<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/09/cysa-maintaining-employee-skill-level/</loc>
		<lastmod>2019-09-03T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/should-you-take-the-ccsp-sscp-before-the-cissp/</loc>
		<lastmod>2019-09-03T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/8-ways-to-improve-your-organizations-security-posture/</loc>
		<lastmod>2019-09-03T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/abcs-of-ueba-k-is-for-known/</loc>
		<lastmod>2019-09-03T23:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cybercrime-when-consumers-feel-like-victims-operators-come-to-the-rescue/</loc>
		<lastmod>2019-09-04T01:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/satori-iot-botnet-operator-pleads-guilty/</loc>
		<lastmod>2019-09-04T04:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/strong-customer-authentication-a-vehicle-for-pci-dss-compliance/</loc>
		<lastmod>2019-09-04T06:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-modern-skills-for-modern-cisos/</loc>
		<lastmod>2019-09-04T06:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cloudfest-london-2019/</loc>
		<lastmod>2019-09-04T09:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/canada-com-feature-study-says-businesses-stand-to-lose-20-of-sales-revenue-forever-after-a-hack/</loc>
		<lastmod>2019-09-04T09:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/speeding-it-visibility-into-ot-new-integrations-with-fortinet/</loc>
		<lastmod>2019-09-04T11:55:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-defcon-2019-where-is-quantum/</loc>
		<lastmod>2019-09-04T12:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/website-file-changes-monitor-1-3-ux-improvements/</loc>
		<lastmod>2019-09-04T13:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/targeted-attacks-with-public-tools/</loc>
		<lastmod>2019-09-04T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/se-labs-annual-report-2019/</loc>
		<lastmod>2019-09-04T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-buyers-guide-to-bot-management/</loc>
		<lastmod>2019-09-04T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ceo-voice-deepfake-blamed-for-scam-that-stole-243000/</loc>
		<lastmod>2019-09-04T13:41:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/discovering-malicious-packages-published-on-npm/</loc>
		<lastmod>2019-09-04T14:35:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-address-pci-dss-requirement-6-6-a-two-for-one-solution-from-threat-stack/</loc>
		<lastmod>2019-09-04T14:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/phishing-campaign-used-sharepoint-to-bypass-email-perimeter-tech/</loc>
		<lastmod>2019-09-04T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/goodbye-xss-auditor/</loc>
		<lastmod>2019-09-04T15:58:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-elaheh-samanis-you-wont-even-know-its-recording-you/</loc>
		<lastmod>2019-09-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/it-support-in-higher-education/</loc>
		<lastmod>2019-09-04T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/accelerating-your-cloud-security-strategy-without-compromising-protection/</loc>
		<lastmod>2019-09-04T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/devsecops-chaos-engineering-knowing-the-unknown/</loc>
		<lastmod>2019-09-04T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dhs-stored-bioterrorism-data-on-unsecured-servers/</loc>
		<lastmod>2019-09-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-history-of-human-identity-in-pictures-part-3-2/</loc>
		<lastmod>2019-09-04T17:17:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-thomas-cappettas-cyberrange-an-open-source-offensive-security-lab-in-aws/</loc>
		<lastmod>2019-09-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/chain-heist-and-blockchain-security-at-def-con-2019/</loc>
		<lastmod>2019-09-04T18:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/are-dark-web-monitoring-services-worth-it/</loc>
		<lastmod>2019-09-04T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bootcamp-training-vs-self-paced-training-for-enterprises/</loc>
		<lastmod>2019-09-04T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cysa-domain-13-security-architecture-review-and-compensating-controls/</loc>
		<lastmod>2019-09-04T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/common-malware-behavior/</loc>
		<lastmod>2019-09-04T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-nice-to-e-meet-you/</loc>
		<lastmod>2019-09-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shared-intel-mobile-apps-are-riddled-with-security-flaws-many-of-which-go-unremediated/</loc>
		<lastmod>2019-09-04T19:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/manage-vendors-efficiently-top-features-for-remote-access-software/</loc>
		<lastmod>2019-09-04T21:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tripwire-patch-priority-index-for-august-2019/</loc>
		<lastmod>2019-09-04T22:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-do-you-know-if-youre-ready-for-soar/</loc>
		<lastmod>2019-09-05T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/deepfake-voice-fraud-causes-243000-scam-avast/</loc>
		<lastmod>2019-09-05T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/over-47k-supermicro-servers-bmcs-are-prone-to-usbanywhere-a-remote-virtual-media-vulnerability/</loc>
		<lastmod>2019-09-05T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-people-problem-and-managed-security-services/</loc>
		<lastmod>2019-09-05T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/survey-reveals-kubernetes-usage-skyrocketing-but-security-concerns-remain/</loc>
		<lastmod>2019-09-05T04:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/overview-of-nist-800-171b-33-enhanced-security-requirements-to-help-protect-dod-contractors/</loc>
		<lastmod>2019-09-05T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/funkybot-a-new-android-malware-family-targeting-japan/</loc>
		<lastmod>2019-09-05T05:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/famous-insider-threat-cases-insider-threat-awareness-month/</loc>
		<lastmod>2019-09-05T05:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/highlights-from-the-ncipher-2019-south-korea-encryption-trends-study/</loc>
		<lastmod>2019-09-05T07:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-an-expert-how-to-start-and-advance-your-cybersecurity-career-2/</loc>
		<lastmod>2019-09-05T07:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/7-sophisticated-cyber-attacks-that-are-growing-in-2019/</loc>
		<lastmod>2019-09-05T08:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/pci-pal-shortlisted-for-further-industry-awards/</loc>
		<lastmod>2019-09-05T09:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-a-data-breach/</loc>
		<lastmod>2019-09-05T11:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-gang-demands-5-3-million-from-new-bedford-city-restores-from-backup-instead/</loc>
		<lastmod>2019-09-05T11:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-attackers-demanded-5-3m-from-city-of-new-bedford/</loc>
		<lastmod>2019-09-05T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bitglass-security-spotlight-google-issues-warning-for-2-billion-users/</loc>
		<lastmod>2019-09-05T11:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/urgent-11-new-ics-threat-signatures-by-nozomi-networks-labs/</loc>
		<lastmod>2019-09-05T11:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-view-into-the-challenge-of-digital-risk/</loc>
		<lastmod>2019-09-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/successful-digital-transformation-is-in-the-execution/</loc>
		<lastmod>2019-09-05T13:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/interview-with-ivica-delic-on-wordpress-professionals-security/</loc>
		<lastmod>2019-09-05T13:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-can-akamai-identity-cloud-help-with-regulatory-compliance/</loc>
		<lastmod>2019-09-05T14:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hundreds-of-millions-of-facebook-users-phone-numbers-found-lying-around-on-the-internet/</loc>
		<lastmod>2019-09-05T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-social-media-is-increasingly-abused-for-phishing-attacks/</loc>
		<lastmod>2019-09-05T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/emerging-security-challenges-for-europes-emerging-technologies/</loc>
		<lastmod>2019-09-05T14:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-simple-bot-management-techniques/</loc>
		<lastmod>2019-09-05T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/improving-devsecops-at-the-gsa/</loc>
		<lastmod>2019-09-05T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/law-firms-need-to-prioritize-privilege-to-protect-client-information/</loc>
		<lastmod>2019-09-05T15:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-top-five-cybersecurity-issues-trending-in-2019/</loc>
		<lastmod>2019-09-05T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/avast-finds-child-trackers-unsecured-from-hackers-avast/</loc>
		<lastmod>2019-09-05T15:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-terry-bishops-inside-magecart-their-web-skimming-tactics-revealed/</loc>
		<lastmod>2019-09-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/kubernetes-pentest-methodology-part-2/</loc>
		<lastmod>2019-09-05T16:08:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hipaa-compliance-checklist/</loc>
		<lastmod>2019-09-05T16:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/software-security-program-checklist-kick-off-your-program-with-a-bang/</loc>
		<lastmod>2019-09-05T16:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-look-at-the-first-big-gdpr-fines/</loc>
		<lastmod>2019-09-05T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fincen-bec-attacks-report-analysis/</loc>
		<lastmod>2019-09-05T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bootcamp-training-vs-self-paced-online-training-a-comparison-for-potential-students/</loc>
		<lastmod>2019-09-05T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ics-scada-security-specialist-technician-role/</loc>
		<lastmod>2019-09-05T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-user-forum-data-breach/</loc>
		<lastmod>2019-09-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/pulling-back-the-curtain-on-rasp/</loc>
		<lastmod>2019-09-05T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-john-shiers-closed-for-business-taking-down-darknet-markets/</loc>
		<lastmod>2019-09-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cisos-say-cyberattacks-are-outpacing-their-defenses/</loc>
		<lastmod>2019-09-05T18:22:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/data-breach-costs-continue-to-soar/</loc>
		<lastmod>2019-09-05T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/flaw-allows-phony-provisioning-alerts-on-androids-avast/</loc>
		<lastmod>2019-09-05T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digital-kazakhstan-addressing-the-global-cyberchallenge/</loc>
		<lastmod>2019-09-05T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/luke-kingma-and-lou-patrick-mackays-futurism-romeo-and-juliets-wifi/</loc>
		<lastmod>2019-09-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/dont-just-measure-and-report-security-effectiveness-by-mark-bagley/</loc>
		<lastmod>2019-09-05T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/throwback-threat-thursday-joomla-googlemaps-plugin-seo-spam-injection/</loc>
		<lastmod>2019-09-05T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/20-surprising-iot-statistics-you-dont-already-know/</loc>
		<lastmod>2019-09-05T21:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/2019-cloud-and-disaster-recovery-survey-3-key-takeaways/</loc>
		<lastmod>2019-09-05T23:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/circleci-reports-of-a-security-breach-and-malicious-database-in-a-third-party-vendor-account/</loc>
		<lastmod>2019-09-06T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hundreds-of-millions-of-facebook-users-phone-numbers-found-online-thanks-to-an-exposed-server-techcrunch-reports/</loc>
		<lastmod>2019-09-06T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/espressif-iot-devices-susceptible-to-wifi-vulnerabilities-can-allow-hijackers-to-crash-devices-connected-to-enterprise-networks/</loc>
		<lastmod>2019-09-06T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/video-osquery-and-8-macos-security-best-practices/</loc>
		<lastmod>2019-09-06T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dont-let-your-analysts-become-the-latest-victims-of-burnout/</loc>
		<lastmod>2019-09-06T05:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/defense-in-focus-with-new-technology-comes-new-risk/</loc>
		<lastmod>2019-09-06T08:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/defence-in-focus-with-new-technology-comes-new-risk/</loc>
		<lastmod>2019-09-06T08:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/exciting-use-cases-of-artificial-intelligence-in-four-industry-sectors/</loc>
		<lastmod>2019-09-06T09:09:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-doghouse-crown-sterling/</loc>
		<lastmod>2019-09-06T13:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/data-extraction-to-command-execution-csv-injection/</loc>
		<lastmod>2019-09-06T14:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-top-vendor-management-processes-to-automate-3/</loc>
		<lastmod>2019-09-06T14:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/championing-visibility-and-reducing-uncertainty-with-effective-product-design/</loc>
		<lastmod>2019-09-06T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-kevin-millwoods-and-jessica-barkers-they-are-the-champions/</loc>
		<lastmod>2019-09-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/webinar-bring-container-security-into-openshift-with-synopsys-operator/</loc>
		<lastmod>2019-09-06T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/my-take-how-advanced-automation-of-threat-intel-sharing-has-quickened-incident-response/</loc>
		<lastmod>2019-09-06T16:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-the-facebook-like-button-doesnt-like-whats-coming/</loc>
		<lastmod>2019-09-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-war-no-one-is-talking-about/</loc>
		<lastmod>2019-09-06T17:23:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-should-stop-being-a-drag/</loc>
		<lastmod>2019-09-06T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/unalaska-recovers-2-3-million-following-phishing-attack/</loc>
		<lastmod>2019-09-06T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-paul-schwarzenbergers-aws-vs-azure-security/</loc>
		<lastmod>2019-09-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/exposed-facebook-server-leaks-419m-records-avast/</loc>
		<lastmod>2019-09-06T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-game-show/</loc>
		<lastmod>2019-09-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/evaluating-elements-of-an-effective-endpoint-security-strategy/</loc>
		<lastmod>2019-09-06T20:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-endpoint-detection-and-response/</loc>
		<lastmod>2019-09-06T22:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/this-week-in-cybersecurity-september-6/</loc>
		<lastmod>2019-09-06T22:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/preparation-requires-prioritizing-threats/</loc>
		<lastmod>2019-09-07T00:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-are-you-removing-website-identity-google-and-mozilla/</loc>
		<lastmod>2019-09-07T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/idaptive-release-19-5-is-now-available/</loc>
		<lastmod>2019-09-07T14:02:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-olga-zilberbergs-understanding-stress-anxiety-and-depression-and-how-to-cope/</loc>
		<lastmod>2019-09-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/luke-kingmas-lou-patrick-mackays-futurism-hey-al/</loc>
		<lastmod>2019-09-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-chester-wisniewskis-a-safer-way-to-pay-comparing-the-security-integrity-of-21st-century-payment-systems/</loc>
		<lastmod>2019-09-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/massive-iphone-hack-targets-uyghurs/</loc>
		<lastmod>2019-09-07T20:31:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-digital-cyber-security-paradox/</loc>
		<lastmod>2019-09-07T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/megacortex-malware-strikes-business-networks-does-damage-both-as-ransomware-and-disk-wiper/</loc>
		<lastmod>2019-09-08T04:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/proxmox-container-with-debian-10-does-not-work-after-upgrade/</loc>
		<lastmod>2019-09-08T13:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/determinants-of-success-in-tomorrows-ultra-connected-world/</loc>
		<lastmod>2019-09-08T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/csps-have-a-chance-to-address-consumer-iot-security-needs/</loc>
		<lastmod>2019-09-08T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-chloe-messdaghis-fixing-the-internets-auto-immune-problem/</loc>
		<lastmod>2019-09-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/robert-m-lees-jeff-hass-little-bobby-comics-thats-odd/</loc>
		<lastmod>2019-09-08T17:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-bsides-london-2019-the-bsides-crews-closing-remarks/</loc>
		<lastmod>2019-09-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-firefox-privacy-protections-apple-ios-zero-days-facebook-user-phone-numbers-exposed/</loc>
		<lastmod>2019-09-09T04:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dont-trade-convenience-for-security-protect-the-providence-of-your-work/</loc>
		<lastmod>2019-09-09T04:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/real-estate-wire-fraud-has-devastating-effects/</loc>
		<lastmod>2019-09-09T05:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/from-hacker-to-lawyer-an-expert-in-cybersecurity-law/</loc>
		<lastmod>2019-09-09T07:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/all-for-one-and-one-for-all/</loc>
		<lastmod>2019-09-09T10:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/understanding-and-selecting-rasp-2019-technology/</loc>
		<lastmod>2019-09-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/akamai-and-exceda-maximizing-customer-and-partner-value-in-latin-america-together/</loc>
		<lastmod>2019-09-09T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/akamai-y-exceda-maximizar-en-conjunto-el-valor-de-clientes-y-socios-de-america-latina/</loc>
		<lastmod>2019-09-09T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-four-pillars-of-casb-threat-protection/</loc>
		<lastmod>2019-09-09T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fake-paypal-website-distributes-new-variant-of-nemty-ransomware/</loc>
		<lastmod>2019-09-09T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/akamai-e-exceda-maximizando-juntas-o-valor-do-cliente-e-do-parceiro-na-america-latina/</loc>
		<lastmod>2019-09-09T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-top-tools-for-threat-hunters-from-black-hat-usa-2019/</loc>
		<lastmod>2019-09-09T12:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hack-the-box-htb-machines-walkthrough-series-waldo/</loc>
		<lastmod>2019-09-09T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/biggest-data-breaches-of-2019-so-far/</loc>
		<lastmod>2019-09-09T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/7-most-common-application-backdoors/</loc>
		<lastmod>2019-09-09T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/passwordless-authentication-for-email/</loc>
		<lastmod>2019-09-09T13:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/disrupt-or-be-disrupted-the-power-of-the-disruptive-economy/</loc>
		<lastmod>2019-09-09T14:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wikipedia-and-world-of-warcraft-classic-targeted-by-ddos-attacks/</loc>
		<lastmod>2019-09-09T14:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/pci-compliance-through-the-years/</loc>
		<lastmod>2019-09-09T14:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-three-rs-of-software-supply-chains-reject-replace-and-respond/</loc>
		<lastmod>2019-09-09T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sd-wan-vs-mpls-why-sd-wan-is-a-better-choice-in-2019/</loc>
		<lastmod>2019-09-09T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/americans-dont-want-their-tax-dollars-paying-off-ransomware-crooks/</loc>
		<lastmod>2019-09-09T15:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bridging-the-cybersecurity-talent-and-skills-gap/</loc>
		<lastmod>2019-09-09T15:37:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-elie-burszteins-rethinking-the-detection-of-child-sexual-abuse-imagery-on-the-internet/</loc>
		<lastmod>2019-09-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/access-control-models-for-ics-scada-environments/</loc>
		<lastmod>2019-09-09T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/secret-service-investigates-breach-at-u-s-govt-it-contractor/</loc>
		<lastmod>2019-09-09T16:47:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/there-are-no-backups/</loc>
		<lastmod>2019-09-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/remediating-misconfigurations-to-keep-your-cloud-out-of-the-news-2/</loc>
		<lastmod>2019-09-09T17:06:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-experts-whats-the-top-security-risk-during-cloud-migration/</loc>
		<lastmod>2019-09-09T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wikipedia-hit-by-massive-ddos-distributed-denial-of-service-attack-goes-offline-in-many-countries/</loc>
		<lastmod>2019-09-09T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/exim-patches-a-major-security-bug-found-in-all-versions-that-left-millions-of-exim-servers-vulnerable-to-security-attacks/</loc>
		<lastmod>2019-09-09T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-bug-found-in-glibc-limits-modern-simd-instructions-to-only-intel-inhibiting-performance-of-amd-and-other-cpus/</loc>
		<lastmod>2019-09-09T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/healthcare-providers-can-improve-their-third-party-vendor-management-2/</loc>
		<lastmod>2019-09-09T17:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/newly-discovered-infostealer-attack-uses-lokibot/</loc>
		<lastmod>2019-09-09T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-anjana-rajans-callisto-a-cryptographic-approach-to-metoo/</loc>
		<lastmod>2019-09-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/11-ways-employees-can-be-your-weak-link-for-cybersecurity/</loc>
		<lastmod>2019-09-09T18:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/innovation-identity-and-ice-cream-how-idaptive-is-fueling-worldwide-collaboration-for-shiseido/</loc>
		<lastmod>2019-09-09T18:57:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-cryptic-wifi-networks/</loc>
		<lastmod>2019-09-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/forallsecure-uncovers-vulnerability-in-netflix-dial-software/</loc>
		<lastmod>2019-09-09T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-audit-cleanup-wordpress-plugins-themes/</loc>
		<lastmod>2019-09-10T01:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/authentication-chapters-online/</loc>
		<lastmod>2019-09-10T01:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bluekeep-exploit-code-released-blocked-by-hypervisor-introspection/</loc>
		<lastmod>2019-09-10T02:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/us-government-institutions-become-hot-target-for-ransomware-operators-in-2019/</loc>
		<lastmod>2019-09-10T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/top-inherent-risks-with-cloud-security/</loc>
		<lastmod>2019-09-10T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/integrating-security-to-devops-fundamental-principles-are-crucial/</loc>
		<lastmod>2019-09-10T03:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-of-the-most-significant-ransomware-attacks-of-all-time/</loc>
		<lastmod>2019-09-10T03:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-will-be-your-decisive-moment-to-secure-your-cloud-applications-in-a-zero-trust-world/</loc>
		<lastmod>2019-09-10T07:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/iot-and-the-cloud-friends-for-life/</loc>
		<lastmod>2019-09-10T08:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/flashlight-apps-on-google-play-request-up-to-77-permissions-avast-finds-avast/</loc>
		<lastmod>2019-09-10T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cybercriminals-count-on-human-interaction-in-99-of-attacks-research-shows/</loc>
		<lastmod>2019-09-10T10:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-cripples-internet-and-phone-lines-at-rockford-public-schools-district/</loc>
		<lastmod>2019-09-10T10:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/district-in-rockford-public-schools-confirms-ransomware-attack/</loc>
		<lastmod>2019-09-10T10:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-benefits-characteristics-and-components-of-flyaway-kits-for-incident-response/</loc>
		<lastmod>2019-09-10T11:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-cloud-application-security-best-practices/</loc>
		<lastmod>2019-09-10T11:09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/experts-weigh-in-the-digital-risk-challenges-of-a-smart-city/</loc>
		<lastmod>2019-09-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/where-in-the-world-is-peter-carlisle-2019-travel-milestones-to-date/</loc>
		<lastmod>2019-09-10T12:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/if-you-have-any-of-these-24-android-apps-installed-delete-them-now/</loc>
		<lastmod>2019-09-10T13:38:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/pci-pal-announced-as-emea-appfoundry-partner-of-the-year-at-genesys-g-summit-europe/</loc>
		<lastmod>2019-09-10T13:54:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ten-application-security-terms-that-every-developer-should-know/</loc>
		<lastmod>2019-09-10T13:55:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/september-is-insider-threat-awareness-month-are-you-ready/</loc>
		<lastmod>2019-09-10T13:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-steps-to-prepare-for-a-ddos-attack/</loc>
		<lastmod>2019-09-10T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/everything-you-need-to-know-about-the-aadhaar-data-vault/</loc>
		<lastmod>2019-09-10T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/youtube-and-google-fined-170-million-for-coppa-violations-ftc-to-investigate-youtube-channels-next/</loc>
		<lastmod>2019-09-10T14:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sim-swap-and-its-effects-on-sms-based-authentication/</loc>
		<lastmod>2019-09-10T15:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-tech-baffin-bay-networks-takes-a-cloud-first-approach-to-securing-web-applications/</loc>
		<lastmod>2019-09-10T15:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ryan-lackeys-hardware-security-modules-the-ultimate-black-boxes/</loc>
		<lastmod>2019-09-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/3-cyber-security-tips-for-small-business-owners/</loc>
		<lastmod>2019-09-10T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-here-comes-2020/</loc>
		<lastmod>2019-09-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/8-must-haves-that-todays-security-policies-need-to-include/</loc>
		<lastmod>2019-09-10T17:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-compass-sd-elements-platform-to-maintain-a-steady-state-of-compliance-and-audit-readiness-with-latest-release/</loc>
		<lastmod>2019-09-10T17:42:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dns-protection-a-must-in-security-solutions-for-any-company/</loc>
		<lastmod>2019-09-10T17:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/reverse-engineering-c/</loc>
		<lastmod>2019-09-10T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/malware-what-are-trojans/</loc>
		<lastmod>2019-09-10T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/degree-vs-certification-entry-level-it-auditor/</loc>
		<lastmod>2019-09-10T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cysa-domain-15-implementing-security-best-practices-in-the-software-development-life-cycle/</loc>
		<lastmod>2019-09-10T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/meet-fortinet-at-oracle-openworld-2019-and-learn-about-our-dynamic-cloud-security/</loc>
		<lastmod>2019-09-10T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-cynthia-sturtons-hardware-is-the-new-software-finding-exploitable-bugs-in-hardware-designs/</loc>
		<lastmod>2019-09-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-pentagon-9-11-memorial/</loc>
		<lastmod>2019-09-10T19:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/understanding-ccpa-its-time-to-action-a-plan-for-compliance/</loc>
		<lastmod>2019-09-10T19:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/patch-tuesday-september-2019-edition/</loc>
		<lastmod>2019-09-10T20:09:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/awash-in-regulations-companies-struggle-with-compliance/</loc>
		<lastmod>2019-09-10T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ios-location-mapping-with-apollo-part-1-i-know-where-you-were-today-yesterday-last-month-and-years-ago/</loc>
		<lastmod>2019-09-10T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-benefits-of-integrating-sonatypes-nexus-iq-server-with-your-ide/</loc>
		<lastmod>2019-09-10T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whos-listening-when-voice-assistants-invade-your-privacy/</loc>
		<lastmod>2019-09-10T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/another-local-privilege-escalation-vulnerability-using-process-creation-impersonation/</loc>
		<lastmod>2019-09-10T22:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vert-threat-alert-september-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-09-10T22:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/enzoic-continues-to-grow-with-appointment-of-new-marketing-director/</loc>
		<lastmod>2019-09-10T23:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/finding-the-balance-with-windows-local-administrator-rights/</loc>
		<lastmod>2019-09-11T02:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-the-isa-iec-62443-framework/</loc>
		<lastmod>2019-09-11T03:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/launch-of-web-preveil-beta/</loc>
		<lastmod>2019-09-11T06:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/politicians-dont-understand-cybersecurity-say-82-of-it-security-professionals/</loc>
		<lastmod>2019-09-11T06:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/on-cybersecurity-insurance/</loc>
		<lastmod>2019-09-11T07:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/repost-ncipher-security-on-how-channel-partners-can-double-up-their-cloud-game/</loc>
		<lastmod>2019-09-11T08:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/crypto-2019-takeaways/</loc>
		<lastmod>2019-09-11T10:50:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ios-location-mapping-with-apollo-part-2-cellular-and-wi-fi-data-locationd/</loc>
		<lastmod>2019-09-11T10:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/meet-the-four-generations-of-bots/</loc>
		<lastmod>2019-09-11T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-pptp-vpn-protocol-is-it-safe/</loc>
		<lastmod>2019-09-11T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/malware-what-is-spyware/</loc>
		<lastmod>2019-09-11T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/degree-vs-certification-mid-level-it-auditor/</loc>
		<lastmod>2019-09-11T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/anti-disassembly-anti-debugging-and-anti-vm/</loc>
		<lastmod>2019-09-11T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/joe-gillespie-is-interviewed-about-netsparker-for-enterprise-security-weekly-148/</loc>
		<lastmod>2019-09-11T13:50:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/appsec-training-necessary-but-not-sufficient/</loc>
		<lastmod>2019-09-11T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-tech-logichub-introduces-virtualized-security-analysts-to-help-elevate-soar/</loc>
		<lastmod>2019-09-11T13:59:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/access-management-from-a-to-z-with-thales-and-safenet-trusted-access/</loc>
		<lastmod>2019-09-11T14:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-compare-digital-identity-providers-for-ciam/</loc>
		<lastmod>2019-09-11T14:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ny-payroll-company-vanishes-with-35-million/</loc>
		<lastmod>2019-09-11T15:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-9-11-memorial-new-york-city/</loc>
		<lastmod>2019-09-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/understanding-and-selecting-rasp-2019-integration/</loc>
		<lastmod>2019-09-11T16:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/infographic-bsimm10-by-the-numbers/</loc>
		<lastmod>2019-09-11T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/successful-cisos-spend-lots-of-time-doing-this-one-essential-activity/</loc>
		<lastmod>2019-09-11T17:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/removing-search-guard-from-the-central-repository/</loc>
		<lastmod>2019-09-11T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/toyota-parts-supplier-loses-37-million-in-email-scam/</loc>
		<lastmod>2019-09-11T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bec-scams-cost-victims-26b-over-a-three-year-period-finds-fbi/</loc>
		<lastmod>2019-09-11T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-insider-threat-denial-is-everyones-problem/</loc>
		<lastmod>2019-09-11T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/an-old-dog-with-new-tricks/</loc>
		<lastmod>2019-09-11T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ninth-circuit-rules-that-scraping-a-public-website-is-likely-not-a-cfaa-violation/</loc>
		<lastmod>2019-09-11T19:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-senior-living-can-use-smartphones-to-streamline-their-communications/</loc>
		<lastmod>2019-09-11T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-customers-choose-fortinets-cloud-security-for-protection-of-hybrid-cloud-and-on-prem-networks/</loc>
		<lastmod>2019-09-11T20:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fbi-shows-you-how-to-spot-a-business-email-compromise-scam-cuffs-281-bec-operators/</loc>
		<lastmod>2019-09-11T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cybersecurity-takes-center-stage-in-board-rooms-across-us-europe-australia-and-new-zealand/</loc>
		<lastmod>2019-09-11T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/nist-800-63-c-federated-assurance-level-guidelines/</loc>
		<lastmod>2019-09-11T21:52:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-micro-focus-sonatype-partnership-provides-360-degree-view-of-appsec/</loc>
		<lastmod>2019-09-11T21:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-you-need-to-scale-your-digital-transformation/</loc>
		<lastmod>2019-09-11T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-hackers-set-the-pace-avast/</loc>
		<lastmod>2019-09-11T22:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/internet-isolation-cloud-introducing-a-new-paradigm/</loc>
		<lastmod>2019-09-11T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-build-an-incident-response-playbook/</loc>
		<lastmod>2019-09-12T03:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/virsecs-vaccine-against-the-ransomware-epidemic/</loc>
		<lastmod>2019-09-12T05:41:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-ensure-your-digital-security-during-the-rugby-world-cup/</loc>
		<lastmod>2019-09-12T07:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-to-do-if-you-receive-a-legitimate-unusual-account-activity-notice/</loc>
		<lastmod>2019-09-12T08:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/more-on-law-enforcement-backdoor-demands/</loc>
		<lastmod>2019-09-12T09:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/average-cost-of-a-data-breach-rises-to-3-18-million/</loc>
		<lastmod>2019-09-12T11:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wordpress-https-ssl-tls-a-guide-for-website-administrators/</loc>
		<lastmod>2019-09-12T11:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cobalt-dickens-launched-new-phishing-operation-against-universities/</loc>
		<lastmod>2019-09-12T11:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/defacements-the-digital-graffiti-of-the-internet/</loc>
		<lastmod>2019-09-12T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/protecting-infrastructure-with-tls-client-authentication/</loc>
		<lastmod>2019-09-12T15:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/internet-of-things-iot-trends-in-2019/</loc>
		<lastmod>2019-09-12T15:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hack-the-box-htb-machines-walkthrough-series-shocker/</loc>
		<lastmod>2019-09-12T15:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/degree-versus-certification-entry-level-cybercrime-analyst-investigator/</loc>
		<lastmod>2019-09-12T15:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-daniel-zappalas-using-architecture-and-abstractions-to-design-a-security-layer-for-tls/</loc>
		<lastmod>2019-09-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/best-practices-for-securing-cloud-based-applications-and-infrastructure/</loc>
		<lastmod>2019-09-12T16:13:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-foil-the-6-stages-of-a-network-intrusion/</loc>
		<lastmod>2019-09-12T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-are-schools-increasingly-targeted-by-cyberattackers/</loc>
		<lastmod>2019-09-12T16:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/patch-management-a-key-area-for-improvement-at-most-smbs-study-shows/</loc>
		<lastmod>2019-09-12T16:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/electrifying-play-by-play/</loc>
		<lastmod>2019-09-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-real-time-threat-intelligence-isnt-enough-2/</loc>
		<lastmod>2019-09-12T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lets-talk-licenses-beware-the-beerware-license/</loc>
		<lastmod>2019-09-12T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/8-business-challenges-a-casb-solves/</loc>
		<lastmod>2019-09-12T17:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-jennifer-andersons-privacy-engineering-not-just-for-privacy-engineers/</loc>
		<lastmod>2019-09-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-vast-social-media-landscape-for-phishing-threats/</loc>
		<lastmod>2019-09-12T18:15:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ssl-certificates-one-year-max-validity-ballot-fails-at-the-ca-b-forum/</loc>
		<lastmod>2019-09-12T18:26:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortinet-wins-se-labs-best-network-security-appliance-award/</loc>
		<lastmod>2019-09-12T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/apis-ease-customer-interaction-and-external-attacks-heres-how-to-protect-them/</loc>
		<lastmod>2019-09-12T18:54:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-unreachable-state/</loc>
		<lastmod>2019-09-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-credential-stuffing-threatens-your-companyand-how-to-prevent-it-2/</loc>
		<lastmod>2019-09-12T19:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-primer-on-the-internet-of-things-avast/</loc>
		<lastmod>2019-09-12T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/kubernetes-in-10-seconds/</loc>
		<lastmod>2019-09-12T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/endpoint-protection-hardening-and-containment-strategies-for-ransomware-attack-protection-cisa-recommended-fireeye-report-highlights/</loc>
		<lastmod>2019-09-12T19:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/stackrox-app-integrates-into-the-sumo-logic-dashboard-for-improved-kubernetes-security/</loc>
		<lastmod>2019-09-12T19:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/nist-from-cells-to-cybersecurity/</loc>
		<lastmod>2019-09-12T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/privacy-and-the-myth-of-end-to-end-encryption/</loc>
		<lastmod>2019-09-12T20:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-five-critical-steps-service-providers-must-take-for-their-customers/</loc>
		<lastmod>2019-09-12T21:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/inviting-in-the-attacker-cybersecurity-in-retail/</loc>
		<lastmod>2019-09-12T22:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-signs-you-need-an-insider-threat-program/</loc>
		<lastmod>2019-09-13T00:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wordpress-core-stored-xss-vulnerability/</loc>
		<lastmod>2019-09-13T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/intels-ddio-and-rdma-enabled-microprocessors-vulnerable-to-new-netcat-attack/</loc>
		<lastmod>2019-09-13T06:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/financial-services-data-breaches-more-pain-ahead/</loc>
		<lastmod>2019-09-13T09:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lost-all-the-money/</loc>
		<lastmod>2019-09-13T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/firemon-automation-unlocks-agility-drives-untapped-business-potential-for-digital-transformation-initiatives-in-hybrid-environments/</loc>
		<lastmod>2019-09-17T09:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/firemon-sets-a-new-standard-for-security-process-automation-to-drive-revenue-and-lower-network-security-risk/</loc>
		<lastmod>2019-09-17T09:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ddos-attack-takes-down-wikipedia-avast/</loc>
		<lastmod>2019-09-13T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-tejas-dharamshis-building-identity-for-an-open-perimeter/</loc>
		<lastmod>2019-09-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/benefits-of-integrating-pam-solutions-with-a-credential-vault-2/</loc>
		<lastmod>2019-09-13T16:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-impact-of-hipaa/</loc>
		<lastmod>2019-09-13T16:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/when-biology-becomes-software/</loc>
		<lastmod>2019-09-13T16:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/def-con-27-cult-of-the-dead-cows-change-the-world-cdc-style-cow-tips-from-the-first-35-years/</loc>
		<lastmod>2019-09-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-more-secure-web-needs-developers-defenders-advocates-and-oss/</loc>
		<lastmod>2019-09-13T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/understanding-and-selecting-rasp-2019-selection-guide/</loc>
		<lastmod>2019-09-13T17:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-neha-rungtas-provable-security-at-aws/</loc>
		<lastmod>2019-09-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-companies-are-forming-cybersecurity-alliances/</loc>
		<lastmod>2019-09-13T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-new-stuxnet-level-vulnerability-named-simjacker-used-to-secretly-spy-over-mobile-phones-in-multiple-countries-for-over-2-years-adaptive-mobile-security-reports/</loc>
		<lastmod>2019-09-13T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lilocked-ransomware-lilu-affects-thousands-of-linux-based-servers/</loc>
		<lastmod>2019-09-13T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-in-omne-trium-perfectum/</loc>
		<lastmod>2019-09-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/this-week-in-cybersecurity-september-13/</loc>
		<lastmod>2019-09-13T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/september-2019-democratic-debates-added-to-ggchicklet/</loc>
		<lastmod>2019-09-14T09:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hp-labs-bristol-why-hp-leads-on-pc-security/</loc>
		<lastmod>2019-09-14T11:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/rswitch-1-5-0-release-now-also-corrals-rstudio-server-connections/</loc>
		<lastmod>2019-09-14T13:19:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/twitter-account-analysis-in-r/</loc>
		<lastmod>2019-09-14T14:11:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ashkan-soltanis-abusability-testing-considering-the-ways-your-technology-might-be-used/</loc>
		<lastmod>2019-09-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-foucault-pendulum/</loc>
		<lastmod>2019-09-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-anita-nikolichs-grey-science/</loc>
		<lastmod>2019-09-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-phishing-a-look-at-one-of-cybercrimes-favorite-tactics/</loc>
		<lastmod>2019-09-14T19:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/u-s-sanctions-north-korean-hackers-avast/</loc>
		<lastmod>2019-09-14T22:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-files-attack-like-its-1999-citibank-in-2012-signet-jared-jewelers-molina-health/</loc>
		<lastmod>2019-09-15T13:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-files-pusher-in-coinbase-cookie/</loc>
		<lastmod>2019-09-15T13:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-files-your-data-has-been-breached-now-what/</loc>
		<lastmod>2019-09-15T13:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-files-the-dynamic-duo-andrew-and-allen-exploit-nordstrom-with-their-fatwallet/</loc>
		<lastmod>2019-09-15T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-files-outbidding/</loc>
		<lastmod>2019-09-15T13:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-denelle-dixons-its-not-our-data-do-we-want-to-create-a-world-of-no-surprises/</loc>
		<lastmod>2019-09-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-earth-like-exoplanet/</loc>
		<lastmod>2019-09-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-jonathan-lusthaus-the-offline-dimension-of-online-crime/</loc>
		<lastmod>2019-09-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/operation-rewired-arrests-281-business-email-compromise-criminals/</loc>
		<lastmod>2019-09-16T00:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/end-to-end-encryption-with-max-krohn-from-keybase-io/</loc>
		<lastmod>2019-09-16T04:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/alissa-knight-talks-api-security-formjacking-and-hacking-cyber-work-podcast/</loc>
		<lastmod>2019-09-16T08:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/gdpr-one-year-anniversary-the-civil-society-organizations-view/</loc>
		<lastmod>2019-09-16T10:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digital-transformation-cybersecurity-cloud-apps-and-cloud-security/</loc>
		<lastmod>2019-09-16T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/compliance-and-digitial-transformation-imperatives-to-modernize/</loc>
		<lastmod>2019-09-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/have-you-seen-nciphers-latest-case-studies/</loc>
		<lastmod>2019-09-16T13:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/spam-campaign-targeting-german-users-with-ordinypt-malware/</loc>
		<lastmod>2019-09-16T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-top-10-highest-paying-jobs-in-information-security-part-1/</loc>
		<lastmod>2019-09-16T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shared-intel-how-digital-certificates-could-supply-secure-identities-for-enterprise-blockchains/</loc>
		<lastmod>2019-09-16T15:30:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fedramp-is-your-best-cloud-bet-even-for-commercial-businesses/</loc>
		<lastmod>2019-09-16T15:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-detect-phishing-emails-sent-to-your-business-avast/</loc>
		<lastmod>2019-09-16T15:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-munish-walther-puris-learning-from-the-dark-web-dimension-of-data/</loc>
		<lastmod>2019-09-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/c-code-in-assembly/</loc>
		<lastmod>2019-09-16T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/getting-started-with-ethical-hacking/</loc>
		<lastmod>2019-09-16T16:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hack-the-box-htb-machines-walkthrough-series-friendzone/</loc>
		<lastmod>2019-09-16T16:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/malware-what-are-rootkits/</loc>
		<lastmod>2019-09-16T16:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/robert-m-lees-jeff-hass-little-bobby-comics-secrets/</loc>
		<lastmod>2019-09-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/large-applications-monoliths%e2%80%8a-%e2%80%8astruggling-with-code-analysis-read-on/</loc>
		<lastmod>2019-09-16T17:16:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-you-need-to-be-thinking-about-api-security/</loc>
		<lastmod>2019-09-16T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-max-smeets-countering-adversarial-cyber-campaigns/</loc>
		<lastmod>2019-09-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortinet-enhances-its-security-alliance-with-oracle-at-openworld-2019/</loc>
		<lastmod>2019-09-16T18:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/protect-your-apps-using-idaptive-and-netskope-casb-provider/</loc>
		<lastmod>2019-09-16T18:47:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/webinar-ma-tech-due-diligence-from-the-sellers-perspective/</loc>
		<lastmod>2019-09-16T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/researchers-simjacker-flaw-permits-device-hijack-with-sms/</loc>
		<lastmod>2019-09-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/52-of-uk-businesses-risk-hefty-fines-under-gdpr/</loc>
		<lastmod>2019-09-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/uks-ncsc-report-reveals-significant-ransomware-phishing-and-supply-chain-threats-to-businesses/</loc>
		<lastmod>2019-09-16T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/phil-bertolini-set-the-excellence-standard-for-county-cios/</loc>
		<lastmod>2019-09-16T20:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/strengthen-your-investigatory-powers-by-taking-the-new-for498-battlefield-forensics-amp-data-acquisition-course-from-sans/</loc>
		<lastmod>2019-09-16T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/us-treasury-levies-sanctions-against-north-korean-group-behind-2017-wannacry-ransomware/</loc>
		<lastmod>2019-09-16T23:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/three-ways-a-principle-based-devops-framework/</loc>
		<lastmod>2019-09-16T23:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/accredited-iso-certification-versus-non-accredited-what-it-means-and-why-it-matters/</loc>
		<lastmod>2019-09-17T01:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/65-of-port-vulnerabilities-target-just-three-ports/</loc>
		<lastmod>2019-09-17T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sumitomo-corporations-presidio-ventures-leads-series-b-investment-in-preveil/</loc>
		<lastmod>2019-09-17T05:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-will-the-cmmc-impact-my-business-and-how-can-we-prepare-part-1-of-3/</loc>
		<lastmod>2019-09-17T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/embedded-in-the-threatx-soc-my-first-30-days/</loc>
		<lastmod>2019-09-17T05:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/iot-and-quantum-computings-impact-on-the-federal-government/</loc>
		<lastmod>2019-09-17T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/expert-opinion-on-avoiding-common-cloud-protection-pitfalls/</loc>
		<lastmod>2019-09-17T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-no-compromise-approach-to-your-cloud-based-intranet-security/</loc>
		<lastmod>2019-09-17T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-implications-for-medical-devices-and-the-healthcare-industry/</loc>
		<lastmod>2019-09-17T08:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whatsapp-delete-for-everyone-feature-potentially-puts-user-privacy-at-risk/</loc>
		<lastmod>2019-09-17T10:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/7-threat-hunting-benchmarks-from-a-survey-of-security-pros/</loc>
		<lastmod>2019-09-17T11:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/perspectives-early-lead-in-filling-global-ot-security-demand/</loc>
		<lastmod>2019-09-17T11:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/police-raids-after-data-on-most-of-ecuadors-citizens-leaks-online/</loc>
		<lastmod>2019-09-17T12:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/implementing-ai-gives-financial-services-firms-numerous-advantages/</loc>
		<lastmod>2019-09-17T12:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/emotet-botnet-returns-after-four-month-hiatus-with-new-spam-campaign/</loc>
		<lastmod>2019-09-17T12:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/breaking-the-cycle-of-security-failure-with-zero-trust/</loc>
		<lastmod>2019-09-17T13:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bitdefender-is-proud-to-announce-pwnthybytes-capture-the-flag-our-competitive-ethical-hacking-contest/</loc>
		<lastmod>2019-09-17T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/principles-of-usable-security/</loc>
		<lastmod>2019-09-17T14:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/global-research-shows-poor-data-security-practices-have-serious-consequences-for-businesses-worldwide/</loc>
		<lastmod>2019-09-17T14:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/infographic-how-advanced-attacks-are-transforming-msp-endpoint-security/</loc>
		<lastmod>2019-09-17T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/4-things-you-need-to-know-about-soc-2-compliance/</loc>
		<lastmod>2019-09-17T15:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sscp-versus-ccsp-cloud-security-or-systems-security/</loc>
		<lastmod>2019-09-17T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-what-are-exploits/</loc>
		<lastmod>2019-09-17T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/top-10-network-recon-tools/</loc>
		<lastmod>2019-09-17T15:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/man-who-hired-deadly-swatting-gets-15-months/</loc>
		<lastmod>2019-09-17T15:59:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ajit-gaddams-usage-of-behavioral-biometric-technologies-to-defend-against-bots/</loc>
		<lastmod>2019-09-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-false-claims-act-156-years-old-and-newly-relevant-to-software-security/</loc>
		<lastmod>2019-09-17T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/go-passwordless-with-fido2-and-web-authentication/</loc>
		<lastmod>2019-09-17T16:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/advancing-application-delivery/</loc>
		<lastmod>2019-09-17T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-prescience/</loc>
		<lastmod>2019-09-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/7-crucial-components-of-cyber-incident-recovery/</loc>
		<lastmod>2019-09-17T17:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-nicholas-weavers-cryptocurrency-burn-it-with-fire/</loc>
		<lastmod>2019-09-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/past-gdpr-predictions-have-they-come-to-fruition/</loc>
		<lastmod>2019-09-17T19:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/an-unsecured-elasticsearch-database-exposes-personal-information-of-20-million-ecuadoreans-including-6-77m-children-under-18/</loc>
		<lastmod>2019-09-17T20:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/california-assembly-member-leveraging-familial-connection-to-ring/</loc>
		<lastmod>2019-09-17T21:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/infographic-macos-native-security-configurations-and-osquery/</loc>
		<lastmod>2019-09-17T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/video-wireshark-for-hackers/</loc>
		<lastmod>2019-09-17T21:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/september-patch-tuesday-79-vulns-17-critical-remote-desktop-client-sharepoint-exploited-privesc/</loc>
		<lastmod>2019-09-18T00:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/cisco-rest-api-container-for-ios-xe-software-authentication-bypass-vulnerability-cve-2019-12643/</loc>
		<lastmod>2019-09-18T00:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/windows-remote-desktop-vulnerabilities-seven-monkeys-how-to-detect-and-patch/</loc>
		<lastmod>2019-09-18T00:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/august-2019-patch-tuesday-93-vulns-29-critical-7-remote-desktop-vulns-hyper-v-dhcp-adobe-vulns/</loc>
		<lastmod>2019-09-18T00:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/thoughts-on-simjacker/</loc>
		<lastmod>2019-09-18T03:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-support-healthy-communities-during-national-health-it-week-2019/</loc>
		<lastmod>2019-09-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/answering-the-need-for-secure-cloud-key-management/</loc>
		<lastmod>2019-09-18T06:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/8-ways-to-mitigate-credential-stuffing/</loc>
		<lastmod>2019-09-18T06:54:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/nemty-ransomware-1-0-a-threat-in-its-early-stage/</loc>
		<lastmod>2019-09-18T08:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/concerns-and-challenges-towards-an-effective-cloud-security/</loc>
		<lastmod>2019-09-18T08:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/education-sector-in-dire-need-of-cloud-security-talent-research-shows/</loc>
		<lastmod>2019-09-18T10:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-get-away-with-hacking-a-us-satellite/</loc>
		<lastmod>2019-09-18T11:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ramnit-malware-makes-a-return-with-new-tricks/</loc>
		<lastmod>2019-09-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/e-commerce-bad-bots-are-ready-for-the-holidays-are-you/</loc>
		<lastmod>2019-09-18T12:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/glass-class-the-zscaler-and-bitglass-integration/</loc>
		<lastmod>2019-09-18T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/three-reasons-your-siem-should-be-paired-with-soar-to-optimize-your-security-operations/</loc>
		<lastmod>2019-09-18T13:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/optimize-secops-by-pairing-siem-with-soar/</loc>
		<lastmod>2019-09-18T13:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ecuador-data-breach-the-result-of-cloud-vulnerability/</loc>
		<lastmod>2019-09-18T13:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-identify-sensitive-personal-data/</loc>
		<lastmod>2019-09-18T13:44:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mastercard-loyalty-program-breach-highlights-importance-of-third-party-security/</loc>
		<lastmod>2019-09-18T13:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bsimm10-a-decade-of-research-on-software-security-activities/</loc>
		<lastmod>2019-09-18T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-bsimm10-study-highlights-the-impact-of-devops-on-software-security/</loc>
		<lastmod>2019-09-18T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/visit-thales-at-the-dell-technologies-forum-in-sydney-october-1-2019/</loc>
		<lastmod>2019-09-18T14:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cookieminer-malware-targets-macs-steals-passwords-and-sms-messages-mines-for-cryptocurrency/</loc>
		<lastmod>2019-09-18T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tflower-ransomware-targeting-businesses-via-exposed-rds/</loc>
		<lastmod>2019-09-18T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-noah-johnsons-building-a-secure-data-market-on-blockchain/</loc>
		<lastmod>2019-09-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cisos-achieve-a-holistic-cybersecurity-program-once-they-address-this-risk/</loc>
		<lastmod>2019-09-18T16:18:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shedding-more-light-on-the-first-u-s-electric-grid-attack/</loc>
		<lastmod>2019-09-18T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/elementary-shortfalls-what-the-internet-got-wrong-and-what-we-can-do-about-it-now/</loc>
		<lastmod>2019-09-18T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-iphone-11s-secret-chip/</loc>
		<lastmod>2019-09-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shapes-vp-of-intelligence-center-to-speak-at-retail-cyber-intelligence-summit/</loc>
		<lastmod>2019-09-18T17:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-bots-use-apis-to-infiltrate-the-online-world/</loc>
		<lastmod>2019-09-18T17:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cryptography-fundamentals-for-hackers/</loc>
		<lastmod>2019-09-18T17:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/covering-tracks-hiding-files-on-windows-linux-macos/</loc>
		<lastmod>2019-09-18T17:58:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/essential-skills-and-certifications-for-software-developers/</loc>
		<lastmod>2019-09-18T17:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-peter-snyders-next-steps-for-browser-privacy-pursuing-privacy-protections-beyond-extensions/</loc>
		<lastmod>2019-09-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vendors-and-network-vulnerability-part-1-risks-and-potential-damage-from-remote-vendor-access/</loc>
		<lastmod>2019-09-18T18:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/before-he-spammed-you-this-sly-prince-stalked-your-mailbox/</loc>
		<lastmod>2019-09-18T18:53:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/luke-kingmas-lou-patrick-mackays-futurism-cartoons-particles/</loc>
		<lastmod>2019-09-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/addressing-the-growing-challenges-of-the-cybersecurity-workforce/</loc>
		<lastmod>2019-09-18T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/strong-authentication-for-endpoint-security-3-perspectives/</loc>
		<lastmod>2019-09-18T19:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lastpass-patched-a-security-vulnerability-from-the-extensions-generated-on-pop-up-windows/</loc>
		<lastmod>2019-09-18T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/accelerate-a-principle-based-devops-framework/</loc>
		<lastmod>2019-09-18T19:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/security-and-development-agree-coordinated-disclosures-are-a-public-service/</loc>
		<lastmod>2019-09-18T20:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-apple-shapes-the-narrative-about-smartphone-security/</loc>
		<lastmod>2019-09-18T20:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whats-new-in-infosec-iq-fall-2019/</loc>
		<lastmod>2019-09-18T21:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vendors-and-network-vulnerability-part-1-risks-and-potential-damage-from-vendor-remote-access/</loc>
		<lastmod>2019-09-18T21:38:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ccpa-vs-gdpr-the-compliance-war-2/</loc>
		<lastmod>2019-09-18T21:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-jersey-data-breach-notification-law/</loc>
		<lastmod>2019-09-18T22:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/memory-errors-top-mitres-most-dangerous-list/</loc>
		<lastmod>2019-09-19T01:51:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tripwirebookclub-practical-binary-analysis/</loc>
		<lastmod>2019-09-19T07:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/september-2019-update-for-netsparker-enterprise/</loc>
		<lastmod>2019-09-19T09:16:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/casb-2-0-cloud-security-visibility-and-control/</loc>
		<lastmod>2019-09-19T11:18:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-eus-eprivacy-regulation/</loc>
		<lastmod>2019-09-19T12:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/changes-to-emotet-in-september-2019/</loc>
		<lastmod>2019-09-19T13:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-buffer-overflow/</loc>
		<lastmod>2019-09-19T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/top-5-remote-access-trojans/</loc>
		<lastmod>2019-09-19T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-vishing-how-to-recognize-voice-phishing-phone-calls/</loc>
		<lastmod>2019-09-19T13:37:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-automated-testing-tools-that-threat-stack-uses-and-why/</loc>
		<lastmod>2019-09-19T13:46:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shades-of-gdpr-are-you-ready-for-californias-new-privacy-law/</loc>
		<lastmod>2019-09-19T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/achieving-trust-bake-security-into-your-brand/</loc>
		<lastmod>2019-09-19T14:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/can-your-sca-really-secure-all-your-applications/</loc>
		<lastmod>2019-09-19T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/my-take-what-everyone-should-know-about-the-promise-and-pitfalls-of-the-internet-of-things/</loc>
		<lastmod>2019-09-19T15:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortinet-named-a-leader-in-the-2019-gartner-magic-quadrant-for-network-firewalls/</loc>
		<lastmod>2019-09-19T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/customers-praise-fortigate-enterprise-network-firewalls-for-securing-their-networks/</loc>
		<lastmod>2019-09-19T15:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/empowering-the-infosec-community/</loc>
		<lastmod>2019-09-19T15:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ben-livshits-user-agent-2-0-what-can-the-browser-do-for-the-user/</loc>
		<lastmod>2019-09-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/welcome-to-the-future-of-application-security/</loc>
		<lastmod>2019-09-19T16:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/apwg-phishing-continues-to-rise-threat-actors-love-gift-cards/</loc>
		<lastmod>2019-09-19T16:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/d3esports-joins-cybercon-2019-in-race-to-protect-the-grid-campaign/</loc>
		<lastmod>2019-09-19T16:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/over-12000-wannacry-variants-detected-in-the-wild/</loc>
		<lastmod>2019-09-19T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-guide-on-5-common-linkedin-scams/</loc>
		<lastmod>2019-09-19T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-ksp-2/</loc>
		<lastmod>2019-09-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/helping-a-cement-conglomerate-become-lighter-faster-and-more-transparent/</loc>
		<lastmod>2019-09-19T17:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/does-your-mssp-add-value/</loc>
		<lastmod>2019-09-19T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-sadia-afrozs-where-is-the-web-closed/</loc>
		<lastmod>2019-09-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/introducing-black-duck-for-google-cloud-build/</loc>
		<lastmod>2019-09-19T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/et-stulte-corripietur-falwells-email-lesson/</loc>
		<lastmod>2019-09-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/client-side-threats-how-could-website-owners-mitigate-them/</loc>
		<lastmod>2019-09-19T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/introducing-a-better-way-to-learn-sonatype-products/</loc>
		<lastmod>2019-09-19T19:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/this-isnt-the-phishing-your-first-boss-knew/</loc>
		<lastmod>2019-09-19T20:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/when-privacy-is-missing-from-security/</loc>
		<lastmod>2019-09-19T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mitres-2019-cwe-top-25-most-dangerous-software-errors-list-released/</loc>
		<lastmod>2019-09-19T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/emotet-a-dangerous-botnet-spams-malicious-emails-targets-66000-unique-emails-for-more-than-30000-domain-names-reports-bleepingcomputer/</loc>
		<lastmod>2019-09-19T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/slas-what-your-cybersecurity-vendor-isnt-telling-you-2/</loc>
		<lastmod>2019-09-19T21:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/my-take-poll-shows-senior-execs-board-members-grasp-strategic-importance-of-cybersecurity/</loc>
		<lastmod>2019-09-19T21:47:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/linux-for-ethical-hackers-101/</loc>
		<lastmod>2019-09-19T21:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/registers/</loc>
		<lastmod>2019-09-19T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/operands/</loc>
		<lastmod>2019-09-19T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/august-2019-appsec-intelligence-report/</loc>
		<lastmod>2019-09-19T21:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/contact-atlantic-conference-and-trade-show-2019/</loc>
		<lastmod>2019-09-20T08:33:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/my-take-smbs-can-do-much-more-to-repel-ransomware-dilute-disinformation-campaigns/</loc>
		<lastmod>2019-09-20T08:40:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/businesses-can-lose-half-of-customers-after-a-data-breach-research-shows/</loc>
		<lastmod>2019-09-20T10:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/querycon-2019-a-turning-point-for-osquery/</loc>
		<lastmod>2019-09-20T11:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransom-notes-shoot-out-of-school-printers-but-district-denies-hackers-their-prize/</loc>
		<lastmod>2019-09-20T11:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/email-data-protection-with-ciphercloud-casb/</loc>
		<lastmod>2019-09-20T12:09:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/win-a-100-gift-card-take-a-brief-survey-on-software-composition-analysis/</loc>
		<lastmod>2019-09-20T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/eight-ways-to-create-a-pod/</loc>
		<lastmod>2019-09-20T15:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/signal-sciences-is-the-leading-visionary-in-the-2019-gartner-magic-quadrant-for-web-application-firewalls/</loc>
		<lastmod>2019-09-20T15:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ciso-expectations-are-becoming-impossible-to-achieve-2/</loc>
		<lastmod>2019-09-20T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-emily-starks-the-urlephant-in-the-room/</loc>
		<lastmod>2019-09-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/click2gov-software-vulnerable-for-the-second-time-breach-hits-8-us-cities/</loc>
		<lastmod>2019-09-20T16:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/host-unknowns-lost-all-the-money/</loc>
		<lastmod>2019-09-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/6-evasive-phishing-tactics-most-cybersecurity-solutions-miss/</loc>
		<lastmod>2019-09-20T17:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-to-throw-a-tiki-tech-party-2/</loc>
		<lastmod>2019-09-20T17:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-serge-egelmans-mobile-app-privacy-analysis-at-scale/</loc>
		<lastmod>2019-09-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-recent-changes-to-the-ccpa-that-businesses-should-know-about/</loc>
		<lastmod>2019-09-20T18:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/luke-kingmas-lou-patrick-mackays-futurism-cartoons-salary/</loc>
		<lastmod>2019-09-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-spear-phishing-campaign-impersonates-vcs-and-pe-firms/</loc>
		<lastmod>2019-09-20T20:03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/managing-the-chaos-of-digital-certificates/</loc>
		<lastmod>2019-09-20T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/24-million-medical-records-exposed-avast/</loc>
		<lastmod>2019-09-21T00:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/qa-fuzz-testing-agent-instrumentation-and-defensics/</loc>
		<lastmod>2019-09-21T02:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortivet-addresses-the-cyber-skills-shortage-in-canada/</loc>
		<lastmod>2019-09-21T03:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ren-mayrhofers-insider-attack-resistance-in-the-android-ecosystem/</loc>
		<lastmod>2019-09-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/case-study-instart-enables-a-seamless-cloud-application-migration/</loc>
		<lastmod>2019-09-21T16:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cyber-attackers-are-getting-smarter-heres-how-to-protect-yourself/</loc>
		<lastmod>2019-09-21T16:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-to-do-after-a-data-breach/</loc>
		<lastmod>2019-09-21T16:07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/4-web-security-challenges-you-need-to-address/</loc>
		<lastmod>2019-09-21T16:07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/instart-august-2019-product-release/</loc>
		<lastmod>2019-09-21T16:07:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/your-waf-cant-stop-web-skimming-attacks-from-stealing-your-customers-sensitive-data/</loc>
		<lastmod>2019-09-21T16:07:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-your-legacy-cdn-doesnt-meet-the-needs-of-your-modern-website/</loc>
		<lastmod>2019-09-21T16:07:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/operating-in-a-zero-trust-world-introducing-instart-zero-trust-access/</loc>
		<lastmod>2019-09-21T16:07:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/why-web-experiences-need-to-balance-speed-and-security/</loc>
		<lastmod>2019-09-21T16:07:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/what-your-business-can-learn-from-the-capital-one-data-breach/</loc>
		<lastmod>2019-09-21T16:07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-types-of-approximation/</loc>
		<lastmod>2019-09-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-andrea-little-limbagos-digital-authoritarianism-data-protection-and-the-battles/</loc>
		<lastmod>2019-09-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-feminist-take-on-information-privacy/</loc>
		<lastmod>2019-09-22T09:23:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/where-next-for-tech-and-renewable-energy/</loc>
		<lastmod>2019-09-22T12:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-bob-lords-mr-lord-goes-tto-washington-or-applying-security-outside-the-tech-world/</loc>
		<lastmod>2019-09-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/blast-from-the-past-daniel-storis-windows-tip/</loc>
		<lastmod>2019-09-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-ben-adidas-convincing-the-loser-securing-elections-against-modern-threats/</loc>
		<lastmod>2019-09-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/where-is-next-for-technology-and-renewable-energy/</loc>
		<lastmod>2019-09-22T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-can-we-teach-ai-to-protect-childrens-privacy-avast/</loc>
		<lastmod>2019-09-22T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/3-types-of-network-attacks-to-watch-out-for/</loc>
		<lastmod>2019-09-23T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/building-a-foundation-for-smart-steel-factories-with-fog-computing-the-cloud-and-cybersecurity/</loc>
		<lastmod>2019-09-23T03:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/apple-ios-13-venmo-scams-simjacking-attacks/</loc>
		<lastmod>2019-09-23T04:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/domain-hijacking-a-k-a-domain-spoofing/</loc>
		<lastmod>2019-09-23T08:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/acunetix-taking-part-in-the-gitex-technology-week/</loc>
		<lastmod>2019-09-23T08:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/red-team-vs-blue-team-exercises-for-web-security/</loc>
		<lastmod>2019-09-23T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-path-traversal/</loc>
		<lastmod>2019-09-23T08:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-same-origin-policy/</loc>
		<lastmod>2019-09-23T08:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/acunetix-supports-a-well-being-initiative-by-ymca-malta/</loc>
		<lastmod>2019-09-23T08:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-tech-how-cryptographic-splitting-bakes-in-security-at-a-protect-the-data-itself-level/</loc>
		<lastmod>2019-09-23T08:46:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/big-brands-dont-guarantee-big-security-how-to-bolster-your-information-security-in-the-cloud/</loc>
		<lastmod>2019-09-23T09:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/are-ransom-payments-supporting-terrorists/</loc>
		<lastmod>2019-09-23T10:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/growing-cyber-threat-facing-the-uk-legal-sector/</loc>
		<lastmod>2019-09-23T10:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digital-forensics-data-analysis-and-data-recovery-cyber-work-podcast/</loc>
		<lastmod>2019-09-23T10:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/recent-spike-in-ransomware-incidents-potentially-linked-to-payouts-from-insurance-firms/</loc>
		<lastmod>2019-09-23T11:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/bitglass-security-spotlight-419-million-facebook-users-exposed/</loc>
		<lastmod>2019-09-23T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-cisos-must-use-automation-and-ai-to-combat-resource-shortages/</loc>
		<lastmod>2019-09-23T13:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-role-of-analytics-in-protecting-healthcare-data-privacy-and-security/</loc>
		<lastmod>2019-09-23T14:37:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/device-hopping-shoppers-drive-up-bounce-rates-leading-into-holiday-2019/</loc>
		<lastmod>2019-09-23T15:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/akamai-partners-with-supplier-to-meet-sustainability-goals/</loc>
		<lastmod>2019-09-23T15:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/securing-windows-10-hosts/</loc>
		<lastmod>2019-09-23T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/5-legitimate-tools-commonly-used-for-malicious-purposes/</loc>
		<lastmod>2019-09-23T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-you-should-know-about-ryuk-ransomware/</loc>
		<lastmod>2019-09-23T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/transitioning-from-devops-to-devsecops/</loc>
		<lastmod>2019-09-23T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-kevin-borgoltes-moving-fast-and-breaking-things-security-misconfigurations/</loc>
		<lastmod>2019-09-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/are-psd2-sca-options-too-narrow-in-scope/</loc>
		<lastmod>2019-09-23T16:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/who-iserik-a-resurface-of-an-advanced-persistent-adware/</loc>
		<lastmod>2019-09-23T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/robert-m-lees-jeff-hass-little-bobby-comics-definitely/</loc>
		<lastmod>2019-09-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-andrew-m-whites-stethoscope-securely-configuring-devices-without-systems-management/</loc>
		<lastmod>2019-09-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-leader-in-the-2019-gartner-magic-quadrant-for-waf-six-years-running/</loc>
		<lastmod>2019-09-23T18:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-beans-shall-we-say-have-been-spilt-state-of-iowa-executes-partial-spillage/</loc>
		<lastmod>2019-09-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/synopsys-consultant-wins-a-leadership-award-from-sc-media/</loc>
		<lastmod>2019-09-23T19:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/derbycon-the-finish-line/</loc>
		<lastmod>2019-09-23T19:37:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/this-week-in-cybersecurity-september-20/</loc>
		<lastmod>2019-09-23T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/calms-a-principle-based-devops-framework/</loc>
		<lastmod>2019-09-23T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vendors-and-network-vulnerability-part-2-tools-to-reduce-risk-in-vendor-remote-access/</loc>
		<lastmod>2019-09-23T21:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vendors-and-network-vulnerability-part-2-tools-to-reduce-risk-in-remote-vendor-access/</loc>
		<lastmod>2019-09-23T22:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-netwire-rat-variant-being-spread-via-phishing/</loc>
		<lastmod>2019-09-24T01:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethics-and-chatbots/</loc>
		<lastmod>2019-09-24T01:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-entertainment-gets-right-and-wrong-about-security/</loc>
		<lastmod>2019-09-24T06:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-will-the-cmmc-impact-my-business-and-how-can-we-prepare-part-2-of-3/</loc>
		<lastmod>2019-09-24T07:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/celebrating-10-years-with-nuvias-group/</loc>
		<lastmod>2019-09-24T07:39:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/top-7-reasons-why-organizations-are-moving-to-cloud/</loc>
		<lastmod>2019-09-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-does-pci-compliance-mean-for-your-small-business/</loc>
		<lastmod>2019-09-24T08:57:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/world-of-warcrafts-suspected-ddos-attacker-has-been-arrested/</loc>
		<lastmod>2019-09-24T08:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-top-10-highest-paying-jobs-in-information-security-part-2/</loc>
		<lastmod>2019-09-24T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cisos-can-leverage-data-breaches-to-land-better-jobs-survey-shows/</loc>
		<lastmod>2019-09-24T10:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/compliance-and-technology-working-together-for-the-logistics-sector/</loc>
		<lastmod>2019-09-24T10:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/6-tips-for-building-an-effective-soc/</loc>
		<lastmod>2019-09-24T11:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/retailers-face-many-challenges-data-security-doesnt-have-to-be-one-of-the-them/</loc>
		<lastmod>2019-09-24T11:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/russians-hack-fbi-comms-system/</loc>
		<lastmod>2019-09-24T11:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-websites-need-http-strict-transport-security-hsts/</loc>
		<lastmod>2019-09-24T11:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/two-steps-to-adopting-cyber-security-best-practices-for-manufacturing/</loc>
		<lastmod>2019-09-24T12:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/crown-sterling-claims-to-factor-rsa-keylengths-first-factored-twenty-years-ago/</loc>
		<lastmod>2019-09-24T12:42:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/phishing-attacks-abusing-appspot-com-and-web-app-domains-on-google-cloud/</loc>
		<lastmod>2019-09-24T13:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/healthcare-cyberattack-trends-in-2019/</loc>
		<lastmod>2019-09-24T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/visibility-do-you-know-whats-in-your-network/</loc>
		<lastmod>2019-09-24T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/uptycs-file-integrity-monitoring-solutions-security-control-simplified/</loc>
		<lastmod>2019-09-24T13:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/in-digital-business-dont-sacrifice-security-for-speed/</loc>
		<lastmod>2019-09-24T14:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-are-tagged-and-untagged-ports/</loc>
		<lastmod>2019-09-24T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mitre-attck-vulnerability-spotlight-access-token-manipulation/</loc>
		<lastmod>2019-09-24T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/remote-access-security-in-windows-10/</loc>
		<lastmod>2019-09-24T14:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/shared-intel-heres-one-way-to-better-leverage-actionable-intel-from-the-profusion-of-threat-feeds/</loc>
		<lastmod>2019-09-24T14:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-lorenzo-cavallaros-when-the-magic-wears-off-flaws-in-ml-for-security-evaluations/</loc>
		<lastmod>2019-09-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/reawakening-of-emotet-an-analysis-of-its-javascript-downloader/</loc>
		<lastmod>2019-09-24T16:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-dot-zero-conundrum-and-the-new-frontier-of-securing-open-source/</loc>
		<lastmod>2019-09-24T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-webinar-how-to-create-executive-buy-in-for-your-cybersecurity-program/</loc>
		<lastmod>2019-09-24T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-big-tech-doesnt-want-to-break-up/</loc>
		<lastmod>2019-09-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/modernize-iam-for-government-a-real-world-example/</loc>
		<lastmod>2019-09-24T17:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-lateral-movement-techniques/</loc>
		<lastmod>2019-09-24T17:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-aaron-grattafioris-if-red-teaming-is-easy-youre-doing-it-wrong/</loc>
		<lastmod>2019-09-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-open-source-cookbook-understanding-your-software-ingredients/</loc>
		<lastmod>2019-09-24T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/quantum-of-tuesday-google-quantum-ais-paper-whereabouts-known/</loc>
		<lastmod>2019-09-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/16-kubernetes-experts-share-the-most-interesting-current-trends-to-look-for-in-kubernetes/</loc>
		<lastmod>2019-09-24T19:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/silicon-valley-technology-firm-contrast-security-to-create-120-jobs-at-new-northern-ireland-centre/</loc>
		<lastmod>2019-09-24T20:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-can-you-avoid-the-roadblocks-in-the-way-of-your-iam-and-pam-project-implementation-2/</loc>
		<lastmod>2019-09-24T21:24:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hackers-needed-to-defeat-hackers/</loc>
		<lastmod>2019-09-24T21:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/june-2019-appsec-intelligence-report-attack-edition/</loc>
		<lastmod>2019-09-24T22:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/attackers-undeterred-in-efforts-to-target-u-s-utilities-with-lookback/</loc>
		<lastmod>2019-09-25T00:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hp-moves-to-increase-desktop-and-printer-security-lead-with-bromium/</loc>
		<lastmod>2019-09-25T02:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/microsoft-released-out-of-band-security-updates/</loc>
		<lastmod>2019-09-25T05:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/zero-trust-the-new-default-for-information-security/</loc>
		<lastmod>2019-09-25T08:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortigate-network-firewalls-give-mssps-another-reason-to-select-fortinet/</loc>
		<lastmod>2019-09-25T09:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digital-risk-dont-believe-the-myths-misconceptions/</loc>
		<lastmod>2019-09-25T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-four-pillars-of-casb-identity/</loc>
		<lastmod>2019-09-25T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/trickbot-or-treat-knocking-on-the-door-and-trying-to-enter/</loc>
		<lastmod>2019-09-25T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/introducing-forticwp-for-comprehensive-cloud-workload-protection/</loc>
		<lastmod>2019-09-25T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/digging-deeper-into-isolation/</loc>
		<lastmod>2019-09-25T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-can-smbs-prepare-for-cybersecurity-challenges-avast/</loc>
		<lastmod>2019-09-25T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/application-delivery-challenges-for-devops/</loc>
		<lastmod>2019-09-25T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xml-external-entity-xxe-attacks-web-based-application-security-part-5/</loc>
		<lastmod>2019-09-25T15:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-daniela-seabra-oliveiras-why-even-experienced-and-highly-intelligent-developers-write-vulnerable-code-and-what-we-should-do-about-it/</loc>
		<lastmod>2019-09-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortiweb-maintains-its-position-as-a-challenger-in-the-2019-gartner-magic-quadrant-for-web-application-firewalls/</loc>
		<lastmod>2019-09-25T16:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cisos-add-value-to-the-business-by-doing-this/</loc>
		<lastmod>2019-09-25T16:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-hysolate-perspective-hp-acquires-bromium/</loc>
		<lastmod>2019-09-25T16:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-mavis-beacon/</loc>
		<lastmod>2019-09-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/quantifying-software-quality-risks-in-tech-ma/</loc>
		<lastmod>2019-09-25T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/penetration-testing-tor-vpn-or-proxy/</loc>
		<lastmod>2019-09-25T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ccsp-exam-and-cbk-changes-in-august/</loc>
		<lastmod>2019-09-25T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-attacking-routers/</loc>
		<lastmod>2019-09-25T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/user-account-management-in-windows-10/</loc>
		<lastmod>2019-09-25T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mass-triage-part-5-processing-returned-files-amcache/</loc>
		<lastmod>2019-09-25T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mass-triage-part-4-processing-returned-files-appcache-shimcache/</loc>
		<lastmod>2019-09-25T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/parsing-sysmon-events-for-ir-indicators/</loc>
		<lastmod>2019-09-25T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-are-new-technologies-like-ai-and-machine-learning-playing-a-role-in-cybersecurity/</loc>
		<lastmod>2019-09-25T17:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-mark-loveless-physical-opsec-as-a-metaphor-for-infosec/</loc>
		<lastmod>2019-09-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-privacy-by-design-matters-in-the-sdlc/</loc>
		<lastmod>2019-09-25T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/when-whac-a-mole-wont-work-fileless-malware/</loc>
		<lastmod>2019-09-25T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-future-of-web-security-is-in-the-cloud/</loc>
		<lastmod>2019-09-25T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/facebookery-liar-liar-hoodies-on-fire/</loc>
		<lastmod>2019-09-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-any-web-browser-is-still-not-safe/</loc>
		<lastmod>2019-09-25T21:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/3-soar-solution-pitfalls-to-avoid-when-implementing/</loc>
		<lastmod>2019-09-26T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/interview-with-the-guy-who-tried-to-frame-me-for-heroin-possession/</loc>
		<lastmod>2019-09-26T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/beginning-fuzz-cycle-automation-improving-testing-and-fuzz-development-with-coverage-analysis/</loc>
		<lastmod>2019-09-26T01:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/best-practices-for-using-tripwire-enterprise-in-dynamic-environments-part-1/</loc>
		<lastmod>2019-09-26T04:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/join-tripwire-vert-at-sector-2019/</loc>
		<lastmod>2019-09-26T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/free-decryptors-released-for-two-ransomware-families/</loc>
		<lastmod>2019-09-26T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/identity-based-cryptography/</loc>
		<lastmod>2019-09-26T07:35:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/on-chinese-spy-trains/</loc>
		<lastmod>2019-09-26T11:21:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/phishing-a-popular-tactic-in-cyber-crime/</loc>
		<lastmod>2019-09-26T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/raspberry-pi-wifi-access-point-with-tls-inspection/</loc>
		<lastmod>2019-09-26T11:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/are-you-ready-for-the-ccpa/</loc>
		<lastmod>2019-09-26T12:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cyberark-privilege-cloud-now-available-on-aws-marketplace/</loc>
		<lastmod>2019-09-26T13:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cysa-versus-casp-is-the-cysa-good-enough-for-a-career-in-cybersecurity/</loc>
		<lastmod>2019-09-26T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-what-is-vulnerability-identification/</loc>
		<lastmod>2019-09-26T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-breaking-cryptography-for-hackers/</loc>
		<lastmod>2019-09-26T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/windows-10-backup-and-recovery-options/</loc>
		<lastmod>2019-09-26T13:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/attackers-are-quick-to-exploit-vbulletins-latest-0-day-remote-code-execution-vulnerability/</loc>
		<lastmod>2019-09-26T13:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/secureages-ai-powered-apex-anti-malware-engine-comes-out-of-beta-for-secureaplus-users/</loc>
		<lastmod>2019-09-26T13:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/who-is-reading-your-ceos-email-and-how-to-stop-it/</loc>
		<lastmod>2019-09-26T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-tech-the-march-begins-to-make-mobile-app-security-more-robust-than-legacy-pc-security/</loc>
		<lastmod>2019-09-26T14:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wordpress-sites-hacked-through-defunct-rich-reviews-plugin/</loc>
		<lastmod>2019-09-26T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/percentage-based-url-encoding-used-by-phishers-to-evade-detection/</loc>
		<lastmod>2019-09-26T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-phishing-industry/</loc>
		<lastmod>2019-09-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-url-filtering-fails-users-and-what-you-should-do/</loc>
		<lastmod>2019-09-26T15:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/exploring-and-improving-the-fundamental-strategies-of-cybersecurity/</loc>
		<lastmod>2019-09-26T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-alex-smolens-the-kids-arent-alright-security-and-privacy-in-the-k-12-classroom/</loc>
		<lastmod>2019-09-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/gaming-companies-beware-cyber-criminals-are-coming-for-you-too/</loc>
		<lastmod>2019-09-26T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-math-work/</loc>
		<lastmod>2019-09-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/crowdstrike-ukraine-explained/</loc>
		<lastmod>2019-09-26T17:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/five-takeaways-from-confidential-conversations-are-they-actually-possible/</loc>
		<lastmod>2019-09-26T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-state-of-malware-analysis-advice-from-the-trenches/</loc>
		<lastmod>2019-09-26T17:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-periwinkle-doerflers-something-you-have-and-someone-you-know-designing-for-interpersonal-security/</loc>
		<lastmod>2019-09-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/choosing-the-right-https-certificate-for-your-wordpress-website/</loc>
		<lastmod>2019-09-26T18:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/know-your-audience-to-make-the-case-for-appsec/</loc>
		<lastmod>2019-09-26T18:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cyber-risk-management-2019-insights-from-microsoft-marsh-deloitte/</loc>
		<lastmod>2019-09-26T18:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vmware-esxi-command-injection-vulnerability/</loc>
		<lastmod>2019-09-26T18:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/quantum-internet/</loc>
		<lastmod>2019-09-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/industry-experts-provide-tips-for-successful-cyber-diligence-in-ma/</loc>
		<lastmod>2019-09-26T19:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/coverity-release-ties-in-well-to-the-latest-mitre-cwe-top-25/</loc>
		<lastmod>2019-09-26T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/2019-could-be-a-record-breaking-year-for-data-breaches/</loc>
		<lastmod>2019-09-26T19:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/automating-the-stupid-out-of-cloud/</loc>
		<lastmod>2019-09-26T20:25:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/interview-https-interception-tls-fingerprinting-and-the-browser/</loc>
		<lastmod>2019-09-26T20:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/whats-next-for-technology-and-renewable-energy/</loc>
		<lastmod>2019-09-26T20:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/compliance-is-only-the-tip-of-the-cloud-security-iceberg/</loc>
		<lastmod>2019-09-26T21:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-zero-day-pre-auth-vulnerability-is-currently-being-exploited-in-vbulletin-reports-an-anonymous-researcher/</loc>
		<lastmod>2019-09-26T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/keeping-your-business-safe-in-the-cloud-era/</loc>
		<lastmod>2019-09-26T21:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ecuadors-population-exposed-in-data-breach/</loc>
		<lastmod>2019-09-26T21:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/magecart-hits-again-leveraging-compromised-sites-and-newly-registered-domains/</loc>
		<lastmod>2019-09-26T22:57:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-security-threats-are-posed-by-drones-avast/</loc>
		<lastmod>2019-09-26T22:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/lion-air-data-breach-another-misconfigured-s3-bucket/</loc>
		<lastmod>2019-09-27T00:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-cybersecurity-pros-need-to-be-good-storytellers/</loc>
		<lastmod>2019-09-27T03:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/aaron-zar-co-founder-and-ceo-of-silent-pocket/</loc>
		<lastmod>2019-09-27T04:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/pci-london/</loc>
		<lastmod>2019-09-27T09:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/polish-retailer-gets-e645000-fine-under-gdpr-for-insufficient-organizational-and-technical-safeguards/</loc>
		<lastmod>2019-09-27T11:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-code-injection-and-how-to-avoid-it/</loc>
		<lastmod>2019-09-27T12:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/romance-scams-stealing-hearts-money/</loc>
		<lastmod>2019-09-27T13:44:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-ciso-must-be-included-in-any-sd-wan-discussion/</loc>
		<lastmod>2019-09-27T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/my-take-perimeter-less-computing-requires-cyber-defenses-to-extend-deeper-further-forward/</loc>
		<lastmod>2019-09-27T14:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/demonstrating-defense-grade-cybersecurity-at-nias19-3/</loc>
		<lastmod>2019-09-27T15:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/usenix-enigma-2019-tudor-dumitras-how-to-predict-which-vulnerabilities-will-be-exploited/</loc>
		<lastmod>2019-09-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/mypayrollhr-ceo-arrested-admits-to-70m-fraud/</loc>
		<lastmod>2019-09-27T16:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-joy-of-tech-puppy-return/</loc>
		<lastmod>2019-09-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/superhero-movies-and-security-lessons/</loc>
		<lastmod>2019-09-27T17:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/iranian-hackers-host-phony-u-s-veterans-site-avast/</loc>
		<lastmod>2019-09-27T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/divergent-malware-using-nodejs-windivert-in-fileless-attacks/</loc>
		<lastmod>2019-09-27T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-nick-landers-flying-a-false-flag-advanced-c2-trust-conflicts-and-domain-takeover/</loc>
		<lastmod>2019-09-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/100-stacked-chicklets/</loc>
		<lastmod>2019-09-27T18:15:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/tethered-jailbreaks-are-back/</loc>
		<lastmod>2019-09-27T19:09:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/doordash-data-breach-leaks-personal-details-of-4-9-million-customers-workers-and-merchants/</loc>
		<lastmod>2019-09-27T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-has-ethical-hacking-benefited-the-software-industry/</loc>
		<lastmod>2019-09-27T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/companies-leave-themselves-exposed-to-known-vulnerabilities/</loc>
		<lastmod>2019-09-27T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/nexus-intelligence-insights-cve-2019-15753-openstack-os-vif-denial-of-service-information-exposure/</loc>
		<lastmod>2019-09-27T21:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fortiguard-labs-weekly-threat-update-week-of-27-september-2019/</loc>
		<lastmod>2019-09-28T02:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/we-know-what-pki-is-but-do-we-know-what-it-may-be/</loc>
		<lastmod>2019-09-28T05:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/russian-hacker-pleads-guilty-in-stock-market-fraud-case-avast/</loc>
		<lastmod>2019-09-28T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-matt-prevosts-how-do-cyber-insurers-view-the-world/</loc>
		<lastmod>2019-09-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/luke-kingmas-lou-patrick-mackays-futurism-comics-release-it/</loc>
		<lastmod>2019-09-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-2019-orange-tsais-meh-changs-infiltrating-corporate-intranet-like-nsa-pre-auth-rce-on-leading-ssl-vpns/</loc>
		<lastmod>2019-09-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/german-cops-raid-cyberbunker-2-0-arrest-7-in-child-porn-dark-web-market-sting/</loc>
		<lastmod>2019-09-28T23:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cybersec-ai-prague-speaker-nicolas-papernot-on-principles-of-ai-avast/</loc>
		<lastmod>2019-09-29T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-james-pavurs-gdparrrrr-using-privacy-laws-to-steal-identities/</loc>
		<lastmod>2019-09-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/robert-m-lees-jeff-hass-little-bobby-comics-proof/</loc>
		<lastmod>2019-09-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-rebecca-lynch-s-woke-hiring-wont-save-us-an-actionable-approach-to-diversity-hiring-and-retention/</loc>
		<lastmod>2019-09-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/book-review-cyber-risk-leaders-global-c-suite-insights/</loc>
		<lastmod>2019-09-29T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/less-than-100-days-till-a-new-california-privacy-law-goes-into-effect/</loc>
		<lastmod>2019-09-30T02:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/securing-your-cloud-to-support-successful-ma/</loc>
		<lastmod>2019-09-30T03:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/doordash-data-breach-voice-assistant-privacy-changes-limiting-ad-tracking/</loc>
		<lastmod>2019-09-30T04:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sector-2019-hack-lab-sneak-peak/</loc>
		<lastmod>2019-09-30T08:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ideas-and-innovations-at-defcon-2019/</loc>
		<lastmod>2019-09-30T08:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/becoming-optimus-prime-within-your-appsec-initiatives/</loc>
		<lastmod>2019-09-30T10:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-future-of-cybersecurity-training-subscription-based-learning-cyber-work-podcast/</loc>
		<lastmod>2019-09-30T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/examining-the-ryuk-ransomware/</loc>
		<lastmod>2019-09-30T11:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/it-portal-feature-pci-pal-survey-examines-data-breach-repercussions-for-organisations/</loc>
		<lastmod>2019-09-30T12:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-cloudfathers-the-latest-cybersecurity-findings-for-fortune-500/</loc>
		<lastmod>2019-09-30T12:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hack-strikes-words-with-friends-and-draw-something-amid-claims-218-million-players-details-breached/</loc>
		<lastmod>2019-09-30T13:16:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/phishing-as-a-service/</loc>
		<lastmod>2019-09-30T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/windows-10-authentication-mechanisms/</loc>
		<lastmod>2019-09-30T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/malware-spotlight-what-is-ransomware/</loc>
		<lastmod>2019-09-30T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-respected-providers-of-it-security-training/</loc>
		<lastmod>2019-09-30T13:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/protect-your-sensitive-content-with-these-ten-best-practices/</loc>
		<lastmod>2019-09-30T15:18:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-tech-breakthrough-homomorphic-like-encryption-protects-data-in-use-without-penalties/</loc>
		<lastmod>2019-09-30T15:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-nathan-haukes-david-renardys-denial-of-service-with-a-fistful-of-packets-exploiting-algorithmic-complexity-vulnerabilities/</loc>
		<lastmod>2019-09-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-iphone-exploit-checkm8-is-unpatchable-and-can-possibly-lead-to-permanent-jailbreak-on-iphones/</loc>
		<lastmod>2019-09-30T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/researchers-release-a-study-into-bug-bounty-programs-and-responsible-disclosure-for-ethical-hacking-in-iot/</loc>
		<lastmod>2019-09-30T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cisos-must-incorporate-employee-training-when-developing-security-strategy/</loc>
		<lastmod>2019-09-30T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/free-rugby-world-cup-streaming-service-can-be-a-foul-play/</loc>
		<lastmod>2019-09-30T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-proactive-is-your-software-security-initiative/</loc>
		<lastmod>2019-09-30T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/xkcd-my-hobby-drone-fishing/</loc>
		<lastmod>2019-09-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/twisting-shouting/</loc>
		<lastmod>2019-09-30T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/vaimo-chooses-sumo-logic-to-deliver-secure-ecommerce-experience/</loc>
		<lastmod>2019-09-30T17:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ethical-hacking-log-tampering-101/</loc>
		<lastmod>2019-09-30T17:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/black-hat-usa-2019-uriel-malins-sara-bitans-avishai-wools-eli-bihams-rogue7-rogue-engineering-station-attacks-on-s7-simatic-plcs/</loc>
		<lastmod>2019-09-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/microsoft-decides-to-finally-block-additional-files-in-owa-subsequently-provides-workarounds-to-carry-on-transmitting-them/</loc>
		<lastmod>2019-09-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/account-for-third-party-vendors-in-your-insider-threat-security-program/</loc>
		<lastmod>2019-09-30T19:19:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ransomware-attacks-against-small-towns-require-collective-defense-2/</loc>
		<lastmod>2019-09-30T21:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/divvyclouds-ribbon-cutting-ceremony-for-new-corporate-hqs-in-arlington-va/</loc>
		<lastmod>2019-09-30T21:46:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/supply-chain-security-and-trust/</loc>
		<lastmod>2019-09-30T21:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/why-multi-factor-authentication-mfa-is-a-must-have-in-the-microsoft-world-and-beyond/</loc>
		<lastmod>2019-09-30T21:57:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/forrester-cybersecurity-requires-the-right-tools-not-more-tools/</loc>
		<lastmod>2019-09-30T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/book-review-cyber-risk-leaders-global-c-suite-insights-2/</loc>
		<lastmod>2019-09-30T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/egobbler-malvertiser-bypassed-browser-protections-using-obscure-bugs/</loc>
		<lastmod>2019-09-30T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/evaluating-a-soar-platform-make-sure-to-ask-your-vendor-these-11-questions-2/</loc>
		<lastmod>2019-10-01T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/11-questions-to-ask-when-evaluating-a-soar-platform/</loc>
		<lastmod>2019-10-01T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/linux-security-simplified-how-to-make-linux-more-secure-with-less-work/</loc>
		<lastmod>2019-10-01T00:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/zfs-0-8-2-releases-with-support-for-2-6-32-5-3-linux-kernels-and-major-bug-fixes/</loc>
		<lastmod>2019-10-01T01:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/10-times-ethical-hackers-spotted-a-software-vulnerability-and-averted-a-crisis/</loc>
		<lastmod>2019-10-01T01:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/amazon-smart-glasses-webkey-social-engineering-erase-your-old-hard-drives/</loc>
		<lastmod>2019-10-01T03:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/cyber-threats-to-medical-imaging-systems-and-how-to-address-them/</loc>
		<lastmod>2019-10-01T04:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/we-need-to-talk-about-go/</loc>
		<lastmod>2019-10-01T07:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-tips-for-defending-against-the-owasp-top-10/</loc>
		<lastmod>2019-10-01T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-protect-your-employees-when-threat-actors-leverage-legitimate-infrastructure/</loc>
		<lastmod>2019-10-01T08:12:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/overcoming-the-top-5-pain-points-for-network-and-firewall-admins/</loc>
		<lastmod>2019-10-01T08:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hell-hath-no-fury-like-a-consumer-scorned/</loc>
		<lastmod>2019-10-01T10:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-network-security-takeaways-from-the-2019-threatscape-report/</loc>
		<lastmod>2019-10-01T11:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nsa-on-the-future-of-national-cybersecurity/</loc>
		<lastmod>2019-10-01T11:54:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-peek-behind-the-curtain/</loc>
		<lastmod>2019-10-01T12:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/32-hardware-and-firmware-vulnerabilities/</loc>
		<lastmod>2019-10-01T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-mid-career-cybersecurity-engineer/</loc>
		<lastmod>2019-10-01T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wireless-security-in-windows-10/</loc>
		<lastmod>2019-10-01T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/netsparker-standard-5-4-september-2019-update/</loc>
		<lastmod>2019-10-01T13:51:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/training-not-sinking-in-try-a-programmatic-approach/</loc>
		<lastmod>2019-10-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/danish-firm-says-costs-of-apparent-ransomware-attack-could-reach-95m/</loc>
		<lastmod>2019-10-01T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-in-house-bot-management-solutions-are-unreliable/</loc>
		<lastmod>2019-10-01T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-top-3-security-mistakes-saas-companies-are-making/</loc>
		<lastmod>2019-10-01T14:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fugue-adopts-open-policy-agent-opa-for-its-policy-as-code-framework-for-cloud-security/</loc>
		<lastmod>2019-10-08T13:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/black-hat-usa-2019-marie-sarah-lacharites-breaking-encrypted-databases-generic-attacks-on-range-queries/</loc>
		<lastmod>2019-10-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/doordash-remote-vendor-access-security-goes-out-the-window/</loc>
		<lastmod>2019-10-01T16:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-cybersecurity-awareness-month-will-make-you-scream/</loc>
		<lastmod>2019-10-01T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mariposa-botnet-author-darkcode-crime-forum-admin-arrested-in-germany/</loc>
		<lastmod>2019-10-01T16:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-checkm8/</loc>
		<lastmod>2019-10-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-attitudes-of-cybersecurity-professionals-around-the-world/</loc>
		<lastmod>2019-10-01T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/synopsys-cso-deirdre-hanford-champions-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-01T17:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/black-hat-usa-2019-christoffer-jerkebys-command-injection-in-f5-irules/</loc>
		<lastmod>2019-10-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-does-security-matter-for-devops/</loc>
		<lastmod>2019-10-01T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-research-from-imperva-bot-management-tracks-gift-card-abuse/</loc>
		<lastmod>2019-10-01T18:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/digital-identity-management-5-ways-to-win-customer-trust/</loc>
		<lastmod>2019-10-01T20:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/this-week-in-cybersecurity-september-27/</loc>
		<lastmod>2019-10-01T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-reasons-why-you-should-work-at-balbix-and-3-reasons-why-you-should-not/</loc>
		<lastmod>2019-10-01T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/the-tech-hikers-guide-to-outthinking-hackers/</loc>
		<lastmod>2019-10-01T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/effective-cybersecurity-requires-threat-intelligence-and-comprehensive-visibility/</loc>
		<lastmod>2019-10-01T22:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/an-unpatched-vulnerability-in-nsas-ghidra-allows-a-remote-attacker-to-compromise-exposed-systems/</loc>
		<lastmod>2019-10-02T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ton-telegrams-decentralized-blockchain-network-face-mixed-reactions-from-financial-regulators-as-more-information-is-needed/</loc>
		<lastmod>2019-10-02T02:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/revisiting-and-revising-some-tips-for-national-cyber-security-awareness-month/</loc>
		<lastmod>2019-10-02T04:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-will-the-cmmc-impact-my-business-and-how-can-we-prepare-part-3-of-3/</loc>
		<lastmod>2019-10-02T04:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/menlos-cloud-security-platform-protects-users-from-cryptomining-attack/</loc>
		<lastmod>2019-10-02T07:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-threat-detection-deficit-microsoft-office-365-atp-raises-the-stakes/</loc>
		<lastmod>2019-10-02T08:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mfa-for-windows-login-to-address-the-vulnerabilities-of-corporate-passwords/</loc>
		<lastmod>2019-10-02T09:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/study-finds-surprising-similarities-between-cyber-risk-and-problem-gambling/</loc>
		<lastmod>2019-10-02T11:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/seven-habits-of-a-risk-ready-digital-enterprise/</loc>
		<lastmod>2019-10-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/glass-class-how-to-detect-malware/</loc>
		<lastmod>2019-10-02T12:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-healthy-bot-management-strategy/</loc>
		<lastmod>2019-10-02T12:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/attackers-targeting-u-s-petroleum-companies-with-adwind-rat/</loc>
		<lastmod>2019-10-02T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pci-pal-named-compliance-software-solution-provider-of-the-year-award-in-2019-cybersecurity-breakthrough-award-program/</loc>
		<lastmod>2019-10-02T14:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cocoapods-and-conda-in-nexus-repository-3-19/</loc>
		<lastmod>2019-10-02T14:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-research-into-russian-malware/</loc>
		<lastmod>2019-10-02T15:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-security-roundup-for-september-2019/</loc>
		<lastmod>2019-10-02T15:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-secret-to-ciso-success-do-this-one-thing-extremely-well/</loc>
		<lastmod>2019-10-02T15:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ethical-hacking-passive-information-gathering-with-maltego/</loc>
		<lastmod>2019-10-02T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-late-career-cybercrime-analyst-investigator/</loc>
		<lastmod>2019-10-02T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/typical-goals-of-a-behavior-change-program/</loc>
		<lastmod>2019-10-02T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-lee-whitfields-ready-forensicator-one/</loc>
		<lastmod>2019-10-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/but-we-have-an-email-gateway/</loc>
		<lastmod>2019-10-02T17:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/field-ciso-qa-alain-sanchez/</loc>
		<lastmod>2019-10-02T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-fresh-pears/</loc>
		<lastmod>2019-10-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/which-countries-store-the-most-photos-avast/</loc>
		<lastmod>2019-10-02T17:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-many-of-the-photos-that-we-store-are-bad-avast/</loc>
		<lastmod>2019-10-02T17:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-researcher-helps-expose-banking-botnet-geost-avast/</loc>
		<lastmod>2019-10-02T17:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/simple-rules-for-smart-iam-solutions-part-2-contexts-the-data-science-behind/</loc>
		<lastmod>2019-10-02T17:40:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-david-szilis-advanced-zeek-usage-scripting-and-framework/</loc>
		<lastmod>2019-10-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/seeker-faq-interactive-application-security-testing-and-ci-cd/</loc>
		<lastmod>2019-10-02T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/backups-were-government-it-we-dont-need-no-stinkin-backups/</loc>
		<lastmod>2019-10-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wireless-pentesting-part-1-an-overview/</loc>
		<lastmod>2019-10-02T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/streamline-cybersecurity-with-alert-logic-and-aws-security-hub/</loc>
		<lastmod>2019-10-02T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-im-not-sold-on-machine-learning-in-autonomous-security-some-hard-realities-on-the-limitations-of-machine-learning-in-autonomous-netsec/</loc>
		<lastmod>2019-10-02T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-chaos-engineering-can-help-predict-and-prevent-cyber-attacks-preemptively/</loc>
		<lastmod>2019-10-03T00:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-practices-for-using-tripwire-enterprise-in-dynamic-environments-part-2/</loc>
		<lastmod>2019-10-03T05:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-reasons-why-wordpress-websites-get-hacked-and-how-you-can-stop-it/</loc>
		<lastmod>2019-10-03T06:21:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/data-security-and-the-as-a-service-economy/</loc>
		<lastmod>2019-10-03T06:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/school-districts-remain-vulnerable-to-cyber-attacks/</loc>
		<lastmod>2019-10-03T08:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tsc-frequency-for-all-better-profiling-and-benchmarking/</loc>
		<lastmod>2019-10-03T10:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/30-days-of-free-training-breaking-into-cybersecurity-with-comptia/</loc>
		<lastmod>2019-10-03T11:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/measuring-the-security-of-iot-devices/</loc>
		<lastmod>2019-10-03T11:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/three-alabama-hospitals-hit-by-ryuk-ransomware-ambulances-turned-away/</loc>
		<lastmod>2019-10-03T11:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/where-cloud-security-fits-in-your-cybersecurity-infrastructure/</loc>
		<lastmod>2019-10-03T11:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/discovery-of-geost-botnet-made-possible-by-attacker-opsec-fails/</loc>
		<lastmod>2019-10-03T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/are-you-really-cyber-aware/</loc>
		<lastmod>2019-10-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ios-9-x-wi-fi-connectivity-issue-with-eap-ttls-and-eap-peap-explained/</loc>
		<lastmod>2019-10-03T12:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-to-efficiently-onboard-thousands-of-devices/</loc>
		<lastmod>2019-10-03T12:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-cybersecurity-myths-that-criminals-love/</loc>
		<lastmod>2019-10-03T12:56:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mitre-attck-clipboard-data/</loc>
		<lastmod>2019-10-03T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dods-cybersecurity-maturity-model-certification-cmmc-initiative/</loc>
		<lastmod>2019-10-03T13:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortigate-ngips-receives-third-consecutive-recommended-rating-from-nss-labs/</loc>
		<lastmod>2019-10-03T13:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/securing-branch-office-iot/</loc>
		<lastmod>2019-10-03T13:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/using-multi-factor-authentication-for-network-security/</loc>
		<lastmod>2019-10-03T14:54:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/my-take-peerlyst-shares-infosec-intel-recognizes-last-watchdog-as-a-top-cybersecurity-influencer/</loc>
		<lastmod>2019-10-03T14:57:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/kotlin-guide-why-we-need-mobile-application-secure-coding-practices/</loc>
		<lastmod>2019-10-03T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wpa2-psk-is-not-enough/</loc>
		<lastmod>2019-10-03T15:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-mark-hallmans-enabling-kape-at-scale/</loc>
		<lastmod>2019-10-03T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ansiblefest-cyberark-presents-ansible-tower-integration/</loc>
		<lastmod>2019-10-03T16:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/certificate-lifetimes-is-20-years-too-long/</loc>
		<lastmod>2019-10-03T16:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/assessing-business-outcomes-of-cybersecurity/</loc>
		<lastmod>2019-10-03T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-zuckerbergs-qa/</loc>
		<lastmod>2019-10-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shared-intel-threat-actors-add-a-human-touch-to-boost-effectiveness-of-automated-attacks/</loc>
		<lastmod>2019-10-03T17:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/follow-the-link-exploiting-symbolic-links-with-ease/</loc>
		<lastmod>2019-10-03T17:20:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/divvycloud-named-a-global-leader-in-cloud-security/</loc>
		<lastmod>2019-10-03T17:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/software-testing-tools-checklist-do-your-tools-empower-your-developers/</loc>
		<lastmod>2019-10-03T17:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/it-pays-to-discover-sonatype/</loc>
		<lastmod>2019-10-03T17:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-lenny-zeltsers-jake-williams-anuj-sonis-evan-dygerts-jim-clausings-the-state-of-malware-analysis-advice-from-the-trenches/</loc>
		<lastmod>2019-10-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/comparison-of-user-authentication-methods-on-three-parameters/</loc>
		<lastmod>2019-10-03T18:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/uk-youngsters-seeking-to-win-the-european-cyber-security-challenge/</loc>
		<lastmod>2019-10-03T18:40:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/emerging-technologies-turn-security-into-everyones-responsibility-explore-the-future-securely-with-bitdefender-at-gitex-2019/</loc>
		<lastmod>2019-10-03T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/does-your-business-have-a-cybersecurity-weak-spot/</loc>
		<lastmod>2019-10-03T18:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/classic-facebookery-zuckerberg-harms-suffered/</loc>
		<lastmod>2019-10-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/protecting-loyalty-accounts-and-rewards-programs/</loc>
		<lastmod>2019-10-03T19:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-leaders-launch-initiative-for-interoperability-and-data-sharing-to-thwart-attacks/</loc>
		<lastmod>2019-10-08T10:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avoid-byod-headaches-by-offering-a-secure-and-automated-onboarding-solution/</loc>
		<lastmod>2019-10-03T20:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/leveraging-the-cyber-high-ground-how-to-win-the-endpoint-battle/</loc>
		<lastmod>2019-10-03T20:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wpa2-enterprise-authentication-protocols-comparison/</loc>
		<lastmod>2019-10-03T20:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fbi-dont-pay-ransomware-demands-stop-encouraging-cybercriminals-to-target-others/</loc>
		<lastmod>2019-10-03T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-security-professional-development-educational-resource-roundup/</loc>
		<lastmod>2019-10-03T21:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enterprise-devsecops-new-series/</loc>
		<lastmod>2019-10-03T21:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ethical-hacking-how-to-crack-long-passwords/</loc>
		<lastmod>2019-10-03T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/6-tips-to-prevent-social-engineering/</loc>
		<lastmod>2019-10-03T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-tips-to-protect-your-reputation-when-a-crisis-hits/</loc>
		<lastmod>2019-10-03T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wpa2-packet-frame-format/</loc>
		<lastmod>2019-10-03T22:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/osano-launches-data-privacy-and-compliance-platform/</loc>
		<lastmod>2019-10-03T23:08:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-closed-loop-workflows-are-essential-for-strong-web-security/</loc>
		<lastmod>2019-10-03T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/multiple-d-link-routers-found-vulnerable-to-unauthenticated-remote-code-execution/</loc>
		<lastmod>2019-10-04T03:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-future-of-data-protection-begins-at-gitex-2019/</loc>
		<lastmod>2019-10-04T05:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/iot-adoption-doesnt-have-to-be-scary/</loc>
		<lastmod>2019-10-04T05:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-know-which-firms-are-iso-27001-certified-2/</loc>
		<lastmod>2019-10-04T05:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-is-a-shared-responsibility-so-own-it-secure-it-and-protect-it/</loc>
		<lastmod>2019-10-04T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortune-500-companies-take-cyber-security-for-granted/</loc>
		<lastmod>2019-10-04T07:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-security-awareness-month-checklist-for-a-cyberaware-life/</loc>
		<lastmod>2019-10-04T07:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/my-take-the-case-for-assessing-quantifying-risks-as-the-first-step-to-defending-network-breaches/</loc>
		<lastmod>2019-10-04T08:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tripwire-patch-priority-index-for-september-2019/</loc>
		<lastmod>2019-10-04T10:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fbi-fraud-arrests-by-field-office-2018/</loc>
		<lastmod>2019-10-04T12:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/android-0-day-exploit-granting-attackers-root-access-found-running-in-the-wild/</loc>
		<lastmod>2019-10-04T12:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/former-yahoo-employee-admits-he-hacked-6000-users-accounts-stole-nude-photos-and-videos/</loc>
		<lastmod>2019-10-04T12:45:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-awareness-month-2019-the-three-little-pigs/</loc>
		<lastmod>2019-10-04T12:53:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/621-u-s-government-schools-and-healthcare-entities-are-impacted-by-ransomware-attacks-since-january19-highlights-emisoft-report/</loc>
		<lastmod>2019-10-04T13:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/multi-party-computation-on-machine-learning/</loc>
		<lastmod>2019-10-04T14:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fda-warns-medical-devices-could-be-hacked/</loc>
		<lastmod>2019-10-04T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/egobbler-infects-more-than-1-billion-ads-in-worldwide-campaign/</loc>
		<lastmod>2019-10-04T14:30:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/three-key-challenges-for-securing-cloud-native-apps-lessons-learned-from-cloud-native-security-summit-2019/</loc>
		<lastmod>2019-10-04T15:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-katie-nickels-the-cycle-of-cyber-threat-intelligence/</loc>
		<lastmod>2019-10-04T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-college-athletes/</loc>
		<lastmod>2019-10-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/more-cryptanalysis-of-solitaire/</loc>
		<lastmod>2019-10-04T17:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/loginradius-presents-at-kuppingercole-consumer-identity-world/</loc>
		<lastmod>2019-10-04T17:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/webinars-nvd-data-feed-alternatives-and-software-security-metrics/</loc>
		<lastmod>2019-10-04T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/healthcare-cybersecurity-part-i-an-ecosystem-overview-by-the-numbers-2/</loc>
		<lastmod>2019-10-04T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-richard-davis-introduction-to-arsenal-image-mounter/</loc>
		<lastmod>2019-10-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/webinar-creating-a-culture-of-cybersecurity-awareness/</loc>
		<lastmod>2019-10-04T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/comodo-takes-security-seriously-wait-what/</loc>
		<lastmod>2019-10-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/sd-wan-projects-must-involve-the-ciso/</loc>
		<lastmod>2019-10-04T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/an-unpatched-security-issue-in-the-kubernetes-api-is-vulnerable-to-a-billion-laughs-attack/</loc>
		<lastmod>2019-10-04T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/threat-discovery-attackers-are-abusing-adobe-open-redirect-service-to-serve-phishing/</loc>
		<lastmod>2019-10-04T20:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sonatype-hosts-global-gatherings-of-devsecops-leaders-and-innovators/</loc>
		<lastmod>2019-10-04T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/payment-card-security-incidents-disclosed-by-three-u-s-restaurant-chains/</loc>
		<lastmod>2019-10-05T01:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-next-generation-of-endpoint-security-avast-business/</loc>
		<lastmod>2019-10-05T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-sherrie-caltagirones-classifying-evil-lessons-from-hunting-human-traffickers/</loc>
		<lastmod>2019-10-05T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-hours-before-departure/</loc>
		<lastmod>2019-10-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-mari-degrazias-triage-collection-and-timeline-analysis-with-kape/</loc>
		<lastmod>2019-10-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-digital-age-maginot-line-as-foreseen-by-mel-brooks/</loc>
		<lastmod>2019-10-06T02:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-jim-clausings-a-ghidra-testdrive/</loc>
		<lastmod>2019-10-06T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-doughnuts/</loc>
		<lastmod>2019-10-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sans-dfir-jason-jordaans-understanding-the-forensic-science-in-digital-forensics/</loc>
		<lastmod>2019-10-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-nascio-is-still-growing-after-50-years/</loc>
		<lastmod>2019-10-06T20:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-quick-update-on-2019-mobile-predictions-made-in-january/</loc>
		<lastmod>2019-10-07T03:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/microsoft-onedrive-personal-vault-googles-new-privacy-and-security-controls-real-id-deadline/</loc>
		<lastmod>2019-10-07T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/you-cant-defend-what-you-cant-see-advanced-strategies-in-cybersecurity/</loc>
		<lastmod>2019-10-07T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/alabama-hospitals-pay-criminals-for-decryption-key-after-ransomware-attack/</loc>
		<lastmod>2019-10-07T07:36:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/combating-phishing-malware-and-hackers-cyber-work-podcast/</loc>
		<lastmod>2019-10-07T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/five-ways-to-secure-data-within-the-defense-supply-chain-2/</loc>
		<lastmod>2019-10-07T09:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ncsam-its-everyones-job-to-ensure-online-safety-at-work/</loc>
		<lastmod>2019-10-07T08:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/secure-configuration-in-cloud-iaas-paas-and-saas-explained/</loc>
		<lastmod>2019-10-07T08:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/automating-secure-configuration-management-in-the-cloud/</loc>
		<lastmod>2019-10-07T08:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pretending-about-cybersecurity-risks/</loc>
		<lastmod>2019-10-07T10:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-ethical-hackers-have-an-essential-part-to-play-in-protecting-enterprise-data-from-cybersecurity-threats/</loc>
		<lastmod>2019-10-07T10:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-importance-of-the-customers-feedback-in-product-design/</loc>
		<lastmod>2019-10-07T12:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/beware-of-fall-phishing-season/</loc>
		<lastmod>2019-10-07T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/small-city-of-cornelia-dodges-ransom-again-in-its-third-ransomware-attack-of-2019/</loc>
		<lastmod>2019-10-07T13:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/signal-sciences-launches-pivotal-container-service-pks-integration/</loc>
		<lastmod>2019-10-07T13:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bitglass-security-spotlight-a-step-by-step-guide-to-breach-instagram/</loc>
		<lastmod>2019-10-07T13:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hack-the-box-htb-machines-walkthrough-series-luke/</loc>
		<lastmod>2019-10-07T13:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-late-career-penetration-tester/</loc>
		<lastmod>2019-10-07T13:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ethical-hacking-basic-malware-analysis-tools/</loc>
		<lastmod>2019-10-07T13:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/decryption-keys-released-by-developer-of-hildacrypt-ransomware/</loc>
		<lastmod>2019-10-07T13:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-the-cia-triad-confidentiality-integrity-availability/</loc>
		<lastmod>2019-10-07T13:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/rethink-your-enterprise-data-protection-strategy/</loc>
		<lastmod>2019-10-07T14:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/7-password-problems-solved-by-enzoic-password-policy-enforcement/</loc>
		<lastmod>2019-10-07T15:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-tech-human-operatives-maintain-personas-prowl-the-dark-net-for-intel-to-help-companies/</loc>
		<lastmod>2019-10-07T15:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-derbycon-crews-opening-ceremony/</loc>
		<lastmod>2019-10-07T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/variables/</loc>
		<lastmod>2019-10-07T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/this-week-in-cybersecurity-october-4/</loc>
		<lastmod>2019-10-07T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/luke-kingmas-lou-patrick-mackays-futurism-comics-work-week/</loc>
		<lastmod>2019-10-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/3-reasons-real-estate-companies-invest-in-cybersecurity/</loc>
		<lastmod>2019-10-07T17:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-ed-skoudis-opening-keynote/</loc>
		<lastmod>2019-10-07T18:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->