-risk-management-programs/</loc>
		<lastmod>2019-08-21T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-only-way-to-truly-protect-data-in-the-cloud-end-to-end-encryption/</loc>
		<lastmod>2019-08-21T14:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-top-9-cyber-security-threats-that-will-ruin-your-day/</loc>
		<lastmod>2019-08-21T14:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/getting-to-know-todays-threats/</loc>
		<lastmod>2019-08-21T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-choose-a-cloud-ddos-scrubbing-service/</loc>
		<lastmod>2019-08-21T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-josh-de-boers-mission-assurance-in-closed-proprietary-systems/</loc>
		<lastmod>2019-08-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/does-it-make-sense-to-make-a-career-move-from-law-to-data-privacy/</loc>
		<lastmod>2019-08-21T16:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-diversity-of-thought-matters-in-cybersecurity/</loc>
		<lastmod>2019-08-21T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-history/</loc>
		<lastmod>2019-08-21T16:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/analyzing-packed-malware/</loc>
		<lastmod>2019-08-21T16:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mobile-apps-insecure-by-default/</loc>
		<lastmod>2019-08-21T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/pieces-of-eight-a-prescription/</loc>
		<lastmod>2019-08-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/until-hackers-give-up-cisos-must-always-do-this/</loc>
		<lastmod>2019-08-21T17:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/key-takeaways-from-forallsecures-achieving-development-speed-and-code-quality-with-behavior-testing-webinar/</loc>
		<lastmod>2019-08-21T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-chris-le-roys-build-to-hack-hack-to-build/</loc>
		<lastmod>2019-08-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/announcing-gonexus/</loc>
		<lastmod>2019-08-21T18:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-when-they-change-the-coffee-lids/</loc>
		<lastmod>2019-08-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-provide-iot-security-in-the-connected-everything-era-nist-guidelines-2/</loc>
		<lastmod>2019-08-21T19:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-largest-ddos-attacks-what-you-can-learn-from-them/</loc>
		<lastmod>2019-08-21T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/behind-the-scenes-of-productivity-and-efficiency-are-questions/</loc>
		<lastmod>2019-08-21T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/do-american-technology-workers-do-vacations-all-wrong/</loc>
		<lastmod>2019-08-21T23:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/july-2019-appsec-intelligence-report-attack-edition-2/</loc>
		<lastmod>2019-08-22T02:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-gamaredon-group-a-ttp-profile-analysis/</loc>
		<lastmod>2019-08-22T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/where-in-the-world-is-peter-carlisle-episode-10-las-vegas/</loc>
		<lastmod>2019-08-22T05:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/history-doesnt-repeat-itself-in-cyberspace-2/</loc>
		<lastmod>2019-08-22T07:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-prepare-for-data-breach-notifications-under-gdpr/</loc>
		<lastmod>2019-08-22T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/quick-hit-a-new-64-bit-swift-5-rswitch-app/</loc>
		<lastmod>2019-08-22T08:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/embrace-the-chaos-an-emerging-trend-in-software-engineering/</loc>
		<lastmod>2019-08-22T08:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/phish-testing-what-to-do-about-so-called-repeat-offenders-3/</loc>
		<lastmod>2019-08-22T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/inadequate-data-security-practices-come-with-serious-financial-consequences-for-canadian-businesses-2/</loc>
		<lastmod>2019-08-22T10:49:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/survey-84-of-security-pros-said-their-organizations-struggled-to-maintain-security-configurations-in-the-cloud/</loc>
		<lastmod>2019-08-22T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/domain-squatting-typosquatting-and-homograph-detection-with-soar/</loc>
		<lastmod>2019-08-22T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/domain-squatting-typosquatting-and-homograph-attacks/</loc>
		<lastmod>2019-08-22T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/domain-squatting-typosquatting-and-homograph-detection-with-swimlane/</loc>
		<lastmod>2019-08-22T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/veracode-now-available-on-the-digital-marketplace-g-cloud-uk/</loc>
		<lastmod>2019-08-22T11:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ransomware-to-pay-or-not-to-pay/</loc>
		<lastmod>2019-08-22T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-sneaky-threat-against-your-chrome-credentials/</loc>
		<lastmod>2019-08-22T13:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/anonymization-and-pseudonymization-of-personal-data/</loc>
		<lastmod>2019-08-22T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-engineer-resume-tips/</loc>
		<lastmod>2019-08-22T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-does-an-it-auditor-do/</loc>
		<lastmod>2019-08-22T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ics-protocols/</loc>
		<lastmod>2019-08-22T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-manually-deactivate-wordpress-plugins/</loc>
		<lastmod>2019-08-22T13:38:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/guest-essay-the-ethical-considerations-of-personal-privacy-viewed-as-a-human-right/</loc>
		<lastmod>2019-08-22T13:42:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rocking-it/</loc>
		<lastmod>2019-08-22T13:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-researcher-publicly-releases-second-steam-zero-day-after-being-banned-from-valves-bug-bounty-program/</loc>
		<lastmod>2019-08-22T14:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/github-now-supports-two-factor-authentication-with-security-keys-using-the-webauthn-api/</loc>
		<lastmod>2019-08-22T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-data-first-approach-to-security/</loc>
		<lastmod>2019-08-22T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-session-hijacking-your-quick-guide-to-session-hijacking-attacks/</loc>
		<lastmod>2019-08-22T15:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-matthew-shorts-using-network-miner-to-reconstruct-network-traffic/</loc>
		<lastmod>2019-08-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-hacker-certificate-how-fake-sites-are-taking-over-financial-services/</loc>
		<lastmod>2019-08-22T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/opt-out-is-out/</loc>
		<lastmod>2019-08-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-take-coping-with-security-risks-compliance-issues-spun-up-by-digital-transformation/</loc>
		<lastmod>2019-08-22T17:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fingerprinting-and-the-surveillance-economy-avast/</loc>
		<lastmod>2019-08-22T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/garry-kasparov-on-la-liga-and-privacy-avast/</loc>
		<lastmod>2019-08-22T17:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-thordis-thorsteins-vendor-data-science-buzzwords-hacked/</loc>
		<lastmod>2019-08-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-are-some-interesting-potential-career-paths-in-tech-and-cybersecurity-today/</loc>
		<lastmod>2019-08-22T18:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/triage-collection-and-timeline-generation-with-kape/</loc>
		<lastmod>2019-08-22T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/daniel-storis-sudo/</loc>
		<lastmod>2019-08-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/your-application-security-testing-tool-just-got-acquired-now-what/</loc>
		<lastmod>2019-08-22T19:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bec-attacks-how-ceos-and-executives-are-put-at-risk/</loc>
		<lastmod>2019-08-22T20:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/building-microservice-architecture-on-kubernetes/</loc>
		<lastmod>2019-08-22T20:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/2019-data-breaches-on-track-to-be-the-worst-year-2/</loc>
		<lastmod>2019-08-22T21:28:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/block-newly-registered-domains-to-reduce-security-threats-in-your-organisation/</loc>
		<lastmod>2019-08-22T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/visa-adds-new-security-capabilities-to-detect-fraud-and-disrupt-threats/</loc>
		<lastmod>2019-08-22T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/breach-at-hy-vee-supermarket-chain-tied-to-sale-of-5m-stolen-credit-debit-cards/</loc>
		<lastmod>2019-08-22T21:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-domain-expiration-can-potentially-disrupt-other-websites/</loc>
		<lastmod>2019-08-22T23:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/five-reasons-to-visit-the-clearswift-booth-at-billington-cybersecurity-summit-2/</loc>
		<lastmod>2019-08-23T08:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/beyond-group-policy-to-control-active-directory-accounts/</loc>
		<lastmod>2019-08-23T10:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-security-issue-in-the-net-http-library-of-the-go-language-affects-all-versions-and-all-components-of-kubernetes/</loc>
		<lastmod>2019-08-23T11:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/massachusetts-general-hospital-warns-of-privacy-incident/</loc>
		<lastmod>2019-08-23T12:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/50-valuable-pci-compliance-tips/</loc>
		<lastmod>2019-08-23T13:16:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/aws-security-monitoring-checklist/</loc>
		<lastmod>2019-08-23T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-javier-dominguez-automation-in-application-security/</loc>
		<lastmod>2019-08-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/whos-watching-the-criminal-enterprise-known-as-facebook-watch-you/</loc>
		<lastmod>2019-08-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-nina-fasels-my-first-program-a-pentesting-tool/</loc>
		<lastmod>2019-08-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/polyglot-fizzbuzz-in-r-plus-why-cant-johnny-code/</loc>
		<lastmod>2019-08-23T18:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-the-tragic-tale-of-the-richest-man-in-the-cemetery/</loc>
		<lastmod>2019-08-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/synopsys-adds-more-awards-to-its-2019-winning-streak/</loc>
		<lastmod>2019-08-23T19:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-news-commentary-implications-for-smbs/</loc>
		<lastmod>2019-08-23T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/agent-tesla-evading-edr-by-removing-api-hooks/</loc>
		<lastmod>2019-08-23T20:36:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/movie-tickets-service-exposed-customer-records-researchers-say-avast/</loc>
		<lastmod>2019-08-23T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/defending-against-hackings-long-game-it-aint-over-till-its-over/</loc>
		<lastmod>2019-08-24T00:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cisco-talos-researchers-disclose-eight-vulnerabilities-in-googles-nest-cam-iq-indoor-camera/</loc>
		<lastmod>2019-08-24T00:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/anatomy-of-the-rubygems-rest-client-hack-and-getting-creative-about-open-source-security/</loc>
		<lastmod>2019-08-24T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/success-requires-reflection-on-devsecops-failures/</loc>
		<lastmod>2019-08-24T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/facebook-transcribing-raises-concerns-avast/</loc>
		<lastmod>2019-08-24T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/def-con-27-early-release-panel-def-con-to-help-hackers-anonymously-submit-bugs-to-the-government/</loc>
		<lastmod>2019-08-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/daniel-storis-the-bad-design-punisher/</loc>
		<lastmod>2019-08-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/def-con-27-early-release-patrick-wardles-harnessing-weapons-of-mac-destruction/</loc>
		<lastmod>2019-08-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/los-angeles-court-charges-80-nigerians-with-bec-and-romance-scam-crimes/</loc>
		<lastmod>2019-08-24T20:08:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-top-cyber-security-trends-in-2019-and-what-to-expect-in-2020/</loc>
		<lastmod>2019-08-24T21:08:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/def-con-27-early-release-joe-grands-behind-the-scenes-of-the-def-con-27-badge/</loc>
		<lastmod>2019-08-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-my-overall-review-of-earth/</loc>
		<lastmod>2019-08-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/def-con-27-early-release-willcs-phreaking-elevators/</loc>
		<lastmod>2019-08-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-facebook-privacy-controls-apple-ios-patching-mistake-moviepass-data-breach/</loc>
		<lastmod>2019-08-26T04:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ibm-study-shows-data-breach-costs-on-the-rise/</loc>
		<lastmod>2019-08-26T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/canadas-recommendations-for-upholding-digital-security-in-the-financial-sector/</loc>
		<lastmod>2019-08-26T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-is-failing-time-for-a-reset/</loc>
		<lastmod>2019-08-26T10:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-shady-secrets-of-shadow-networks/</loc>
		<lastmod>2019-08-26T10:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-cloud-security-alliances-top-threats-to-cloud-computing/</loc>
		<lastmod>2019-08-26T10:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/trust-as-the-foundation-of-security/</loc>
		<lastmod>2019-08-26T10:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rswitch-1-4-0-released/</loc>
		<lastmod>2019-08-26T10:46:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/wrappers-delight/</loc>
		<lastmod>2019-08-26T10:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cyber-safety-for-students-the-back-to-school-edition/</loc>
		<lastmod>2019-08-26T11:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-four-pillars-of-casb-data-protection/</loc>
		<lastmod>2019-08-26T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/september-is-insider-threat-awareness-month/</loc>
		<lastmod>2019-08-26T13:32:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/nuclear-plant-workers-in-ukraine-caught-using-free-energy-to-mine-cryptocurrency/</loc>
		<lastmod>2019-08-26T13:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/best-vpn-services-for-android-users/</loc>
		<lastmod>2019-08-26T14:35:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-tech-nozomi-networks-tracks-anomalous-behaviors-finds-zero-day-ics-vulnerabilities/</loc>
		<lastmod>2019-08-26T14:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/fortinet-fully-supports-vmware-nsx-t-to-advance-security-for-software-defined-data-centers-and-the-cloud/</loc>
		<lastmod>2019-08-26T14:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-tech-ics-zero-day-flaws-uncovered-by-nozomi-networks-analysis-of-anomalous-behaviors/</loc>
		<lastmod>2019-08-26T15:26:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-most-organizations-still-cant-defend-against-dcshadow-part-2/</loc>
		<lastmod>2019-08-26T15:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/disruption-the-true-cost-of-an-industrial-cyber-security-incident/</loc>
		<lastmod>2019-08-26T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hostinger-resets-client-passwords-following-security-incident/</loc>
		<lastmod>2019-08-26T15:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-corey-forbes-aletheia-gpu-accelerated-file-carving/</loc>
		<lastmod>2019-08-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-sevillage-wrap-up-from-def-con-27/</loc>
		<lastmod>2019-08-26T16:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lessons-learned-from-federal-agency-cybersecurity-projects-2/</loc>
		<lastmod>2019-08-26T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webauthn-github/</loc>
		<lastmod>2019-08-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/types-of-rootkits/</loc>
		<lastmod>2019-08-26T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cost-of-a-data-breach-report-our-analysis/</loc>
		<lastmod>2019-08-26T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-engineer-certifications/</loc>
		<lastmod>2019-08-26T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-comparable-certifications-sscp-gsec/</loc>
		<lastmod>2019-08-26T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/rootkits-101/</loc>
		<lastmod>2019-08-26T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-become-a-cybersecurity-analyst/</loc>
		<lastmod>2019-08-26T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-sarah-kinghams-a-newbies-talk-on-mobile-dangers-through-the-looking-glass/</loc>
		<lastmod>2019-08-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/robert-m-lees-jeff-hass-little-bobby-comics-artificial-intelligence/</loc>
		<lastmod>2019-08-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/countdown-to-dfircon-2019/</loc>
		<lastmod>2019-08-26T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-identify-monitor-and-audit-vendors-on-your-network/</loc>
		<lastmod>2019-08-26T20:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/internet-cookies-what-are-they-and-are-they-good-or-bad/</loc>
		<lastmod>2019-08-26T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-provide-secure-access-to-aws-workloads/</loc>
		<lastmod>2019-08-27T02:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-next-step-in-end-to-end-encryption-introducing-encryptreduce/</loc>
		<lastmod>2019-08-27T07:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/7-current-mobile-security-threats-to-watch-out-for/</loc>
		<lastmod>2019-08-27T08:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apple-update-kills-ios-12-jailbreak/</loc>
		<lastmod>2019-08-27T11:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/three-reads-from-tech-analysts-to-keep-tabs-on-network-security-innovation/</loc>
		<lastmod>2019-08-27T11:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/building-your-first-incident-response-policy-a-practical-guide-for-beginners/</loc>
		<lastmod>2019-08-27T12:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/free-decryption-tool-released-for-syrk-ransomware/</loc>
		<lastmod>2019-08-27T12:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-emergence-of-denial-of-service-groups/</loc>
		<lastmod>2019-08-27T12:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/canadian-businesses-must-prioritise-security-or-risk-losing-customers/</loc>
		<lastmod>2019-08-27T13:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-employee-passwords-in-the-financial-services-industry/</loc>
		<lastmod>2019-08-27T13:47:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/starting-a-cybersecurity-career-with-a-degree-versus-certifications/</loc>
		<lastmod>2019-08-27T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/malware-spotlight-what-is-adware/</loc>
		<lastmod>2019-08-27T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-hiring-qualified-professionals-helps-offset-skill-shortages/</loc>
		<lastmod>2019-08-27T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/process-control-network-pcn-evolution/</loc>
		<lastmod>2019-08-27T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/simplifying-back-to-school-security-with-sd-wan-and-sd-branch/</loc>
		<lastmod>2019-08-27T14:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/survey-smbs-continue-to-struggle-with-it-security-due-to-budget-and-workforce-limitations/</loc>
		<lastmod>2019-08-27T16:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/thales-managed-services-program-honored-at-msp-innovation-awards/</loc>
		<lastmod>2019-08-27T15:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/before-the-breach-leveraging-pam-and-vpam-solutions-to-protect-privileged-credentials-2/</loc>
		<lastmod>2019-08-27T15:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-secure-your-content-management-system-cms/</loc>
		<lastmod>2019-08-27T15:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/should-you-be-measuring-flaw-rate/</loc>
		<lastmod>2019-08-27T15:53:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-10-uses-of-wireshark-for-hackers-part-ii/</loc>
		<lastmod>2019-08-27T15:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-renzon-cruz-forensicating-windows-artifacts-investigation-without-event-logs/</loc>
		<lastmod>2019-08-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/migrating-from-office-365-to-g-suite-tips-to-remember/</loc>
		<lastmod>2019-08-27T16:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/4-infamous-social-engineering-attacks-that-real-time-protection-would-have-stopped/</loc>
		<lastmod>2019-08-27T16:10:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/los-angeles-stories-of-the-bec-victims-part-2/</loc>
		<lastmod>2019-08-27T16:17:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-firm-imperva-discloses-breach/</loc>
		<lastmod>2019-08-27T16:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/mikko-hypponen-discusses-when-its-ok-to-response-to-a-cyber-attack-with-missiles/</loc>
		<lastmod>2019-08-27T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-well-ordering-principle/</loc>
		<lastmod>2019-08-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cybersecurity-tips-for-schools-avast/</loc>
		<lastmod>2019-08-27T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/introducing-the-black-duck-jira-cloud-integration/</loc>
		<lastmod>2019-08-27T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-simon-halls-usernames-the-missing-piece-the-osint-jigsaw-puzzle/</loc>
		<lastmod>2019-08-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/five-tips-on-how-testers-can-collaborate-with-software-developers/</loc>
		<lastmod>2019-08-27T18:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-business-challenges-and-opportunities-in-cybersecurity-black-hat-usa-2019-key-takeaways-by-michael-vaillancourt/</loc>
		<lastmod>2019-08-27T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cis-v7-what-you-need-to-know/</loc>
		<lastmod>2019-08-27T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/daniel-storis-warning-beware-of-dog/</loc>
		<lastmod>2019-08-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-to-autonomous-security-the-components-the-reality-and-what-you-can-do-today/</loc>
		<lastmod>2019-08-27T19:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/understanding-and-selecting-rasp-2019/</loc>
		<lastmod>2019-08-27T23:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/analyzing-techniques-used-in-hoplight-malware/</loc>
		<lastmod>2019-08-28T00:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-year-old-webmin-backdoor-revealed-at-def-con-2019-allowed-unauthenticated-attackers-to-execute-commands-with-root-privileges-on-servers/</loc>
		<lastmod>2019-08-28T01:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/moscows-blockchain-based-internet-voting-system-uses-an-encryption-scheme-that-can-be-easily-broken/</loc>
		<lastmod>2019-08-28T01:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-fill-the-cyber-skills-gap-in-todays-modern-workforce/</loc>
		<lastmod>2019-08-28T05:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-prevent-dom-based-cross-site-scripting/</loc>
		<lastmod>2019-08-28T06:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-a-reverse-shell/</loc>
		<lastmod>2019-08-28T06:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/penetration-testing-vs-vulnerability-scanning/</loc>
		<lastmod>2019-08-28T06:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-devsecops-and-how-should-it-work/</loc>
		<lastmod>2019-08-28T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/black-hat-usa-2019-highlights/</loc>
		<lastmod>2019-08-28T06:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-prevent-blind-sql-injections-the-basics/</loc>
		<lastmod>2019-08-28T06:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/visit-us-at-global-appsec-dc/</loc>
		<lastmod>2019-08-28T06:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/threat-modeling-for-web-application-security/</loc>
		<lastmod>2019-08-28T06:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cyber-threats-vulnerabilities-and-risks/</loc>
		<lastmod>2019-08-28T06:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/avast-works-with-france-and-us-to-stop-cryptomining-avast/</loc>
		<lastmod>2019-08-28T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-does-the-arrival-of-5g-technology-mean-for-the-world-of-gaming/</loc>
		<lastmod>2019-08-28T08:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-changing-of-the-guard-in-the-2019-gartner-epp-mq-and-why-bitdefender-moved-up/</loc>
		<lastmod>2019-08-28T10:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hackers-hit-virginia-school-district-days-before-school-year-starts/</loc>
		<lastmod>2019-08-28T10:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-myth-of-consumer-grade-security/</loc>
		<lastmod>2019-08-28T11:14:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cyber-security-and-the-finance-sector-the-need-for-stronger-data-protection-capabilities/</loc>
		<lastmod>2019-08-28T11:54:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/joint-effort-neutralized-over-850k-infections-of-retadup-worm/</loc>
		<lastmod>2019-08-28T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-do-corn-iot-and-college-have-in-common/</loc>
		<lastmod>2019-08-28T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/bricata-and-atlantic-data-forensics-formalize-strategic-partnership/</loc>
		<lastmod>2019-08-28T12:45:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/surveys-surprise-finding-only-half-of-organizations-believe-they-can-stop-cyber-attacks/</loc>
		<lastmod>2019-08-28T12:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/glass-class-protecting-unmanaged-device-access-to-cloud-apps/</loc>
		<lastmod>2019-08-28T12:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/understanding-how-the-internet-has-changed/</loc>
		<lastmod>2019-08-28T13:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-hysolate-mitigates-windows-7-end-of-life-issues/</loc>
		<lastmod>2019-08-28T14:41:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-cyber-incident-response-plan-for-your-web-applications/</loc>
		<lastmod>2019-08-28T14:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-new-tool-for-hackers-ai-in-cybersecurity/</loc>
		<lastmod>2019-08-28T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-5-ways-to-keep-your-workplace-safe-online/</loc>
		<lastmod>2019-08-28T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-ian-davies-the-definition-of-madness/</loc>
		<lastmod>2019-08-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ai-to-protect-both-humans-and-fruits-from-diseases/</loc>
		<lastmod>2019-08-28T16:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/degree-vs-certification-entry-level-cybersecurity-analyst/</loc>
		<lastmod>2019-08-28T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-11-incident-recovery-and-post-incident-response-process/</loc>
		<lastmod>2019-08-28T16:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ollydbg/</loc>
		<lastmod>2019-08-28T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-are-the-different-types-of-security-vulnerabilities/</loc>
		<lastmod>2019-08-28T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-fiddling-while-home-burns/</loc>
		<lastmod>2019-08-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/simple-rules-for-smart-iam-solutions/</loc>
		<lastmod>2019-08-28T17:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-cian-heasley-watching-the-watchers-the-stalkerware-surveillance-ecosystem/</loc>
		<lastmod>2019-08-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/alex-halderman-speaks-about-election-cybersecurity-at-cybersec-ai-prague-conference-avast/</loc>
		<lastmod>2019-08-28T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ccpa-and-the-future-of-data-privacy/</loc>
		<lastmod>2019-08-28T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/sonatype-users-reveal-the-benefits-of-automated-devsecops/</loc>
		<lastmod>2019-08-28T18:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-how-to-send-a-file/</loc>
		<lastmod>2019-08-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/video-off-fb-activity-edr-acquisition-browsers-privacy-stance/</loc>
		<lastmod>2019-08-28T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-to-improve-ecommerce-security/</loc>
		<lastmod>2019-08-28T20:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/securing-your-dynamic-cloud-strategy/</loc>
		<lastmod>2019-08-30T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/new-build-includes-support-for-opensearch-and-detects-vulnerabilities-in-oracle-bi-jira-apache-spark-and-python-code-injection/</loc>
		<lastmod>2019-08-28T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/trickbot-malware-of-the-month-august-2019/</loc>
		<lastmod>2019-08-29T00:57:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-new-perspective-on-digital-transformation-and-security/</loc>
		<lastmod>2019-08-29T00:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/multiple-wordpress-plugins-sql-injection-vulnerabilities/</loc>
		<lastmod>2019-08-29T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/10-year-anniversary-episode-with-kevin-johnson-and-jayson-e-street/</loc>
		<lastmod>2019-08-29T04:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/insider-threats-root-causes-and-mitigation-practices/</loc>
		<lastmod>2019-08-29T05:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/financial-services-state-of-software-security/</loc>
		<lastmod>2019-08-29T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-quarter-of-workers-spend-at-least-3-months-a-year-surfing-the-web-at-work/</loc>
		<lastmod>2019-08-29T09:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/reverse-taint-analysis-using-binary-ninja/</loc>
		<lastmod>2019-08-29T10:50:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/trash-taxi-taking-out-the-garbage-in-your-infrastructure/</loc>
		<lastmod>2019-08-29T13:56:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ex-amazon-worker-suspected-of-hacking-capital-one-faces-charges-of-breaching-30-other-companies-to-mine-cryptocurrency/</loc>
		<lastmod>2019-08-29T14:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-current-status/</loc>
		<lastmod>2019-08-29T14:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/degree-vs-certification-in-the-late-career-cybersecurity-analyst/</loc>
		<lastmod>2019-08-29T14:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cysa-domain-12-frameworks-policies-controls-and-procedures/</loc>
		<lastmod>2019-08-29T14:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/it-vs-ics/</loc>
		<lastmod>2019-08-29T14:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/gamers-beware-cyber-criminals-are-coming-for-you/</loc>
		<lastmod>2019-08-29T14:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/phishing-simulations-should-they-reflect-real-world-attacks/</loc>
		<lastmod>2019-08-29T14:55:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-a-cloud-transformation-must-include-multi-tenant-isolation/</loc>
		<lastmod>2019-08-29T14:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/lumber-liquidators-says-malware-attack-didnt-affect-sensitive-data/</loc>
		<lastmod>2019-08-29T14:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/increasing-female-leadership-in-technology/</loc>
		<lastmod>2019-08-29T15:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-jamie-ohares-bug-bounties-crowdsourcing-nosey-bastards/</loc>
		<lastmod>2019-08-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/emergency-preparedness-our-takeaways-from-the-nei-summit/</loc>
		<lastmod>2019-08-29T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/next-gen-access-and-zero-trust-are-the-pbj-of-security/</loc>
		<lastmod>2019-08-29T16:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/zonezero-can-prevent-further-lateral-movement-within-compromised-organizations/</loc>
		<lastmod>2019-08-29T16:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/pais-incompetence-leads-fcc-and-the-nation-down-flawed-path/</loc>
		<lastmod>2019-08-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/apples-1-million-bug-bounty-could-launch-arms-race-for-zero-days/</loc>
		<lastmod>2019-08-29T17:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/contrast-security-recognized-as-a-gartner-peer-insights-customers-choice-for-application-security-testing/</loc>
		<lastmod>2019-08-29T17:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ransomware-bites-dental-data-backup-firm/</loc>
		<lastmod>2019-08-29T17:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-luca-nagys-exploring-emotet-an-elaborate-everyday-enigma/</loc>
		<lastmod>2019-08-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/my-take-six-figure-gdpr-privacy-fines-reinforce-business-case-for-advanced-siem-ueba-tools/</loc>
		<lastmod>2019-08-29T18:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-your-road-warriors-from-cyber-hazards-2/</loc>
		<lastmod>2019-08-29T19:57:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/luke-kingma-and-lou-patrick-mackays-futurism-im-going-to-wait/</loc>
		<lastmod>2019-08-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-digital-big-bang-a-must-read-for-cisos-leading-security-innovation-in-the-digital-age/</loc>
		<lastmod>2019-08-29T19:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/tracking-down-a-big-phish/</loc>
		<lastmod>2019-08-29T19:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/kubesecops-kubernetes-security-practices-you-should-follow/</loc>
		<lastmod>2019-08-29T19:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/how-not-to-fail-a-penetration-test-before-you-even-begin/</loc>
		<lastmod>2019-08-29T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/in-the-face-of-a-ransomware-attack-can-your-defenses-prevail/</loc>
		<lastmod>2019-08-29T22:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/digital-signatures-why-you-should-sign-everything/</loc>
		<lastmod>2019-08-30T00:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/timthumb-attacks-the-scale-of-legacy-malware-infections/</loc>
		<lastmod>2019-08-30T01:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/red-flag-alert-service-accounts-performing-interactive-logins/</loc>
		<lastmod>2019-08-30T01:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/get-the-gum-off-of-your-cybersecurity-shoes/</loc>
		<lastmod>2019-08-30T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-paypal-scams-and-protection-tips/</loc>
		<lastmod>2019-08-30T04:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/protecting-valuable-personal-health-information-phi/</loc>
		<lastmod>2019-08-30T05:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-top-reason-businesses-make-a-cyber-insurance-claim-business-email-compromise/</loc>
		<lastmod>2019-08-30T07:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-consumers-guide-to-protecting-important-data-from-ransomware/</loc>
		<lastmod>2019-08-30T10:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/binary-symbolic-execution-with-klee-native/</loc>
		<lastmod>2019-08-30T10:50:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/attacking-the-intel-secure-enclave/</loc>
		<lastmod>2019-08-30T11:18:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/google-expands-scope-of-one-bug-bounty-program-launches-another/</loc>
		<lastmod>2019-08-30T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ethical-hackers-a-businesss-best-friend/</loc>
		<lastmod>2019-08-30T12:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-is-the-ccpa-and-who-must-comply-the-california-consumer-privacy-act-explained/</loc>
		<lastmod>2019-08-30T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/googles-bug-bounty-bid-to-make-big-android-apps-more-secure/</loc>
		<lastmod>2019-08-30T14:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/vpn-sites-being-spoofed-by-hackers-in-new-attacks/</loc>
		<lastmod>2019-08-30T15:37:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-jymit-khondhus-soc-it-up-common-frustrations-and-solutions-in-soc-teams-today/</loc>
		<lastmod>2019-08-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/phishers-are-angling-for-your-cloud-providers/</loc>
		<lastmod>2019-08-30T16:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/take-this-interactive-devsecops-reference-architecture-for-a-test-drive/</loc>
		<lastmod>2019-08-30T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/hoaxd/</loc>
		<lastmod>2019-08-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/understanding-and-selecting-rasp-2019-use-cases/</loc>
		<lastmod>2019-08-30T17:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-grant-colgans-hacking-rf-breaking-what-we-cant-see/</loc>
		<lastmod>2019-08-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/webinars-secure-your-ci-cd-pipelines-with-iast-and-synopsys-detect/</loc>
		<lastmod>2019-08-30T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/the-joy-of-tech-credit-cards-are-tracking-you/</loc>
		<lastmod>2019-08-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/alert-logic-researchers-uncover-new-campaign-exfiltrating-credentials-via-dns/</loc>
		<lastmod>2019-08-30T19:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/4-ways-to-integrate-cyber-security-automation-within-your-enterprise/</loc>
		<lastmod>2019-08-30T20:24:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/irs-alerts-public-to-tax-reminder-phishing-scam-avast/</loc>
		<lastmod>2019-08-30T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/retadup-a-malicious-worm-infecting-850k-windows-machines-self-destructs-in-a-joint-effort-by-avast-and-the-french-police/</loc>
		<lastmod>2019-08-30T22:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/visibility-and-the-importance-of-a-single-source-of-truth/</loc>
		<lastmod>2019-08-30T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ransomware-attacks-rising-against-many-cities-striking-local-governments-school-campuses/</loc>
		<lastmod>2019-08-31T01:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/this-week-in-cybersecurity-august-30/</loc>
		<lastmod>2019-08-31T05:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/thread-on-network-input-parsers/</loc>
		<lastmod>2019-08-31T14:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/thread-on-the-osi-model-is-a-lie/</loc>
		<lastmod>2019-08-31T14:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/5-top-local-administrator-password-solution-laps-tips/</loc>
		<lastmod>2019-08-31T15:43:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-ben-turners-doug-mcleods-rob-maslens-powershell-is-dead-epic-learnings/</loc>
		<lastmod>2019-08-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/xkcd-dockless-roombas/</loc>
		<lastmod>2019-08-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/security-bsides-london-2019-mathew-evans-and-jack-whitter-jones-the-little-phone-that-could-ch-ch-chroot/</loc>
		<lastmod>2019-08-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/rswitch-1-4-1-released/</loc>
		<lastmod>2019-09-01T14:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-wietze-beukemas-the-imitation-game-emulating-attackers/</loc>
		<lastmod>2019-09-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/robert-m-lees-jeff-hass-little-bobby-comics-gapped/</loc>
		<lastmod>2019-09-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-alex-archondakis-spear-phishing-from-linkedin-to-loggedin/</loc>
		<lastmod>2019-09-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/android-ghost-click-apps-new-apple-siri-privacy-protections-credit-card-spying/</loc>
		<lastmod>2019-09-02T04:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/innfirat-a-new-rat-aiming-for-your-cryptocurrency-and-more/</loc>
		<lastmod>2019-09-02T06:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/rewriting-functions-in-compiled-binaries/</loc>
		<lastmod>2019-09-02T10:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-human-element-of-cybersecurity-careers/</loc>
		<lastmod>2019-09-02T10:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/every-hour-socs-run-15-minutes-are-wasted-on-false-positives/</loc>
		<lastmod>2019-09-02T10:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/nozomi-networks-cyber-security-solution-embedded-in-ruggedcom/</loc>
		<lastmod>2019-09-02T11:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/http-request-smuggling-detections/</loc>
		<lastmod>2019-09-02T14:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cyber-security-roundup-for-august-2019/</loc>
		<lastmod>2019-09-02T13:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vetctap-joins-as-a-fortinet-network-security-academy/</loc>
		<lastmod>2019-09-02T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-stuart-mcmurrays-offensive-pcap/</loc>
		<lastmod>2019-09-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digital-kazakhstan-addressing-the-global-cyber-challenge/</loc>
		<lastmod>2019-09-02T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/marforcyber-and-the-marine-corps-cyber-auxiliary/</loc>
		<lastmod>2019-09-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-the-beer-farmers-we-take-your-security-seriously-or-do-we/</loc>
		<lastmod>2019-09-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/government-in-the-middle-and-its-consequences/</loc>
		<lastmod>2019-09-02T18:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/enjoy-labor-day-2019-honoring-125-years-of-labor-day-1894-2019/</loc>
		<lastmod>2019-09-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/feds-allege-adconion-employees-hijacked-ip-addresses-for-spamming/</loc>
		<lastmod>2019-09-02T20:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cryptographic-key-of-facebooks-free-basics-app-has-been-compromised/</loc>
		<lastmod>2019-09-02T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-cryptocurrency-mining-malware/</loc>
		<lastmod>2019-09-02T23:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/taming-the-jungle-hardening-your-aws-infrastructure/</loc>
		<lastmod>2019-09-03T01:10:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-hsms-are-different-than-safes/</loc>
		<lastmod>2019-09-03T06:35:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-uk-finance-companies-invest-their-cyber-security-budget-2/</loc>
		<lastmod>2019-09-03T08:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/steps-to-make-your-website-gdpr-compliant/</loc>
		<lastmod>2019-09-03T08:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/deepstate-now-supports-ensemble-fuzzing/</loc>
		<lastmod>2019-09-03T10:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cybersecurity-case-study-securely-integrating-a-business-network-after-a-merger-and-acquisition/</loc>
		<lastmod>2019-09-03T11:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/moving-to-the-cloud-be-ready-to-embrace-complexity/</loc>
		<lastmod>2019-09-03T11:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/where-cybersecurity-frameworks-meet-web-security/</loc>
		<lastmod>2019-09-03T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/social-engineer-newsletter-vol-09-issue-120/</loc>
		<lastmod>2019-09-03T12:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/veracode-customers-improve-mean-time-to-remediation-by-90/</loc>
		<lastmod>2019-09-03T12:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/deobfuscating-ostap-trickbots-34000-line-javascript-downloader/</loc>
		<lastmod>2019-09-03T13:01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whats-all-the-talk-about-talktalk/</loc>
		<lastmod>2019-09-03T13:21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tips-for-kicking-off-your-veracode-security-program-manager-relationship/</loc>
		<lastmod>2019-09-03T14:07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hackers-breach-it-vendor-shared-by-400-medical-practices-infecting-every-office-with-ransomware/</loc>
		<lastmod>2019-09-03T14:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/krypton-stealer-kryptonite-for-credentials/</loc>
		<lastmod>2019-09-03T14:27:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/arttificial-intelligence-will-be-used-for-discovering-new-medicine/</loc>
		<lastmod>2019-09-03T14:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-internets-first-smart-device-avast/</loc>
		<lastmod>2019-09-03T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/does-jack-dorseys-twitter-account-hack-mean-two-factor-authentication-is-waste-of-time/</loc>
		<lastmod>2019-09-03T15:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-lorenzo-cavallaros-when-the-magic-wears-off-flaws-in-ml-for-security-evaluations/</loc>
		<lastmod>2019-09-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/scaling-up-and-automating-web-application-security/</loc>
		<lastmod>2019-09-03T16:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/gdpr-password-policy-critical-components/</loc>
		<lastmod>2019-09-03T16:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-prevent-office-365-account-lockouts/</loc>
		<lastmod>2019-09-03T16:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/big-cable-to-oppose-robocalling-regulations/</loc>
		<lastmod>2019-09-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-jamie-ridens-password-cracking-the-first-500-million/</loc>
		<lastmod>2019-09-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/software-quality-it-can-be-a-matter-of-life-and-death/</loc>
		<lastmod>2019-09-03T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/devops-as-a-service-overcoming-challenges-in-large-organizations/</loc>
		<lastmod>2019-09-03T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/spam-in-your-calendar-heres-what-to-do/</loc>
		<lastmod>2019-09-03T18:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/as-the-worlds-of-mobile-and-computer-collide-tcg-and-globalplatform-are-working-together-to-enable-smart-security-solutions/</loc>
		<lastmod>2019-09-03T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-a-letter-to-future-generations/</loc>
		<lastmod>2019-09-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/protect-your-property-3-reasons-real-estate-companies-are-investing-in-cybersecurity/</loc>
		<lastmod>2019-09-03T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/four-key-customer-journeys-for-virtual-banks/</loc>
		<lastmod>2019-09-03T20:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/three-ways-for-healthcare-to-handle-cyber-threats/</loc>
		<lastmod>2019-09-03T21:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/do-you-have-what-it-takes-to-prevent-ransomware/</loc>
		<lastmod>2019-09-03T21:16:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/its-not-too-late-heres-everything-you-need-for-cybersecurity-awareness-month/</loc>
		<lastmod>2019-09-03T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/credential-management-and-enforcement-for-ics-scada-environments/</loc>
		<lastmod>2019-09-03T21:58:33+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->