<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/10/the-us-uk-and-australian-governments-call-facebooks-end-to-end-encryption-plan-a-hindrance-to-investigating-crimes/</loc>
		<lastmod>2019-10-07T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ncsc-investigates-several-vulnerabilities-in-vpn-products-from-pulse-secure-palo-alto-and-fortinet/</loc>
		<lastmod>2019-10-07T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/google-project-zero-discloses-a-zero-day-android-exploit-in-pixel-huawei-xiaomi-and-samsung-devices/</loc>
		<lastmod>2019-10-07T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/down-the-malware-rabbit-hole-part-1-2/</loc>
		<lastmod>2019-10-07T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-new-wave-of-buggy-wordpress-infections-2/</loc>
		<lastmod>2019-10-07T18:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/national-cybersecurity-awareness-month-2/</loc>
		<lastmod>2019-10-07T18:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/raising-awareness-wpbeginner-spotlight-2/</loc>
		<lastmod>2019-10-07T18:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/zero-day-rce-in-vbulletin-v5-0-0-v5-5-4-2/</loc>
		<lastmod>2019-10-07T18:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/joomla-security-best-practices-12-ways-to-keep-joomla-secure-2/</loc>
		<lastmod>2019-10-07T18:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-hacker-returns-a-backdoor-edition-2/</loc>
		<lastmod>2019-10-07T18:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fake-sso-used-in-multi-email-provider-phishing-2/</loc>
		<lastmod>2019-10-07T18:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/fake-human-verification-spam-2/</loc>
		<lastmod>2019-10-07T18:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/misuse-of-wordpress-update_option-function-leads-to-website-infections-2/</loc>
		<lastmod>2019-10-07T18:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/augment-your-legacy-iam/</loc>
		<lastmod>2019-10-07T19:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/dissecting-the-wordpress-5-2-3-update-2/</loc>
		<lastmod>2019-10-07T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ask-the-experts-how-can-software-engineers-support-security-efforts/</loc>
		<lastmod>2019-10-07T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/reverse-engineering-intellectual-property-chip-ptychographic-x-ray-laminography/</loc>
		<lastmod>2019-10-07T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devsecops-for-a-dollar-or-less/</loc>
		<lastmod>2019-10-07T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/zero-day-snafus%e2%80%8a-%e2%80%8ahunting-memory-allocation-bugs/</loc>
		<lastmod>2019-10-07T21:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-the-cost-of-cybercrimes-attacks/</loc>
		<lastmod>2019-10-07T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/abcs-of-ueba-l-is-for-logs/</loc>
		<lastmod>2019-10-07T23:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/airbus-attacked-by-avivore-chinas-bird-eater/</loc>
		<lastmod>2019-10-08T01:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/guest-blog-the-benefits-of-nciphers-new-service-based-hsm/</loc>
		<lastmod>2019-10-08T06:18:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortiguard-labs-weekly-threat-update-week-of-04-october-2019/</loc>
		<lastmod>2019-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/analysis-of-a-new-golang-ransomware-targeting-linux-systems/</loc>
		<lastmod>2019-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/threat-intelligence-lies-at-the-core-of-all-machine-learning-and-ai/</loc>
		<lastmod>2019-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortinet-joins-the-open-cybersecurity-alliance-to-participate-in-new-industry-open-source-initiative/</loc>
		<lastmod>2019-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/patch-tuesday-update-october-8-2019/</loc>
		<lastmod>2019-10-08T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/drastic-cloud-security-mistakes-no-one-should-make/</loc>
		<lastmod>2019-10-08T08:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-current-challenges-socs-face-and-how-to-help/</loc>
		<lastmod>2019-10-08T08:45:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-top-five-things-to-do-to-prepare-your-contact-center-for-the-california-consumer-privacy-act/</loc>
		<lastmod>2019-10-08T08:48:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-unpatchable-iphone-exploit-allows-jailbreaking/</loc>
		<lastmod>2019-10-08T10:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nascio-still-growing-after-50-years-of-serving-states/</loc>
		<lastmod>2019-10-08T10:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/zeekweek-2019-5-things-network-security-pros-should-know-about-zeek/</loc>
		<lastmod>2019-10-08T11:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-three-most-common-mining-industry-cyber-threats/</loc>
		<lastmod>2019-10-08T11:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/instagram-launches-new-feature-to-help-users-identify-phishing-emails/</loc>
		<lastmod>2019-10-08T12:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-evaluate-your-devops-secrets-management-program/</loc>
		<lastmod>2019-10-08T13:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-sentiment-after-a-summer-of-headlines/</loc>
		<lastmod>2019-10-08T13:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/findings-from-the-threat-stack-q3-2019-soc-report/</loc>
		<lastmod>2019-10-08T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/instagram-app-ads-tool-to-prevent-phishing-scams/</loc>
		<lastmod>2019-10-08T13:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/women-in-security-our-podcast-guests/</loc>
		<lastmod>2019-10-08T14:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-advanced-career-cybersecurity-engineer/</loc>
		<lastmod>2019-10-08T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/windows-10-hardening-techniques/</loc>
		<lastmod>2019-10-08T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mitre-attck-browser-bookmark-discovery/</loc>
		<lastmod>2019-10-08T14:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/grease-the-skids-improve-training-successes-by-optimizing-the-environment/</loc>
		<lastmod>2019-10-08T15:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/hacktivity-2018-badge-quick-start-guide-for-beginners/</loc>
		<lastmod>2019-10-08T15:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-dustin-heywoods-evil-mog-and-others-derbycon-story-time-panel/</loc>
		<lastmod>2019-10-08T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-tadr/</loc>
		<lastmod>2019-10-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-choose-application-security-vendors-and-tools/</loc>
		<lastmod>2019-10-08T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/k-12-it-youre-not-a-child-psychologist/</loc>
		<lastmod>2019-10-08T17:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-chris-hadnagys-dynamic-risk-taking-and-social-engineering/</loc>
		<lastmod>2019-10-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/unlock-the-potential-of-security-keys/</loc>
		<lastmod>2019-10-08T18:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-and-digital-transformation-research-insight-from-zeronorth/</loc>
		<lastmod>2019-10-08T18:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/jon-preskills-why-i-called-it-quantum-supremacy/</loc>
		<lastmod>2019-10-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/security-instrumentation-for-the-casino-gaming-industry-by-brian-contos-2/</loc>
		<lastmod>2019-10-08T19:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-2019-patch-tuesday-59-vulns-9-critical-azure-app-service-remote-desktop-client-poc-for-windows-error-reporting/</loc>
		<lastmod>2019-10-08T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shine-a-light-on-third-party-threats-with-a-ciso-dashboard/</loc>
		<lastmod>2019-10-08T20:55:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/increasing-security-visibility-with-multiple-custom-dashboards/</loc>
		<lastmod>2019-10-08T21:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/your-nist-cybersecurity-framework-assessment-tool-what-to-look-for/</loc>
		<lastmod>2019-10-08T21:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-existential-crisis-of-a-waf/</loc>
		<lastmod>2019-10-08T22:38:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pulling-back-the-curtain-on-zip-file-overwrites/</loc>
		<lastmod>2019-10-08T22:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/challenges-and-pitfalls-of-diy-cybersecurity/</loc>
		<lastmod>2019-10-08T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/vert-threat-alert-october-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-10-09T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/this-is-why-cybersecurity-pros-cant-sleep-at-night-2/</loc>
		<lastmod>2019-10-09T00:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ncsc-cyber-essentials-scheme-to-be-streamlined/</loc>
		<lastmod>2019-10-09T01:12:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/an-indirect-way-to-change-cpanel-passwords/</loc>
		<lastmod>2019-10-09T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-developers-need-to-know-about-whatsapps-recent-security-dilemma/</loc>
		<lastmod>2019-10-09T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-security-of-data-in-the-cloud-is-your-responsibility-unveiling-the-2019-thales-cloud-security-study/</loc>
		<lastmod>2019-10-09T05:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/patch-tuesday-lowdown-october-2019-edition/</loc>
		<lastmod>2019-10-09T06:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/exploring-a-recent-magnitude-exploit-kit-sample/</loc>
		<lastmod>2019-10-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortinet-wins-professional-certification-program-of-the-year-award-in-2019-cybersecurity-breakthrough-awards-program/</loc>
		<lastmod>2019-10-09T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/twitter-used-private-security-information-to-better-target-ads/</loc>
		<lastmod>2019-10-09T07:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/channel-evolution-europe-2019/</loc>
		<lastmod>2019-10-09T10:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-sextortion-scam-uses-alternative-cryptocurrencies-to-evade-detection/</loc>
		<lastmod>2019-10-09T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/survey-93-of-ics-pros-fear-digital-attacks-will-affect-operations/</loc>
		<lastmod>2019-10-09T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-impact-of-digital-transformation-in-healthcare/</loc>
		<lastmod>2019-10-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/low-tech-social-engineering-attacks/</loc>
		<lastmod>2019-10-09T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malware-spotlight-what-is-a-virus/</loc>
		<lastmod>2019-10-09T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/gpen-vs-pentest/</loc>
		<lastmod>2019-10-09T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/introduction-to-windows-10-security/</loc>
		<lastmod>2019-10-09T13:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/developer-hacks-back-against-ransomware-attackers-and-steals-decryption-keys/</loc>
		<lastmod>2019-10-09T13:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-victim-hacks-attacker-turning-the-tables-by-stealing-decryption-keys/</loc>
		<lastmod>2019-10-09T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-ledger-podcast-security-automation-is-and-isnt-the-future-of-infosec/</loc>
		<lastmod>2019-10-09T15:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-adventures-of-ciso-ed-co/</loc>
		<lastmod>2019-10-09T15:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/reimagining-cloud-access/</loc>
		<lastmod>2019-10-09T15:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-john-strands-well-what-have-we-here/</loc>
		<lastmod>2019-10-09T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shared-intel-what-it-takes-to-preserve-business-continuity-recover-quickly-from-a-cyber-disaster/</loc>
		<lastmod>2019-10-09T16:57:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/happy-ada-lovelace-day-by-brian-contos/</loc>
		<lastmod>2019-10-09T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/building-an-online-store-5-critical-cyber-security-actions-you-should-take-now/</loc>
		<lastmod>2019-10-09T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/what-is-phishing-types-scams-attacks-and-how-to-prevent-it/</loc>
		<lastmod>2019-10-09T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-cell-phone-functions/</loc>
		<lastmod>2019-10-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-3-threats-posed-by-third-party-vendors/</loc>
		<lastmod>2019-10-09T17:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cheating-at-professional-poker/</loc>
		<lastmod>2019-10-09T17:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-practices-for-secure-application-development/</loc>
		<lastmod>2019-10-09T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-dr-jared-demotts-john-stigerwalts-using-next-generation-fuzzing-tools-fixing-bugs-and-writing-memory-corruption-exploits/</loc>
		<lastmod>2019-10-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/illegal-data-center-hidden-in-former-nato-bunker/</loc>
		<lastmod>2019-10-09T18:33:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/luke-kingmas-lou-patrick-mackays-futurism-comics-autonomous/</loc>
		<lastmod>2019-10-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/online-identity-is-important-lets-upgrade-extended-validation/</loc>
		<lastmod>2019-10-09T19:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/browser-updates-round-up-continuing-the-push-for-https-everywhere/</loc>
		<lastmod>2019-10-09T19:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/speakers-censored-at-aisa-conference-in-melbourne/</loc>
		<lastmod>2019-10-09T20:17:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/making-sense-of-gdpr-avast/</loc>
		<lastmod>2019-10-09T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-ceo-and-garry-kasparov-speak-to-dtx-london-avast/</loc>
		<lastmod>2019-10-10T00:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/customers-choose-fortinet-secure-sd-wan-for-true-wan-edge-transformation/</loc>
		<lastmod>2019-10-10T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-open-source-cookbook-prepping-your-kitchen/</loc>
		<lastmod>2019-10-10T07:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-stay-safe-while-using-airport-wifi/</loc>
		<lastmod>2019-10-10T08:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/clearswifts-secure-email-gateway-wins-gold-at-golden-bridge-awards/</loc>
		<lastmod>2019-10-10T08:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-current-state-of-ccpa-what-you-need-to-know/</loc>
		<lastmod>2019-10-10T08:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-is-still-the-leading-online-threat-in-europe-according-to-europol/</loc>
		<lastmod>2019-10-10T10:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-cloud-dlp-fits-into-your-cybersecurity-infrastructure/</loc>
		<lastmod>2019-10-10T11:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/apple-zero-day-exploited-in-new-bitpaymer-campaign-2/</loc>
		<lastmod>2019-10-10T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-east-india-company-rockefeller-and-risk/</loc>
		<lastmod>2019-10-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/like-the-slinky-flexibility-never-goes-out-of-style/</loc>
		<lastmod>2019-10-10T12:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/phishing-attack-possibly-affected-68k-patients-of-the-methodist-hospitals/</loc>
		<lastmod>2019-10-10T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bricata-delivers-network-protection-with-enhanced-customization-features/</loc>
		<lastmod>2019-10-10T12:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/own-your-cloud-security/</loc>
		<lastmod>2019-10-10T13:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wi-fi-hotspot-tracking/</loc>
		<lastmod>2019-10-10T13:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shift-in-key-security-decision-makers-creates-new-risks-as-companies-migrate-applications-into-microservices/</loc>
		<lastmod>2019-10-10T13:39:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/20-devsecops-pros-reveal-the-most-important-considerations-in-building-a-devsecops-pipeline/</loc>
		<lastmod>2019-10-10T13:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/thunderbird-will-start-using-openpgp-encryption-in-2020/</loc>
		<lastmod>2019-10-10T13:51:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/my-take-casbs-help-companies-meet-shared-responsibility-for-complex-rising-cloud-risks/</loc>
		<lastmod>2019-10-10T13:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/updates-from-around-the-web-october-2019/</loc>
		<lastmod>2019-10-10T14:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-are-the-benefits-of-the-nist-cybersecurity-framework/</loc>
		<lastmod>2019-10-10T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/making-the-case-for-appsec-break-down-your-budget/</loc>
		<lastmod>2019-10-10T13:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/digicert-issues-verified-mark-certificate-to-cnn-laying-crucial-foundation-for-bimi-email-standard/</loc>
		<lastmod>2019-10-10T14:11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hack-the-box-htb-machines-walkthrough-series-secnotes/</loc>
		<lastmod>2019-10-10T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/doxing-a-comprehensive-threat-analysis/</loc>
		<lastmod>2019-10-10T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/gsec-vs-cysa/</loc>
		<lastmod>2019-10-10T14:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enterprise-devsecops-how-security-works-with-development/</loc>
		<lastmod>2019-10-10T14:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloudbees-and-synopsys-putting-sec-into-devsecops/</loc>
		<lastmod>2019-10-10T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/imperva-security-update/</loc>
		<lastmod>2019-10-10T15:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wrapping-up-the-2019-pwnthybytes-ctf/</loc>
		<lastmod>2019-10-10T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/understanding-ddos-attacks-a-guide-for-wordpress-administrators/</loc>
		<lastmod>2019-10-10T15:39:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/critical-security-vulnerability-disclosed-in-iterm2-app/</loc>
		<lastmod>2019-10-10T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-mathieu-saulniers-bloodhound-from-red-to-blue/</loc>
		<lastmod>2019-10-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bimi-leaps-forward-with-first-usable-vmc-certificate/</loc>
		<lastmod>2019-10-10T17:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-how-old/</loc>
		<lastmod>2019-10-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-cyber-security-awareness-show/</loc>
		<lastmod>2019-10-10T17:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-your-av-wont-stop-ryuk-ransomware/</loc>
		<lastmod>2019-10-10T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-matt-graebers-how-do-i-detect-technique-x-in-windows-applied-methodology-to-definitively-answer-this-question/</loc>
		<lastmod>2019-10-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-reductor-nation-state-malware-compromises-tls/</loc>
		<lastmod>2019-10-10T18:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/balbix-partners-with-elevenpaths-telefonica-cybersecurity-unit/</loc>
		<lastmod>2019-10-10T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/jacks-unfortunate-accident-a-tale-of-greed-disguised/</loc>
		<lastmod>2019-10-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mozillas-sponsored-security-audit-finds-a-critical-vulnerability-in-the-tmux-integration-feature-of-iterm2/</loc>
		<lastmod>2019-10-10T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avasts-robin-selden-on-rethinking-diversity-avast/</loc>
		<lastmod>2019-10-10T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nexus-intelligence-insights-sonatype-2017-0312-jackson-databind-the-end-of-the-blacklist/</loc>
		<lastmod>2019-10-10T20:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-steps-can-companies-take-to-adopt-a-zero-trust-approach-to-security/</loc>
		<lastmod>2019-10-10T21:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/five-tips-for-rapid-communications-when-an-incident-hits-the-water-distribution-system/</loc>
		<lastmod>2019-10-11T01:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enzoic-a-top-10-most-valuable-cybersecurity-solution-provider-in-the-ceo-views/</loc>
		<lastmod>2019-10-11T02:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wheres-the-roi-in-security/</loc>
		<lastmod>2019-10-11T06:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortiguard-labs-weekly-threat-update-week-of-11-october-2019/</loc>
		<lastmod>2019-10-11T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hacking-is-not-a-crime-additional-thoughts-from-defcon-2019/</loc>
		<lastmod>2019-10-11T07:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/calling-the-shots-in-digital-risk-management/</loc>
		<lastmod>2019-10-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/domaintools-app-for-splunk-gives-security-teams-enhanced-domain-threat-intelligence-for-detecting-investigating-and-predicting-cyber-attacks/</loc>
		<lastmod>2019-10-11T12:08:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/us-homeland-security-wants-subpoena-power-to-get-data-from-isps-about-vulnerable-systems/</loc>
		<lastmod>2019-10-11T12:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enterprise-devsecops-security-planning/</loc>
		<lastmod>2019-10-11T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/eu-takes-aim-at-china-and-huawei-in-5g-cybersecurity-report/</loc>
		<lastmod>2019-10-11T13:27:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/akamais-innovation-and-collaboration-in-renewable-energy/</loc>
		<lastmod>2019-10-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/three-urgent-user-challenges-with-digital-transformation/</loc>
		<lastmod>2019-10-11T15:36:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-ryan-elkins-scientific-computing-for-information-security-forging-the-missing-link/</loc>
		<lastmod>2019-10-11T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/kovter-malware-of-the-month-october-2019/</loc>
		<lastmod>2019-10-11T16:17:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-no-32-bits-allowed/</loc>
		<lastmod>2019-10-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/akamais-3-takeaways-from-the-gartner-ciam-solution-comparison/</loc>
		<lastmod>2019-10-11T17:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/passwordless-authentication-the-future-of-identity-and-security/</loc>
		<lastmod>2019-10-11T17:12:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-carl-hertz-azure-sentinel-a-first-look-at-microsofts-siem-solution/</loc>
		<lastmod>2019-10-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/online-shopping-made-easy-and-secure-avast/</loc>
		<lastmod>2019-10-11T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/muhstic-ransomware-victim-hacks-back-avast/</loc>
		<lastmod>2019-10-11T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/watermarking-a-content-owners-mark-to-prevent-piracy/</loc>
		<lastmod>2019-10-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-scale-addressable-advertising-with-low-latency-for-live-streaming/</loc>
		<lastmod>2019-10-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/insider-threat-is-still-the-biggest-danger-for-companies-data-loss-prevention-is-not-working/</loc>
		<lastmod>2019-10-11T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/attack-surface-management-the-new-endpoint-security-essential/</loc>
		<lastmod>2019-10-11T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/online-security-guidelines-for-business-safety/</loc>
		<lastmod>2019-10-11T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/yes-mfa-isnt-perfect-but-thats-not-a-reason-for-your-company-not-to-use-it/</loc>
		<lastmod>2019-10-11T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/when-it-comes-to-employees-and-data-execs-hold-mixed-views/</loc>
		<lastmod>2019-10-11T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fbi-acknowledges-some-businesses-might-pay-in-ransomware-attacks/</loc>
		<lastmod>2019-10-11T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-attacks-targeting-u-s-cities/</loc>
		<lastmod>2019-10-11T19:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/faster-on-boarding-for-performance-and-security-products/</loc>
		<lastmod>2019-10-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/introducing-serverless-computing-at-the-edge-with-akamai-edgeworkers/</loc>
		<lastmod>2019-10-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/good-security-advice-from-down-under/</loc>
		<lastmod>2019-10-11T21:20:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-tips-for-ensuring-ccpa-compliance/</loc>
		<lastmod>2019-10-11T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nexus-lifecycle-now-integrates-with-azure-devops-to-secure-software-supply-chains-in-the-cloud/</loc>
		<lastmod>2019-10-11T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/webinars-evidence-based-security-design-and-code-quality-in-tech-ma/</loc>
		<lastmod>2019-10-11T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-are-ethical-hackers/</loc>
		<lastmod>2019-10-12T01:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-fun-friendly-ways-youre-opening-yourself-up-to-cybersecurity-threats/</loc>
		<lastmod>2019-10-12T03:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/national-cybersecurity-awareness-month-is-really-about-peace-of-mind/</loc>
		<lastmod>2019-10-12T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/organizations-fail-to-implement-cloud-security-basics-and-it-bites-them/</loc>
		<lastmod>2019-10-12T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-good-the-bad-and-the-ugly-of-cybersecurity-awareness-month-avast/</loc>
		<lastmod>2019-10-12T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-tim-tomes-kevin-codys-to-cors-the-cause-of-and-solution-to-your-spa-problems/</loc>
		<lastmod>2019-10-12T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-chemistry-nobel/</loc>
		<lastmod>2019-10-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-nick-lehmans-steve-eisens-defeating-next-gen-av-and-edr-using-old-and-new-tricks-on-new-dogs/</loc>
		<lastmod>2019-10-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ryan-berg-chats-about-how-to-keep-gum-off-of-your-cybersecurity-shoe/</loc>
		<lastmod>2019-10-12T19:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-samantha-davisons-josh-schwartzs-behavioral-security-and-offensive-psychology-at-scale/</loc>
		<lastmod>2019-10-13T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/luke-kingmas-lou-patrick-mackays-futurism-comics-heat-tolerant/</loc>
		<lastmod>2019-10-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-will-schroeders-lee-christensens-not-a-security-boundary-breaking-forest-trusts/</loc>
		<lastmod>2019-10-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/climbing-the-vulnerability-management-mountain-reaching-maturity-level-1/</loc>
		<lastmod>2019-10-14T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-tax-scams-to-watch-out-for/</loc>
		<lastmod>2019-10-14T03:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hong-kong-protests-instagrams-anti-phishing-tool-smart-device-fail/</loc>
		<lastmod>2019-10-14T04:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-cisos-can-create-a-cyber-aware-workforce-using-non-traditional-training-techniques/</loc>
		<lastmod>2019-10-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shared-intel-how-nta-ndr-systems-get-to-ground-truth-of-cyber-attacks-unauthorized-traffic/</loc>
		<lastmod>2019-10-14T09:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/book-review-cybersecurity-is-everybodys-business/</loc>
		<lastmod>2019-10-14T10:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-close-look-at-fallout-exploit-kit-and-raccoon-stealer/</loc>
		<lastmod>2019-10-14T11:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/most-employees-receive-no-social-engineering-awareness-training/</loc>
		<lastmod>2019-10-14T11:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/factoring-2048-bit-numbers-using-20-million-qubits/</loc>
		<lastmod>2019-10-14T11:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-impact-of-digital-transformation-in-energy/</loc>
		<lastmod>2019-10-14T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/alleged-psycho-hacker-in-court-over-etherdelta-cryptocurrency-robbery/</loc>
		<lastmod>2019-10-14T12:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/two-new-features-for-spanning-backup-for-office-365/</loc>
		<lastmod>2019-10-14T13:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/multi-cloud-tagging-strategies-for-the-win-2/</loc>
		<lastmod>2019-10-14T13:16:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/most-americans-dont-know-what-2fa-is-pew-research-shows/</loc>
		<lastmod>2019-10-14T13:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hack-the-box-htb-machines-walkthrough-series-bastion/</loc>
		<lastmod>2019-10-14T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-mid-level-cybersecurity-consultant/</loc>
		<lastmod>2019-10-14T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/aws-vs-azure-vs-cloud-to-specialize-generalize-or-both/</loc>
		<lastmod>2019-10-14T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/engineering-cybersecurity-and-changing-careers-cyber-work-podcast/</loc>
		<lastmod>2019-10-14T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/phishing-tool-analysis-modlishka/</loc>
		<lastmod>2019-10-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/for-cisos-who-want-to-leave-a-lasting-legacy-take-this-advice-from-william-shakespeare/</loc>
		<lastmod>2019-10-14T15:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-mark-baggetts-the-hackers-apprentice/</loc>
		<lastmod>2019-10-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enterprise-devsecops-security-test-integration-and-tooling/</loc>
		<lastmod>2019-10-14T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/is-business-email-compromise-a-cyber-attack/</loc>
		<lastmod>2019-10-14T16:24:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-3-reasons-to-choose-black-duck/</loc>
		<lastmod>2019-10-14T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-security-observability-visibility-why-they-are-not-the-same/</loc>
		<lastmod>2019-10-14T16:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-priority/</loc>
		<lastmod>2019-10-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-data-science/</loc>
		<lastmod>2019-10-14T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-lee-holmes-powershell-security-looking-back-from-the-inside/</loc>
		<lastmod>2019-10-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/doh-dns-over-https/</loc>
		<lastmod>2019-10-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/stopping-sophisticated-social-engineering-scams-looking-beyond-the-basic-signs-3/</loc>
		<lastmod>2019-10-14T21:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/this-week-in-cybersecurity-october-11/</loc>
		<lastmod>2019-10-14T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-10-website-hardening-tips/</loc>
		<lastmod>2019-10-15T00:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/private-cloud-vs-public-cloud-security-challenges/</loc>
		<lastmod>2019-10-15T04:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-increasing-uk-cyber-skills-gap/</loc>
		<lastmod>2019-10-15T06:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/can-smart-cities-be-secured-and-trusted/</loc>
		<lastmod>2019-10-15T07:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devops-security-challenges-and-how-to-overcome-them/</loc>
		<lastmod>2019-10-15T08:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/first-impressions-and-cybersecurity/</loc>
		<lastmod>2019-10-15T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/samsung-galaxy-s10-fingerprint-sensor-allegedly-bypassed-with-a-cheap-gel-screen-protector/</loc>
		<lastmod>2019-10-15T09:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/come-sue-with-us-half-a-million-customers-of-ba-affected-by-data-breach-get-the-go-ahead-to-take-legal-action-against-the-airline/</loc>
		<lastmod>2019-10-15T09:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-review-of-research-identifying-the-top-cyber-threats-facing-financial-services/</loc>
		<lastmod>2019-10-15T11:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/briansclub-hack-rescues-26m-stolen-cards/</loc>
		<lastmod>2019-10-15T11:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/18-members-of-atm-skimmer-gang-arrested-mostly-romanian/</loc>
		<lastmod>2019-10-15T11:49:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/clean-it-up-cyber-hygiene-controls-tips/</loc>
		<lastmod>2019-10-15T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/beware-of-account-takeover/</loc>
		<lastmod>2019-10-15T13:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-the-cybersecurity-skills-shortage-really-breaks-down/</loc>
		<lastmod>2019-10-15T14:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pci-pal-builds-on-uk-partnership-with-8x8-to-offer-secure-payment-services-for-contact-centres-globally/</loc>
		<lastmod>2019-10-15T13:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fbi-warns-of-criminals-using-social-engineering-technical-attacks-to-bypass-multi-factor-authentication/</loc>
		<lastmod>2019-10-15T13:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ethical-hacking-breaking-windows-passwords/</loc>
		<lastmod>2019-10-15T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-entry-level-penetration-tester/</loc>
		<lastmod>2019-10-15T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malware-spotlight-what-are-worms/</loc>
		<lastmod>2019-10-15T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/windows-os-security-brief-history/</loc>
		<lastmod>2019-10-15T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/appeasing-the-oasis-of-unknown-shadow-it-discovery/</loc>
		<lastmod>2019-10-15T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-dave-kennedys-jess-walpoles-scott-angelos-kevin-bakers-panel-enabling-the-future/</loc>
		<lastmod>2019-10-15T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/kaspersky-reports-more-than-100-million-attacks-hit-smart-devices-in-h1-2019/</loc>
		<lastmod>2019-10-15T16:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-reasons-why-iso-27001-helps-to-protect-confidential-information-in-law-firms/</loc>
		<lastmod>2019-10-15T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/facebookery-the-conflation/</loc>
		<lastmod>2019-10-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-2019-whats-new-in-web-performance/</loc>
		<lastmod>2019-10-15T17:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pixel-perfect-enhanced-optimizations-focused-on-customer-experience/</loc>
		<lastmod>2019-10-15T17:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-security-audits-top-due-diligence-checklists/</loc>
		<lastmod>2019-10-15T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-heather-smiths-how-to-tell-the-c-level-their-baby-is-ugly/</loc>
		<lastmod>2019-10-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-tech-passwordless-authentication-takes-us-closer-to-eliminating-passwords-as-the-weak-link/</loc>
		<lastmod>2019-10-15T18:14:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/beyond-testing-the-human-element-of-application-security/</loc>
		<lastmod>2019-10-15T18:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/verify-jwt-with-json-web-key-set-jwks-in-api-gateway/</loc>
		<lastmod>2019-10-15T18:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/real-time-phishing-protections/</loc>
		<lastmod>2019-10-15T18:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/quickly-extend-live-streams-with-vod-clipping/</loc>
		<lastmod>2019-10-15T18:58:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/quick-retry-per-request-route-optimization-to-reduce-video-rebuffer-rates/</loc>
		<lastmod>2019-10-15T18:59:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-facultystudent-ratio/</loc>
		<lastmod>2019-10-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/optimizing-video-streaming-performance-with-origin-assisted-prefetching/</loc>
		<lastmod>2019-10-15T19:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/access-revocation-a-content-providers-tool-to-block-pirates-in-real-time/</loc>
		<lastmod>2019-10-15T19:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-is-malvertising-awareness-month-2/</loc>
		<lastmod>2019-10-15T20:05:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/endpoints-are-the-front-line-in-the-battle-for-effective-cybersecurity/</loc>
		<lastmod>2019-10-15T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-a-ddos-attack-hint-it-involves-zombies-traffic-jams/</loc>
		<lastmod>2019-10-15T20:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/better-api-penetration-testing-with-postman-part-4/</loc>
		<lastmod>2019-10-15T20:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-g-suite-for-education-security-features/</loc>
		<lastmod>2019-10-15T20:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-rise-of-credential-stuffing-and-account-takeovers-avast/</loc>
		<lastmod>2019-10-15T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sonatype-a-recognized-cybersecurity-devops-tech-titan/</loc>
		<lastmod>2019-10-15T21:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/trusted-computing-group-accelerates-cybersecurity-innovation-as-world-enters-iot-era/</loc>
		<lastmod>2019-10-15T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-cyber-threat-hunting-2019/</loc>
		<lastmod>2019-10-15T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/announcing-graphql-security-scanning/</loc>
		<lastmod>2019-10-16T00:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/its-october-cybersecurity-awareness-month-ransomware-is-the-biggest-fight-were-losing/</loc>
		<lastmod>2019-10-16T04:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-nei-08-09/</loc>
		<lastmod>2019-10-16T05:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-attack-hits-pitney-bowes-impacting-company-mail-rooms-around-the-world/</loc>
		<lastmod>2019-10-16T06:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/getting-to-nse-level-8-a-conversation-with-mohammad-al-zard/</loc>
		<lastmod>2019-10-16T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/my-take-how-credential-stuffing-and-account-takeovers-are-leveraging-big-data-automation/</loc>
		<lastmod>2019-10-16T09:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/white-hat-hackers-earned-more-than-30000-from-dods-bug-hunting-program/</loc>
		<lastmod>2019-10-16T10:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-its-still-about-the-people/</loc>
		<lastmod>2019-10-16T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sharing-intel-why-full-digital-transformation-requires-locking-down-machine-identities/</loc>
		<lastmod>2019-10-16T12:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/smb-cyber-security-threatened-by-human-hacking/</loc>
		<lastmod>2019-10-16T12:39:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dark-data-is-hurting-your-cyber-security/</loc>
		<lastmod>2019-10-16T12:41:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enterprise-devsecops-securitys-role-in-devops/</loc>
		<lastmod>2019-10-16T12:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/iam-root-aws-iam-simulator-tutorial/</loc>
		<lastmod>2019-10-16T12:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ccpa-data-privacy-like-gdpr-data-security-like-pci-dss/</loc>
		<lastmod>2019-10-16T12:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/valimail-opens-product-and-engineering-innovation-office-in-denver/</loc>
		<lastmod>2019-10-16T14:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/behavioral-analysis-versus-artifacts-iocs/</loc>
		<lastmod>2019-10-16T13:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nydfs-cybersecurity-regulation-two-years-later-lets-check-in/</loc>
		<lastmod>2019-10-16T13:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/red-team-operations-best-practices/</loc>
		<lastmod>2019-10-16T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-difference-between-cross-site-and-server-side-request-forgery/</loc>
		<lastmod>2019-10-16T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/managing-updates-and-patches-in-windows-10/</loc>
		<lastmod>2019-10-16T13:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/north-korean-hackers-tried-to-infect-macos-systems-with-fake-cryptocurrency-app/</loc>
		<lastmod>2019-10-16T13:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/breach-response-test-symantec-endpoint-security-complete/</loc>
		<lastmod>2019-10-16T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nanocore-under-the-microscope-2/</loc>
		<lastmod>2019-10-16T15:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/select-the-right-strategy-for-securing-web-access/</loc>
		<lastmod>2019-10-16T15:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-2019-whats-new-in-security/</loc>
		<lastmod>2019-10-16T15:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/scammers-using-hacked-servers-bogus-links-to-target-linkedin-users/</loc>
		<lastmod>2019-10-16T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-jacob-williams-cyber-false-flags-and-adversarial-counterintelligence-oh-my/</loc>
		<lastmod>2019-10-16T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/analyzing-matio-and-stb_vorbis-libraries-with-mayhem/</loc>
		<lastmod>2019-10-16T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-build-a-process-around-an-application-security-tool/</loc>
		<lastmod>2019-10-16T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/rfid-key-copying-the-cloning-shenanigans/</loc>
		<lastmod>2019-10-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-2019-whats-new-in-media/</loc>
		<lastmod>2019-10-16T17:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/understanding-the-nist-csf-categories/</loc>
		<lastmod>2019-10-16T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/pcap-analysis-basics-with-wireshark/</loc>
		<lastmod>2019-10-16T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-cedric-owens-bypassing-macos-detections-with-swift/</loc>
		<lastmod>2019-10-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-the-cybersecurity-skills-shortage-is-a-real-nightmare/</loc>
		<lastmod>2019-10-16T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/interpols-becareful-campaign/</loc>
		<lastmod>2019-10-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cryptominers-backdoors-found-in-fake-plugins/</loc>
		<lastmod>2019-10-16T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/walk-dont-walk-secure-intelligent-application-access-with-enhanced-security-signals/</loc>
		<lastmod>2019-10-16T19:54:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-implement-successful-endpoint-security-for-macos/</loc>
		<lastmod>2019-10-16T21:08:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/identifying-security-vulnerabilities-inside-a-jenkins-pipeline/</loc>
		<lastmod>2019-10-16T22:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/when-card-shops-play-dirty-consumers-win/</loc>
		<lastmod>2019-10-17T03:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/webinar-hacking-humans/</loc>
		<lastmod>2019-10-17T05:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-evolution-of-phishing-the-spear-is-aimed-at-you/</loc>
		<lastmod>2019-10-17T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/revisiting-the-concepts-of-disaster-recovery-and-risk-as-organizations-move-their-infrastructure-to-the-cloud/</loc>
		<lastmod>2019-10-17T05:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/guest-blog-what-builds-the-most-secure-next-gen-datacenter/</loc>
		<lastmod>2019-10-17T05:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-evolution-of-how-we-think-about-and-approach-privacy-and-security/</loc>
		<lastmod>2019-10-17T06:11:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/where-human-factors-can-eclipse-technology-complexity-privacy-and-human-error/</loc>
		<lastmod>2019-10-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/using-foundational-controls-to-secure-it/</loc>
		<lastmod>2019-10-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/field-ciso-qa-jonathan-nguyen/</loc>
		<lastmod>2019-10-17T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/understanding-apis-rest/</loc>
		<lastmod>2019-10-17T08:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/california-adds-biometric-specs-to-data-breach-law/</loc>
		<lastmod>2019-10-17T09:27:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-ways-to-detect-a-cloud-account-takeover/</loc>
		<lastmod>2019-10-17T11:05:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/using-machine-learning-to-detect-ip-hijacking/</loc>
		<lastmod>2019-10-17T11:08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/breach-response-test-kaspersky-anti-targeted-attack-platform/</loc>
		<lastmod>2019-10-17T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/welcome-to-video-raid-leads-to-337-arrests-due-to-bitcoin-exchanges-that-use-strong-kyc/</loc>
		<lastmod>2019-10-17T11:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/graboid-cryptojacking-worm-has-struck-over-2k-unsecured-docker-hosts/</loc>
		<lastmod>2019-10-17T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-nist-cybersecurity-framework-implementation-tiers-explained/</loc>
		<lastmod>2019-10-17T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-impact-of-digital-transformation-in-financial-services/</loc>
		<lastmod>2019-10-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/windows-7-users-to-receive-end-of-life-notification/</loc>
		<lastmod>2019-10-17T12:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mfa-and-biometric-authentication-secure-the-digital-profile/</loc>
		<lastmod>2019-10-17T13:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-analytics-is-the-new-approach-to-iot-security/</loc>
		<lastmod>2019-10-17T13:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/survey-theres-a-divide-between-cyber-security-concerns-and-cyber-security-actions/</loc>
		<lastmod>2019-10-17T13:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/glass-class-integrating-casb-with-dlp/</loc>
		<lastmod>2019-10-17T13:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nancy-on-a-boat-announcing-nancy-for-docker/</loc>
		<lastmod>2019-10-17T13:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ccpa-countdown-draft-regulations-add-clarity-and-new-requirements/</loc>
		<lastmod>2019-10-17T14:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dont-get-schooled-in-hackademia/</loc>
		<lastmod>2019-10-17T14:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-evolution-of-application-development-2/</loc>
		<lastmod>2019-10-17T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/agile-security-is-now-a-reality-2/</loc>
		<lastmod>2019-10-17T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/application-security-in-the-microservices-era-2/</loc>
		<lastmod>2019-10-17T14:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-state-of-web-application-security-2019/</loc>
		<lastmod>2019-10-17T14:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-waf-application-analytics/</loc>
		<lastmod>2019-10-17T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-to-do-when-you-are-under-ddos-attack-2/</loc>
		<lastmod>2019-10-17T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/saving-creatures-big-and-small-with-cybersecurity-2/</loc>
		<lastmod>2019-10-17T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-practice-safe-public-wi-fi-usage-2/</loc>
		<lastmod>2019-10-17T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/is-it-critical-for-cfos-to-understand-cybersecurity-2/</loc>
		<lastmod>2019-10-17T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tcg-celebrates-the-collaboration-of-its-members-as-it-aims-for-a-more-secure-future/</loc>
		<lastmod>2019-10-17T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/identity-theft-on-the-dark-web-understanding-the-full-impact-of-a-data-breach/</loc>
		<lastmod>2019-10-17T15:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ccpa-amendments-are-you-prepared-for-2020/</loc>
		<lastmod>2019-10-17T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-jason-lewis-ipv6-security-considerations-for-when-just-turn-it-off-isnt-good-enough/</loc>
		<lastmod>2019-10-17T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/fireeye-and-verodin-assessing-this-quarters-top-malware-families-by-drew-holland/</loc>
		<lastmod>2019-10-17T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/inside-the-ryuk-ransomware/</loc>
		<lastmod>2019-10-17T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-open-source-tools-for-red-teaming/</loc>
		<lastmod>2019-10-17T16:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/degree-vs-certification-mid-level-cybersecurity-architect/</loc>
		<lastmod>2019-10-17T16:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/one-in-five-smbs-hit-by-ransomware-in-2019/</loc>
		<lastmod>2019-10-17T16:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-the-panda-takes-a-bite/</loc>
		<lastmod>2019-10-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/move-to-cloud-a-chance-to-finally-transform-security/</loc>
		<lastmod>2019-10-17T18:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-devops-security-tools-support-modern-applications/</loc>
		<lastmod>2019-10-17T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/anti-malware-is-just-one-part-of-the-picture/</loc>
		<lastmod>2019-10-17T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/incorporating-privacy-by-design-in-a-software-development-life-cycle/</loc>
		<lastmod>2019-10-17T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-james-bowers-last-minute-offensive-machine-learning/</loc>
		<lastmod>2019-10-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/libra-unstablecoin-the-fleet-of-foot-chronicles/</loc>
		<lastmod>2019-10-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/looking-back-at-the-2019-identity-summit/</loc>
		<lastmod>2019-10-17T20:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fake-updraftplus-plugins/</loc>
		<lastmod>2019-10-17T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/proactive-endpoint-threat-response-with-swimlane-amp-cylance-protect/</loc>
		<lastmod>2019-10-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/swimlane-amp-cylance-protect-endpoint-threat-response/</loc>
		<lastmod>2019-10-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nist-sp-1800-23-energy-sector-asset-management-securing-industrial-control-systems/</loc>
		<lastmod>2019-10-18T03:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortiguard-labs-weekly-threat-update-week-of-18-october-2019/</loc>
		<lastmod>2019-10-18T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/visit-us-at-the-malta-cyber-security-summit-2019/</loc>
		<lastmod>2019-10-18T09:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-dns-cache-poisoning/</loc>
		<lastmod>2019-10-18T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-use-excluded-hours/</loc>
		<lastmod>2019-10-18T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/http-security-a-security-focused-introduction-to-http/</loc>
		<lastmod>2019-10-18T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-trends-2019-web-security/</loc>
		<lastmod>2019-10-18T09:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/data-breaches-due-to-exposed-databases/</loc>
		<lastmod>2019-10-18T09:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/using-logs-to-investigate-sql-injection-attack-example/</loc>
		<lastmod>2019-10-18T09:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-iast-interactive-application-security-testing/</loc>
		<lastmod>2019-10-18T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/new-build-adds-ability-to-scan-for-latest-vulnerabilities-ad-blocking-session-headers-and-new-vulnerability-checks/</loc>
		<lastmod>2019-10-18T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/few-companies-restrict-use-of-unencrypted-or-unsafe-usb-drives/</loc>
		<lastmod>2019-10-18T10:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/serious-vulnerability-that-could-crash-or-compromise-linux-oses-found-and-fixed/</loc>
		<lastmod>2019-10-18T11:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/post-quantum-cryptography-10-things-you-need-to-know/</loc>
		<lastmod>2019-10-18T13:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-the-unicorn-project-aligns-with-the-phoenix-project/</loc>
		<lastmod>2019-10-18T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bsimm10-study-the-impact-of-devops-on-software-security/</loc>
		<lastmod>2019-10-18T13:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-perspectives-on-physical-air-gaps/</loc>
		<lastmod>2019-10-18T15:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-joseph-binghams-scada-what-the-next-stuxnet-will-look-like-and-how-to-prevent-it/</loc>
		<lastmod>2019-10-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nist-microsoft-partner-for-patching-pointers/</loc>
		<lastmod>2019-10-18T16:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/toughen-up-your-ad/</loc>
		<lastmod>2019-10-18T16:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/click-fraud-site-preys-on-iphone-jailbreakers-avast/</loc>
		<lastmod>2019-10-18T16:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/finding-the-cybersecurity-sweetspot/</loc>
		<lastmod>2019-10-18T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-percent-milkfat/</loc>
		<lastmod>2019-10-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-rindert-kramers-designing-building-a-stealth-c2-ldap-channel/</loc>
		<lastmod>2019-10-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-vendor-management-is-important/</loc>
		<lastmod>2019-10-18T18:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/adopting-a-risk-based-approach-to-cybersecurity-in-the-financial-services-industry/</loc>
		<lastmod>2019-10-18T18:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-power-grid/</loc>
		<lastmod>2019-10-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malvertising-on-legitimate-websites-even-the-new-york-times-3/</loc>
		<lastmod>2019-10-18T20:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/7-cybersecurity-attacks-that-can-hurt-your-business-and-customers/</loc>
		<lastmod>2019-10-18T19:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/phishing-campaign-uses-clever-tricks-to-steal-stripe-credentials/</loc>
		<lastmod>2019-10-18T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/get-your-cybersecurity-firing-on-all-cylinders/</loc>
		<lastmod>2019-10-18T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-assumptions-are-you-making/</loc>
		<lastmod>2019-10-19T13:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-david-e-young-jr-s-theres-no-place-like-dual-homed/</loc>
		<lastmod>2019-10-19T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-53-cards/</loc>
		<lastmod>2019-10-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-lance-petermans-modlishka-is-a-mantis-eating-2fas-lunch/</loc>
		<lastmod>2019-10-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/emotet-is-back-in-action-after-a-short-break/</loc>
		<lastmod>2019-10-20T07:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-review-of-nest-camera/</loc>
		<lastmod>2019-10-21T13:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-gabrielle-hempels-hacking-humans-addressing-vulnerabilities-in-the-advancing-medical-device-landscape/</loc>
		<lastmod>2019-10-20T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-old/</loc>
		<lastmod>2019-10-20T17:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-xena-olsens-it-must-be-fancy-bear/</loc>
		<lastmod>2019-10-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pitney-bowes-ransomware-attack-samsung-galaxy-s10-fingerprint-bypass-top-technology-fears/</loc>
		<lastmod>2019-10-21T04:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-container-security-risks-every-company-faces/</loc>
		<lastmod>2019-10-21T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/this-week-in-cybersecurity-october-18/</loc>
		<lastmod>2019-10-21T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-variant-of-remcos-rat-observed-in-the-wild/</loc>
		<lastmod>2019-10-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/promote-cybersecurity-awareness-to-protect-your-family-online/</loc>
		<lastmod>2019-10-21T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/networking-engineering-and-education-cyber-work-podcast/</loc>
		<lastmod>2019-10-21T09:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/personal-data-privacy-is-an-urgent-topic-today-and-the-spotlight-on-this-will-only-get-brighter-in-2020/</loc>
		<lastmod>2019-10-21T10:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-cloud-migration-trends-translate-to-hsm-in-the-cloud/</loc>
		<lastmod>2019-10-21T10:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-fights-off-cyber-espionage-attempt-abiss-avast/</loc>
		<lastmod>2019-10-21T10:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/welcome-to-digiville/</loc>
		<lastmod>2019-10-21T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/to-transform-your-business-you-must-transform-risk-management/</loc>
		<lastmod>2019-10-21T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/knowing-is-half-the-battle-leaner-cleaner-more-accessible-intelligence-through-taxii-and-stix/</loc>
		<lastmod>2019-10-21T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/companies-place-cyber-security-in-the-spotlight/</loc>
		<lastmod>2019-10-21T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/equifax-used-admin-as-username-and-password-internally/</loc>
		<lastmod>2019-10-21T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/open-and-open-source-a-new-community-for-all/</loc>
		<lastmod>2019-10-21T13:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nerc-cip-audits-top-8-dos-and-donts/</loc>
		<lastmod>2019-10-21T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/managing-and-responding-to-advanced-cyber-risks-in-the-oil-and-gas-industry/</loc>
		<lastmod>2019-10-21T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-digital-security-tips-from-our-just-ask-gemalto-experts-that-can-help-you-stay-safe-online/</loc>
		<lastmod>2019-10-21T13:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pixel-4-display-face-unlock-reportedly-works-with-eyes-closed/</loc>
		<lastmod>2019-10-21T13:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/zero-trust-and-identity-evolving-from-castles-to-cities/</loc>
		<lastmod>2019-10-21T14:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-cyber-security-threats-you-didnt-know-you-should-be-threatened-by-2/</loc>
		<lastmod>2019-10-21T15:50:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-threat-of-unwanted-data-acquisition-2/</loc>
		<lastmod>2019-10-21T15:51:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nias19-in-review-by-clearswift-cto-guy-bunker-2/</loc>
		<lastmod>2019-10-21T15:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bitglass-security-spotlight-20-million-russian-citizens-exposed/</loc>
		<lastmod>2019-10-21T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/akamai-outlook-optimizing-edge-delivery-performance-and-monitoring/</loc>
		<lastmod>2019-10-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/using-certificates-in-windows-10/</loc>
		<lastmod>2019-10-21T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-incident-response/</loc>
		<lastmod>2019-10-21T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-commercial-tools-for-red-teaming/</loc>
		<lastmod>2019-10-21T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/lessons-learned-the-capital-one-breach/</loc>
		<lastmod>2019-10-21T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/if-good-help-is-so-hard-to-find-cisos-find-this-next-part-even-harder/</loc>
		<lastmod>2019-10-21T15:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-brent-whites-tim-roberts-getting-the-most-out-of-your-covert-physical-security-assessment-a-clients-guide/</loc>
		<lastmod>2019-10-21T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/early-learning-coalition-of-palm-beach-county-gets-a-head-start-on-secure-access-with-idaptive/</loc>
		<lastmod>2019-10-21T16:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/integrated-risk-management-frameworks/</loc>
		<lastmod>2019-10-21T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-preparation/</loc>
		<lastmod>2019-10-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-peak-at-the-edge-akamai-sets-new-traffic-benchmark/</loc>
		<lastmod>2019-10-21T17:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-cto-michal-pechoucek-says-ai-can-broaden-our-view-avast/</loc>
		<lastmod>2019-10-21T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-the-nist-privacy-framework-means-for-password-policy/</loc>
		<lastmod>2019-10-21T17:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-justin-hermans-getting-dirty-on-the-canbus/</loc>
		<lastmod>2019-10-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/all-resolvers-arent-equal-dont-worry-gtm-is-aware/</loc>
		<lastmod>2019-10-21T18:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/october-is-cyber-security-awareness-month-developers-are-some-of-our-best-guardians/</loc>
		<lastmod>2019-10-21T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-open-source-licenses-and-legal-risk-for-developers/</loc>
		<lastmod>2019-10-21T19:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/buran-ransomware-targets-german-organisations-through-malicious-spam-campaign/</loc>
		<lastmod>2019-10-21T19:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-goes-fileless-uses-malicious-documents-and-powershell-to-encrypt-files/</loc>
		<lastmod>2019-10-21T19:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-trends-happening-in-payments-data-security-is-needed-more-than-ever/</loc>
		<lastmod>2019-10-21T19:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-new-malware-target-msps-domino-effect-ad-infinitum/</loc>
		<lastmod>2019-10-21T20:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/personal-online-privacy-connecting-online/</loc>
		<lastmod>2019-10-21T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-nordvpn-breaches-tied-to-phantom-user-accounts/</loc>
		<lastmod>2019-10-22T00:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hardware-based-encryption-is-the-key-to-future-proofing-data-protection-concerns/</loc>
		<lastmod>2019-10-22T00:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shadow-it-a-business-risk-or-competitive-advantage-2/</loc>
		<lastmod>2019-10-22T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/power-to-the-players-3-tips-for-gamifying-your-cybersecurity-training/</loc>
		<lastmod>2019-10-22T05:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pci-assurances-in-insurance-what-should-insurers-consider/</loc>
		<lastmod>2019-10-22T06:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortinet-joins-new-operational-technology-cyber-security-alliance-otcsa/</loc>
		<lastmod>2019-10-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/possible-new-badpatch-campaign-uses-multi-component-python-compiled-malware/</loc>
		<lastmod>2019-10-22T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/just-patch-already-its-not-that-easy/</loc>
		<lastmod>2019-10-22T08:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/need-for-better-employee-protection-is-apparent-during-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-22T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/exposing-targeted-attacks-by-observing-privilege-interactions-between-entities/</loc>
		<lastmod>2019-10-22T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/calculating-the-benefits-of-the-advanced-encryption-standard/</loc>
		<lastmod>2019-10-22T10:56:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-cool-new-network-security-features-in-the-bricata-platform-you-might-have-missed/</loc>
		<lastmod>2019-10-22T11:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/powerful-forces-are-reshaping-continuous-ot-monitoring-requirements/</loc>
		<lastmod>2019-10-22T11:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-impact-of-digital-transformation-in-manufacturing/</loc>
		<lastmod>2019-10-22T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/spending-on-security-products-and-services-continues-to-grow-in-2019/</loc>
		<lastmod>2019-10-22T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/infographic-analyzing-your-enterprise-cybersecurity-risks/</loc>
		<lastmod>2019-10-22T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-party-2019-a-celebration-you-wont-want-to-miss/</loc>
		<lastmod>2019-10-22T12:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/announcing-the-10th-volume-of-our-state-of-software-security-report/</loc>
		<lastmod>2019-10-22T12:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/4-reasons-why-change-control-is-necessary/</loc>
		<lastmod>2019-10-22T13:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/some-banks-drop-fingerprint-authentication-for-samsung-galaxy-s10-users-after-gel-cover-hack/</loc>
		<lastmod>2019-10-22T13:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/automation-giant-pilz-halts-operations-for-a-week-after-ransomware-infection/</loc>
		<lastmod>2019-10-22T13:58:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malspam-campaign-targeted-german-organizations-with-buran-ransomware/</loc>
		<lastmod>2019-10-22T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/determining-information-security-vendor-roi-is-difficult-not-impossible/</loc>
		<lastmod>2019-10-22T14:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/prevent-data-breaches-how-to-build-your-ai-ml-data-pipeline/</loc>
		<lastmod>2019-10-22T14:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/red-team-operations-presenting-your-findings/</loc>
		<lastmod>2019-10-22T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-ir-threat-intelligence-collection-and-analysis/</loc>
		<lastmod>2019-10-22T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hipaa-compliance-tips-best-practices-building-your-foundational-knowledge/</loc>
		<lastmod>2019-10-22T15:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-jimi-sebrees-automated-dylib-hijacking/</loc>
		<lastmod>2019-10-22T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-the-2019-cwe-top-25-can-boost-your-application-security/</loc>
		<lastmod>2019-10-22T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/september-2019-appsec-intelligence-report/</loc>
		<lastmod>2019-10-22T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-wardrobe/</loc>
		<lastmod>2019-10-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/otcsa-launches-to-improve-cybersecurity-for-ot-and-critical-infrastructure/</loc>
		<lastmod>2019-10-22T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-oddvar-moes-hans-lakhans-phishing-past-mail-protection-controls-using-azure-information-protection-aip/</loc>
		<lastmod>2019-10-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/one-time-security-installations-are-not-enough-to-protect-mobile-devices-against-growing-threats-says-tcg/</loc>
		<lastmod>2019-10-22T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/spotlight-on-bsimm-annual-conference-what-you-need-to-know/</loc>
		<lastmod>2019-10-22T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/avast-nordvpn-two-companies-in-this-headline-are-the-same-yet-different/</loc>
		<lastmod>2019-10-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-hits-b2b-payments-firm-billtrust/</loc>
		<lastmod>2019-10-22T19:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/more-bees-with-honey-reinforcement-vs-punishment-in-a-security-training-program/</loc>
		<lastmod>2019-10-22T19:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/women-it-managers-share-tips-keeping-employees-safe-avast/</loc>
		<lastmod>2019-10-22T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-cloud-computing-security-issues-how-to-get-them-under-control/</loc>
		<lastmod>2019-10-22T20:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ethical-hacking-social-engineering-basics/</loc>
		<lastmod>2019-10-22T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nordvpn-reveals-it-was-affected-by-a-data-breach-in-2018/</loc>
		<lastmod>2019-10-22T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/smart-spies-attack-alexa-and-google-assistant-can-eavesdrop-or-vish-voice-phish-unsuspecting-users-disclose-researchers-from-srlabs/</loc>
		<lastmod>2019-10-22T23:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-attack-risk-climbs-in-latest-wef-regional-risk-report/</loc>
		<lastmod>2019-10-23T05:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/guide-to-container-security-everything-you-need-to-know/</loc>
		<lastmod>2019-10-23T05:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/blackhat-2019-arsenal-blackphenix-framework/</loc>
		<lastmod>2019-10-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/unveiling-the-stealthworker-campaign/</loc>
		<lastmod>2019-10-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-deep-dive-analysis-of-the-nukesped-rats/</loc>
		<lastmod>2019-10-23T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-statement-of-applicability-in-iso-27001/</loc>
		<lastmod>2019-10-23T07:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/retail-has-a-multi-cloud-problemwith-sensitive-data/</loc>
		<lastmod>2019-10-23T07:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hospital-leaks-129k-patient-records-in-sophisticated-phishing-scam/</loc>
		<lastmod>2019-10-23T07:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nordvpn-breached/</loc>
		<lastmod>2019-10-23T11:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/more-destructive-botnets-and-attack-vectors-are-on-their-way/</loc>
		<lastmod>2019-10-23T12:28:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/risks-of-vision-loss-can-be-predicted-by-deep-learning-models/</loc>
		<lastmod>2019-10-23T12:58:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/70-of-organisations-admit-non-compliance-with-the-gdpr-balancing-data-privacy-and-data-security/</loc>
		<lastmod>2019-10-23T13:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/social-engineering-attacks-common-methods-involved-and-how-to-avoid-being-caught-out/</loc>
		<lastmod>2019-10-23T13:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/in-room-robots-at-japanese-hotel-could-have-been-hacked-to-spy-on-guests/</loc>
		<lastmod>2019-10-23T13:38:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/more-companies-adopt-mfa-but-its-still-not-enough/</loc>
		<lastmod>2019-10-23T13:59:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-four-pillars-of-casb-visibility/</loc>
		<lastmod>2019-10-23T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/traffic-analysis-for-incident-response-ir-how-to-use-traffic-analysis-for-wireshark/</loc>
		<lastmod>2019-10-23T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/control-third-party-communication-apps-to-protect-your-third-party-workflows/</loc>
		<lastmod>2019-10-23T15:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/make-sure-to-cover-your-auth/</loc>
		<lastmod>2019-10-23T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-will-pearces-nick-landers-42-the-answer-to-life-the-universe-and-everything-offensive-security/</loc>
		<lastmod>2019-10-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-zuck-the-champion-of-free-speech/</loc>
		<lastmod>2019-10-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/are-macs-immune-from-malware-and-cybersecurity-threats-avast/</loc>
		<lastmod>2019-10-23T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-can-artists-protect-their-macs-avast/</loc>
		<lastmod>2019-10-23T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersec-ai-prague-conference-kicks-off-avast/</loc>
		<lastmod>2019-10-23T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/software-is-infrastructure/</loc>
		<lastmod>2019-10-23T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-aaron-rosenmunds-collect-all-the-data-protect-all-the-things/</loc>
		<lastmod>2019-10-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/celebrate-cybersecurity-awareness-month-with-these-tips-from-a-survey-of-1200-security-pros/</loc>
		<lastmod>2019-10-23T18:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dont-let-your-supply-chain-undermine-your-security/</loc>
		<lastmod>2019-10-23T18:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/kalispell-regional-healthcare-says-phishers-might-have-accessed-patients-pii/</loc>
		<lastmod>2019-10-23T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/survey-finds-many-socs-are-set-up-to-fail/</loc>
		<lastmod>2019-10-23T18:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-attacks-show-no-signs-of-slowing/</loc>
		<lastmod>2019-10-23T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-quantum-battle-dome-ibm-versus-google/</loc>
		<lastmod>2019-10-23T20:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/zinger-halloween-tips-for-the-security-mind/</loc>
		<lastmod>2019-10-23T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dont-pay-the-ransom-period/</loc>
		<lastmod>2019-10-23T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cpdos-poisoning-attack/</loc>
		<lastmod>2019-10-23T20:39:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-causing-financial-institutions-to-lose-23-billion-a-year/</loc>
		<lastmod>2019-10-23T20:55:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/elite-performers-choose-simpler-tools/</loc>
		<lastmod>2019-10-23T20:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wormwood-an-explicit-way-to-test-absinthe-graphql-apis/</loc>
		<lastmod>2019-10-23T21:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/certifications-compared-gslc-vs-cism/</loc>
		<lastmod>2019-10-23T21:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nist-cybersecurity-framework-2/</loc>
		<lastmod>2019-10-23T22:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/understanding-apis-soap/</loc>
		<lastmod>2019-10-24T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/internet-isolation-exploring-use-cases/</loc>
		<lastmod>2019-10-24T00:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/is-the-electric-grid-ready-to-respond-to-increased-cyber-threats/</loc>
		<lastmod>2019-10-24T04:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-validation-perception-vs-reality-join-us-at-the-2019-futurecon-dinner-series-by-brian-contos/</loc>
		<lastmod>2019-10-24T05:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortivet-announces-partnership-with-corporate-america-supports-you-casy-for-cybersecurity-skills-transitioning/</loc>
		<lastmod>2019-10-24T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/protect-it-a-combination-of-security-culture-and-cyber-hygiene-good-practices/</loc>
		<lastmod>2019-10-24T07:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/privacy-is-shaping-the-future-of-cybersecurity-careers-are-you-ready-2/</loc>
		<lastmod>2019-10-24T10:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/watch-your-language-our-first-vyper-audit/</loc>
		<lastmod>2019-10-24T11:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/4-step-cloud-security-audit-for-school-districts/</loc>
		<lastmod>2019-10-24T11:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/exploring-digiville-with-the-drmta/</loc>
		<lastmod>2019-10-24T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nfc-false-tag-vulnerability-cve-2019-9295/</loc>
		<lastmod>2019-10-24T12:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/with-5g-and-iot-its-a-new-day-with-new-risks/</loc>
		<lastmod>2019-10-24T13:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ftc-orders-mobilespy-phonesheriff-and-teenshield-vendor-to-destroy-user-data/</loc>
		<lastmod>2019-10-24T13:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/trust-in-companies-ability-to-protect-personal-data-is-on-the-decline/</loc>
		<lastmod>2019-10-24T13:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/12-year-jail-sentence-for-man-who-hacked-los-angeles-superior-court-to-send-two-million-phishing-emails/</loc>
		<lastmod>2019-10-24T13:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/jackson-health-system-fined-2-15m-for-hipaa-violations/</loc>
		<lastmod>2019-10-24T13:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bimi-is-ready-for-liftoff/</loc>
		<lastmod>2019-10-24T15:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-create-a-security-risk-assessment-for-containers-in-5-steps/</loc>
		<lastmod>2019-10-24T14:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/introduction-to-kiosk-browser-lockdown-for-windows-10/</loc>
		<lastmod>2019-10-24T14:05:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/new-york-shield-act-the-latest-amendment-to-ny-states-cybersecurity-law/</loc>
		<lastmod>2019-10-24T14:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sectigo-to-offer-subscription-ssl-services-that-extend-ssl-protection-up-to-five-years/</loc>
		<lastmod>2019-10-24T14:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/virtual-air-gap-explained/</loc>
		<lastmod>2019-10-24T14:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-commandments-for-securing-microservices/</loc>
		<lastmod>2019-10-24T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-ir-credential-capture/</loc>
		<lastmod>2019-10-24T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-ir-content-deobfuscation/</loc>
		<lastmod>2019-10-24T15:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-larry-sutos-jeff-holdens-kubered-recipes-for-c2-operations-on-kubernetes/</loc>
		<lastmod>2019-10-24T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/imperva-rasp-now-supports-net-core-apps-for-security-by-default/</loc>
		<lastmod>2019-10-24T16:33:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/apache-struts-research-at-scale-part-1-building-115-versions-of-struts/</loc>
		<lastmod>2019-10-24T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-earthquake-early-warnings/</loc>
		<lastmod>2019-10-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-security-challenges-today-expert-advice-on-keeping-your-business-safe/</loc>
		<lastmod>2019-10-24T17:25:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon-2019-timothy-wrights-jacob-griffiths-lying-in-wait-discovering-and-exploiting-weaknesses-in-automated-discovery-actions/</loc>
		<lastmod>2019-10-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-new-approaches-to-help-organizations-improve-phishing-security-part-one-2/</loc>
		<lastmod>2019-10-24T19:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nordvpn-keys-stolen-19-months-ago/</loc>
		<lastmod>2019-10-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/big-data-security-series-part-1-data-is-everywhere-but-security-isnt/</loc>
		<lastmod>2019-10-24T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/spotlight-on-shifting-right-and-security-in-a-devops-world/</loc>
		<lastmod>2019-10-24T20:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/attack-analytics-now-include-actionable-insights/</loc>
		<lastmod>2019-10-24T21:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/bentley-systems-goes-all-in-with-alert-logic-and-azure/</loc>
		<lastmod>2019-10-24T22:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/throwback-threat-thursday-jce-vulnerability/</loc>
		<lastmod>2019-10-24T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cachet-financial-reeling-from-mypayrollhr-fraud/</loc>
		<lastmod>2019-10-25T00:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/join-fortinet-at-the-att-business-summit/</loc>
		<lastmod>2019-10-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortiguard-labs-weekly-threat-update-week-of-25-october-2019/</loc>
		<lastmod>2019-10-25T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/sensitive-us-government-and-military-travel-details-left-exposed-online/</loc>
		<lastmod>2019-10-25T07:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/insider-threat-reporting-by-the-numbers/</loc>
		<lastmod>2019-10-25T10:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc>
		<lastmod>2019-10-25T11:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dark-web-site-taken-down-without-breaking-encryption/</loc>
		<lastmod>2019-10-25T11:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-view-into-top-level-domain-tld-abuse/</loc>
		<lastmod>2019-10-25T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/lock-chrome-browser-for-online-exams-on-windows-10-devices/</loc>
		<lastmod>2019-10-25T12:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ncipher-security-comments-on-national-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-25T12:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/lazy-privilege-escalation-abusing-dells-dup-framework-cve-2019-3726/</loc>
		<lastmod>2019-10-25T13:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-your-it-team-can-effectively-manage-the-corporate-owned-devices/</loc>
		<lastmod>2019-10-25T13:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/pam-vs-vpam-whats-the-difference/</loc>
		<lastmod>2019-10-25T14:09:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-sneaky-online-security-threat-encrypted-malware-in-ssl/</loc>
		<lastmod>2019-10-25T15:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/windows-update-for-business-wufb-a-simplified-guide/</loc>
		<lastmod>2019-10-25T15:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/scammer-stole-500k-from-ocala-fl-in-spear-phishing-attack/</loc>
		<lastmod>2019-10-25T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-fast-facts-about-sender-identity-and-email/</loc>
		<lastmod>2019-10-25T16:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/medusalocker-ransomware-at-large-avast/</loc>
		<lastmod>2019-10-25T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-david-tulis-com-hijacking-techniques/</loc>
		<lastmod>2019-10-25T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-quantum-supremacy/</loc>
		<lastmod>2019-10-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/web-layer-visibility-defined-identifying-top-web-attack-indicators/</loc>
		<lastmod>2019-10-25T17:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/best-practices-for-defanging-social-media-phishing-attacks/</loc>
		<lastmod>2019-10-25T17:52:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enhancing-video-streaming-quality-for-exoplayer-part-2-exoplayers-buffering-strategy-how-to-lower-startup-time-and-how-to-lower-rebuffering-for-video-on-demand/</loc>
		<lastmod>2019-10-25T17:59:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-kevin-gennusos-testing-endpoint-protection-how-anyone-can-bypass-next-gen-av/</loc>
		<lastmod>2019-10-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersec-ai-prague-conference-in-prague-avast/</loc>
		<lastmod>2019-10-25T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/site-swap-revamping-your-sharepoint-sites/</loc>
		<lastmod>2019-10-25T18:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/secure-it-keep-your-digital-profile-safe-from-vishers-and-phishers/</loc>
		<lastmod>2019-10-25T18:57:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/key-compliance-concepts-for-financial-services/</loc>
		<lastmod>2019-10-25T19:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/are-hardware-architects-to-blame-for-the-current-abysmal-state-of-security/</loc>
		<lastmod>2019-10-25T19:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/from-my-gartner-blog-the-new-vulnerability-management-guidance-framework/</loc>
		<lastmod>2019-10-25T20:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/businesses-face-increased-risk-as-windows-7-end-of-life-quickly-approaches/</loc>
		<lastmod>2019-10-25T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/operation-shields-up-web-isolation-in-the-u-s-military-2/</loc>
		<lastmod>2019-10-25T22:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/broadcom-symantec-great-for-wall-street-not-for-security/</loc>
		<lastmod>2019-10-25T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/webinars-how-to-risk-rank-vulnerabilities-insights-from-bsimm10/</loc>
		<lastmod>2019-10-26T05:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-deral-heilands-inter-chip-communication-testing-end-to-end-security-on-iot/</loc>
		<lastmod>2019-10-26T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-imagine-going-back-in-time/</loc>
		<lastmod>2019-10-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-mike-saunders-assumed-breach-a-better-model-for-penetration-testing/</loc>
		<lastmod>2019-10-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/devsecops-elite-and-their-reference-architecture/</loc>
		<lastmod>2019-10-27T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-karl-fosaaens-adventures-in-azure-privilege-escalation/</loc>
		<lastmod>2019-10-27T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/luke-kingmas-lou-patrick-mackays-futurism-comics-cure-bald-coral-reefs-on-mars/</loc>
		<lastmod>2019-10-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-facebook-like-button-is-not-as-innocent-as-it-seems/</loc>
		<lastmod>2019-10-27T18:06:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-matthew-szymanski-rest-in-peace-abusing-graphql-to-attack-underlying-infrastructure/</loc>
		<lastmod>2019-10-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nord-vpn-security-incident-smart-speaker-phishing-apple-ios-13-privacy-features/</loc>
		<lastmod>2019-10-28T04:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/modern-skills-for-modern-cisos-your-questions-answered/</loc>
		<lastmod>2019-10-28T05:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortinet-acquires-endpoint-security-innovator-ensilo/</loc>
		<lastmod>2019-10-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/educating-employees-about-mobile-cyber-threats/</loc>
		<lastmod>2019-10-28T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-being-hacked-inspired-a-comic-book-series-cyber-work-podcast/</loc>
		<lastmod>2019-10-28T07:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/former-fbi-general-counsel-jim-baker-chooses-encryption-over-backdoors/</loc>
		<lastmod>2019-10-28T12:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/glass-class-where-to-detect-malware/</loc>
		<lastmod>2019-10-28T13:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/us-doj-guidance-on-responding-to-and-reporting-cyber-incidents/</loc>
		<lastmod>2019-10-28T13:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/spelunking-macos-screentime-app-usage-with-r/</loc>
		<lastmod>2019-10-28T14:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/update-your-iphone-5-before-november-3-2019-or-lose-its-internet-access/</loc>
		<lastmod>2019-10-28T15:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/adobe-exposes-7-million-creative-cloud-accounts-online/</loc>
		<lastmod>2019-10-28T15:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/you-may-not-own-your-data-avast/</loc>
		<lastmod>2019-10-28T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-philip-tullys-matthew-haighs-jay-gibbles-michael-sikorskis-stringsifter-learning-to-rank-strings-output-for-speedier-malware-analysis/</loc>
		<lastmod>2019-10-28T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/think-your-data-is-hard-to-protect-these-assets-are-even-harder/</loc>
		<lastmod>2019-10-28T16:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-due-diligence-of-a-deal/</loc>
		<lastmod>2019-10-28T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/robert-m-lees-jeff-hass-little-bobby-comics-pairing/</loc>
		<lastmod>2019-10-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/court-cases-affected-by-trialworks-ransomware-incident/</loc>
		<lastmod>2019-10-28T17:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-tim-sheltons-breaking-entering-via-sdr-or-how-i-defeated-wiegend-over-uhf-vhf-or-your-apartment-isnt-safe/</loc>
		<lastmod>2019-10-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/compliance-threats-scares-an-up-close-look-at-security-villains/</loc>
		<lastmod>2019-10-28T18:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/firefox-dns-over-https-doh-and-enterprise-threat-protector/</loc>
		<lastmod>2019-10-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/trusted-computing-group-meets-in-toronto-to-discuss-security-standards/</loc>
		<lastmod>2019-10-28T18:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/can-your-personality-indicate-how-youll-react-to-a-cyberthreat/</loc>
		<lastmod>2019-10-28T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-ir-analyzing-fileless-malware/</loc>
		<lastmod>2019-10-28T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/red-team-operations-report-structure-and-content/</loc>
		<lastmod>2019-10-28T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/data-breaches-force-10-of-small-company-victims-out-of-business/</loc>
		<lastmod>2019-10-28T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/plundered-they-were/</loc>
		<lastmod>2019-10-28T19:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ouroboros-ransomware-decryption-tool/</loc>
		<lastmod>2019-10-28T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/context-is-king-when-it-comes-to-effective-data-protection/</loc>
		<lastmod>2019-10-28T20:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mitigate-then-investigate-watch-a-live-ddos-attack/</loc>
		<lastmod>2019-10-28T21:59:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/f5s-big-iq-integrated-with-venafi-machine-identity-protection-platform-for-superior-app-security/</loc>
		<lastmod>2019-10-28T22:47:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fake-french-police-sextortion-scam/</loc>
		<lastmod>2019-10-28T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-firewall-chasm-is/</loc>
		<lastmod>2019-10-29T04:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ransomware-phishing-and-supply-chain-the-most-significant-threats-to-uk-businesses/</loc>
		<lastmod>2019-10-29T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/learn-how-fortinet-can-protect-your-azure-environment-at-microsoft-ignite-2019/</loc>
		<lastmod>2019-10-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/customers-choose-fortinet-secure-sd-wan-for-a-cloud-ready-branch/</loc>
		<lastmod>2019-10-29T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/iot-security-or-the-lack-there-of/</loc>
		<lastmod>2019-10-29T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-build-a-cyber-incident-response-plan/</loc>
		<lastmod>2019-10-29T08:59:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ciphercloud-gartner-mq-visionary-for-casb-in-2019/</loc>
		<lastmod>2019-10-29T09:15:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-can-casb-help-achieve-data-privacy-compliance-for-ccpa/</loc>
		<lastmod>2019-10-29T09:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/acunetix-takes-part-in-the-grid-sprint/</loc>
		<lastmod>2019-10-29T09:29:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/paving-the-path-to-better-data-discovery-my-perspective-on-the-thales-ground-labs-partnership/</loc>
		<lastmod>2019-10-29T09:58:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/what-is-password-reset-poisoning/</loc>
		<lastmod>2019-10-29T09:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-seo-poisoning-search-engine-poisoning/</loc>
		<lastmod>2019-10-29T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/common-password-vulnerabilities-and-how-to-avoid-them/</loc>
		<lastmod>2019-10-29T09:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/taking-the-fifth/</loc>
		<lastmod>2019-10-29T10:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/unicredit-leaks-3-million-customer-records-in-data-breach/</loc>
		<lastmod>2019-10-29T10:06:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/7-ways-industry-is-supporting-national-cybersecurity-awareness-month/</loc>
		<lastmod>2019-10-29T11:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/enhancing-application-security-processes/</loc>
		<lastmod>2019-10-29T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-professionals-hope-ai-will-solve-what-ails-them/</loc>
		<lastmod>2019-10-29T11:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-drmta-loops-and-lines/</loc>
		<lastmod>2019-10-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/http-desync-attacks-in-the-wild-and-how-to-defend-against-them/</loc>
		<lastmod>2019-10-29T12:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/privilege-access-management-as-a-service-why-it-matters/</loc>
		<lastmod>2019-10-29T13:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/australia-sues-google-for-allegedly-misleading-android-users-about-location-data-collection/</loc>
		<lastmod>2019-10-29T13:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fancy-bear-targeting-anti-doping-organizations-ahead-of-2020-olympic-games/</loc>
		<lastmod>2019-10-29T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-ways-to-avoid-a-ransomware-attack/</loc>
		<lastmod>2019-10-29T13:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dont-respond-to-suspicious-emails/</loc>
		<lastmod>2019-10-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/akamai-identified-as-a-leader-among-zero-trust-providers-by-independent-research-firm/</loc>
		<lastmod>2019-10-29T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/shared-intel-apis-hook-up-new-web-and-mobile-apps-and-break-attack-vectors-wide-open/</loc>
		<lastmod>2019-10-29T15:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/centurylink-data-exposed-to-public/</loc>
		<lastmod>2019-10-29T15:23:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/star-wars-a-tragic-tale-of-data-security/</loc>
		<lastmod>2019-10-29T15:27:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/grace-hopper-celebration-ghc-2019-recap/</loc>
		<lastmod>2019-10-29T15:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-ronnie-tokazowskis-the-art-of-the-bec-what-three-years-of-fighting-has-taught-us/</loc>
		<lastmod>2019-10-29T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-key-elements-of-the-nist-password-requirements-for-2020/</loc>
		<lastmod>2019-10-29T16:18:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/network-traffic-analysis-for-ir-network-mapping-for-incident-response/</loc>
		<lastmod>2019-10-29T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/red-team-operations-reporting-for-compliance/</loc>
		<lastmod>2019-10-29T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malware-spotlight-malvertising/</loc>
		<lastmod>2019-10-29T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hipaa-compliance-tips-best-practices-factors-to-consider-when-developing-effective-policies-procedures/</loc>
		<lastmod>2019-10-29T16:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-joy-of-tech-a-little-too-creepy/</loc>
		<lastmod>2019-10-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/5-reasons-to-implement-a-corporate-owned-device-policy/</loc>
		<lastmod>2019-10-29T17:24:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/stories-of-romance-scam-victims-ronayerin-ogolor/</loc>
		<lastmod>2019-10-29T17:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-kelly-villanuevas-practical-heuristic-exploitation/</loc>
		<lastmod>2019-10-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-nydfs/</loc>
		<lastmod>2019-10-29T18:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/synopsys-software-integrity-group-security-week-2019/</loc>
		<lastmod>2019-10-29T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tara-hernandez-talks-code-rush-google-devops/</loc>
		<lastmod>2019-10-29T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/benefits-of-providing-corporate-owned-devices-to-knowledge-workers/</loc>
		<lastmod>2019-10-29T18:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-new-approaches-to-help-organizations-improve-phishing-security-part-two-2/</loc>
		<lastmod>2019-10-29T19:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-true-password-less-future-yes-soon-quite-unlikely/</loc>
		<lastmod>2019-10-29T18:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/talia-gerson-phd-quantum-computing-expert-explains-one-concept-in-5-levels-of-difficulty/</loc>
		<lastmod>2019-10-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/living-with-multiple-siems/</loc>
		<lastmod>2019-10-29T20:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/takeaways-from-the-566m-briansclub-breach/</loc>
		<lastmod>2019-10-29T21:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/digital-transformation-and-the-ciso/</loc>
		<lastmod>2019-10-29T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/streamline-cybersecurity-for-cloud-applications-and-data-on-azure/</loc>
		<lastmod>2019-10-29T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/eyes-only-security-marking/</loc>
		<lastmod>2019-10-29T23:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/qualys-brings-global-it-asset-discovery-and-inventory-app-to-federal-government/</loc>
		<lastmod>2019-10-29T23:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hiding-in-plain-sight-new-adwind-jrat-variant-uses-normal-java-commands-to-mask-its-behavior/</loc>
		<lastmod>2019-10-30T03:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/leadership-through-security-the-changing-role-of-the-ciso/</loc>
		<lastmod>2019-10-30T04:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-benefits-of-taking-data-out-of-pci-audit-scope/</loc>
		<lastmod>2019-10-30T04:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/two-companies-in-new-jersey-hacked-with-keyloggers/</loc>
		<lastmod>2019-10-30T07:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/introduction-to-single-purpose-device-management/</loc>
		<lastmod>2019-10-30T09:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-safe-browsing-fails-to-protect-user-privacy/</loc>
		<lastmod>2019-10-30T11:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tracking-cve-2019-11043-php-vulnerability-an-uncommon-chain-of-events/</loc>
		<lastmod>2019-10-30T11:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/security-is-a-shared-responsibility/</loc>
		<lastmod>2019-10-30T11:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mobile-aware-phishing-campaign-targets-unicef-the-un-and-many-other-humanitarian-organizations/</loc>
		<lastmod>2019-10-30T11:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/american-cancer-society-website-visitors-should-check-their-bank-statements/</loc>
		<lastmod>2019-10-30T13:08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/health-information-systems-customer-powers-itself-through-innovation-enabled-by-aws-and-divvycloud/</loc>
		<lastmod>2019-10-30T13:39:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/compliance-automation-enables-fintech-customers-soc-2-certification/</loc>
		<lastmod>2019-10-30T13:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/flashpoint-extends-integration-ecosystem-arming-more-users-with-uniquely-sourced-intelligence-visibility-into-threats/</loc>
		<lastmod>2019-10-30T14:11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fbi-advises-smbs-on-dangers-of-e-skimming/</loc>
		<lastmod>2019-10-30T14:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-attacks-hit-the-city-of-johannesburg-and-south-african-banks/</loc>
		<lastmod>2019-10-30T14:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/two-years-after-the-release-of-the-2017-owasp-top-ten-limited-improvements-shown/</loc>
		<lastmod>2019-10-30T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dozens-of-apps-still-dodging-googles-vetting-system/</loc>
		<lastmod>2019-10-30T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-jimi-sebrees-assessing-iot-surveillance-analysis-of-arlo-security-camera-base-station/</loc>
		<lastmod>2019-10-30T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/securing-data-beyond-the-corporate-walls/</loc>
		<lastmod>2019-10-30T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/securing-a-business-from-scratch/</loc>
		<lastmod>2019-10-30T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/veracode-dynamic-analysis-jenkins-integrate-dast-into-your-ci-cd-pipeline/</loc>
		<lastmod>2019-10-30T16:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ncsam-is-over-but-dont-let-cybersecurity-fade-to-black/</loc>
		<lastmod>2019-10-30T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-emulation/</loc>
		<lastmod>2019-10-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-bitcoin-and-blockchain-technology-evolved-avast/</loc>
		<lastmod>2019-10-30T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/signs-of-analyst-burnout-amp-how-soar-can-help/</loc>
		<lastmod>2019-10-30T17:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-andy-robbins-rohan-vazarkars-bloodhound-head-to-tail-2/</loc>
		<lastmod>2019-10-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-are-single-purpose-devices-why-there-is-a-need-to-manage-them/</loc>
		<lastmod>2019-10-30T18:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/its-past-time-to-put-passwords-out-of-our-misery/</loc>
		<lastmod>2019-10-30T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/have-your-cake-and-eat-it-too-how-virtual-air-gap-solves-critical-digital-transformation-challenges/</loc>
		<lastmod>2019-10-30T18:50:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-hacker-vs-struts-2-game-it-appears-it-has-no-ending/</loc>
		<lastmod>2019-10-30T18:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/red-team-operations-providing-recommendations/</loc>
		<lastmod>2019-10-30T18:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malware-spotlight-crypto-jacking/</loc>
		<lastmod>2019-10-30T18:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/nordd/</loc>
		<lastmod>2019-10-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/malspam-campaign-targeting-italian-users-with-maze-ransomware/</loc>
		<lastmod>2019-10-30T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/we-are-supporting-coalfire/</loc>
		<lastmod>2019-10-30T19:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/breaches-at-networksolutions-register-com-and-web-com/</loc>
		<lastmod>2019-10-30T20:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/whats-the-roi-of-threat-hunting-2/</loc>
		<lastmod>2019-10-30T22:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/complete-office-365s-dmarc-support-with-valimail/</loc>
		<lastmod>2019-10-30T22:12:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/becybersmart-tips-tricks-for-protecting-data-all-year-round/</loc>
		<lastmod>2019-10-30T21:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/data-urls-and-html-entities-in-new-wordpress-malware/</loc>
		<lastmod>2019-10-30T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/intellij-and-vulnerability-search-with-nexus-lifecycle/</loc>
		<lastmod>2019-10-30T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/autonomy-and-the-death-of-cves-is-the-manual-process-of-reporting-bugs-holding-back-the-advent-of-automated-tools/</loc>
		<lastmod>2019-10-30T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-storage-acquisition-from-endpoint-devices/</loc>
		<lastmod>2019-10-30T23:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/3-steps-to-manage-vulnerabilities-lessons-from-surviving-a-zombie-infestation/</loc>
		<lastmod>2019-10-31T02:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/be-afraid-be-very-afraid/</loc>
		<lastmod>2019-10-31T06:59:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/fortigate-60f-the-top-ngfw-with-sd-wan-now-accelerated-by-a-purpose-built-security-processor/</loc>
		<lastmod>2019-10-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-the-sd-wan-cyber-threat-assessment-benefits-partner-business/</loc>
		<lastmod>2019-10-31T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/repost-opinion-businesses-must-address-risks-in-order-to-accelerate-digitalization/</loc>
		<lastmod>2019-10-31T08:59:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/scalefusion-for-frontline-workers/</loc>
		<lastmod>2019-10-31T10:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc>
		<lastmod>2019-10-31T11:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/man-admits-role-in-identity-theft-plot-that-targeted-u-s-military-persons/</loc>
		<lastmod>2019-10-31T11:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dns-rebinding-a-frightening-attack-vector-with-spooky-security-impacts/</loc>
		<lastmod>2019-10-31T11:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-to-secure-your-android-rugged-devices/</loc>
		<lastmod>2019-10-31T11:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-4-cloud-security-risks-for-k-12/</loc>
		<lastmod>2019-10-31T11:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-makes-a-digital-risk-management-program/</loc>
		<lastmod>2019-10-31T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/60-of-breaches-in-2019-involved-unpatched-vulnerabilities/</loc>
		<lastmod>2019-10-31T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-security-dangers-of-over-confidence/</loc>
		<lastmod>2019-10-31T12:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/lazarus-group-may-have-hacked-indian-nuclear-power-plant/</loc>
		<lastmod>2019-10-31T13:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/halloween-the-curse-of-data/</loc>
		<lastmod>2019-10-31T13:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/recap-how-to-proactively-protect-users-with-email-incident-response/</loc>
		<lastmod>2019-10-31T14:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cyber-scenarios-expose-shortcomings-of-bmr/</loc>
		<lastmod>2019-10-31T14:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/untitled-goose-game-security-hole-could-have-allowed-hackers-to-wreak-havoc/</loc>
		<lastmod>2019-10-31T15:19:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-tal-melameds-full-steam-ahead-serverless-hacking-101/</loc>
		<lastmod>2019-10-31T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/automate-dynamic-analysis-scans-with-new-rest-apis/</loc>
		<lastmod>2019-10-31T16:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dont-let-data-loss-spook-you/</loc>
		<lastmod>2019-10-31T16:39:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/this-is-how-orchestration-can-break-the-appsec-stalemate/</loc>
		<lastmod>2019-10-31T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/xkcd-terminator-dark-fate/</loc>
		<lastmod>2019-10-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/are-password-managers-good-enough-to-protect-you/</loc>
		<lastmod>2019-10-31T17:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mitre-attck-man-in-the-browser/</loc>
		<lastmod>2019-10-31T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-future-of-red-team-operations/</loc>
		<lastmod>2019-10-31T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/customer-experience-and-it/</loc>
		<lastmod>2019-10-31T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/application-management-on-rugged-devices/</loc>
		<lastmod>2019-10-31T17:38:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/testing-tool-profile-why-threat-stack-uses-thoughtworks-gauge/</loc>
		<lastmod>2019-10-31T17:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/derbycon2019-alex-jay-balans-next-gen-iot-botnets-leveraging-cloud-implementations-for-shells-on-500k-iots/</loc>
		<lastmod>2019-10-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/halloween-tales-of-the-iot-crypt/</loc>
		<lastmod>2019-10-31T18:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/coalfire-ceo-tom-mcandrews-statement/</loc>
		<lastmod>2019-10-31T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/synopsys-cso-cybersecurity-awareness-month-lessons-need-to-be-applied-all-year/</loc>
		<lastmod>2019-10-31T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-best-practices-and-risks-that-every-enterprise-should-know-infographic/</loc>
		<lastmod>2019-10-31T20:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/a-web-driven-world-needs-better-web-security/</loc>
		<lastmod>2019-10-31T20:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/where-next-after-national-cyber-security-awareness-month/</loc>
		<lastmod>2019-10-31T20:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/adobe-confirms-security-vulnerability-in-one-of-their-elasticsearch-servers-that-exposed-7-5-million-creative-cloud-accounts/</loc>
		<lastmod>2019-10-31T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/men-paid-100k-by-uber-to-hush-up-hack-plead-guilty-to-extortion-scheme/</loc>
		<lastmod>2019-10-31T22:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/tripwire-patch-priority-index-for-october-2019/</loc>
		<lastmod>2019-10-31T22:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-the-role-of-ai-in-cybersecurity-operations/</loc>
		<lastmod>2019-11-01T00:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/heighted-attacks-force-utility-companies-to-rethink-security/</loc>
		<lastmod>2019-11-01T06:47:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-cetpa-2019-can-benefit-educators-and-it-professionals-alike/</loc>
		<lastmod>2019-11-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortiguard-labs-weekly-threat-update-week-of-01-november-2019/</loc>
		<lastmod>2019-11-01T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/two-new-tools-that-tame-the-treachery-of-files/</loc>
		<lastmod>2019-11-01T11:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/researchers-find-sms-monitoring-malware-in-linux-telecom-servers/</loc>
		<lastmod>2019-11-01T11:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/censys-launches-attack-surface-visibility-platform/</loc>
		<lastmod>2019-11-01T12:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ransomware-payments-rise-as-public-sector-is-targeted-new-variants-enter-the-market/</loc>
		<lastmod>2019-11-01T12:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ethical-hackers-filling-a-vital-role-in-society/</loc>
		<lastmod>2019-11-01T14:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/payroll-fraud-a-growing-bec-threat-to-businesses-and-employees-alike/</loc>
		<lastmod>2019-11-01T15:08:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nexus-repo-and-datree-integration-deliver-automated-pipeline-control/</loc>
		<lastmod>2019-11-01T15:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jason-langs-red-team-methodology-a-naked-look/</loc>
		<lastmod>2019-11-01T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/big-data-security-series-part-2-how-hard-is-it-to-secure-big-data/</loc>
		<lastmod>2019-11-01T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/krakows-commitment-to-a-sustainable-office-and-community/</loc>
		<lastmod>2019-11-01T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/03/9-smartphone-tips-for-seniors-avast/</loc>
		<lastmod>2019-11-01T16:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebook-shuts-down-russian-propaganda-networks-avast/</loc>
		<lastmod>2019-11-01T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-airpods-pro-inevitability/</loc>
		<lastmod>2019-11-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/keeping-digital-information-safe-with-soc2-and-hipaa/</loc>
		<lastmod>2019-11-01T17:07:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-lesley-carharts-chelle-clements-april-c-wrights-amanda-berlins-and-lee-neely-moderator-five-mistakes-we-wish-users-would-stop-making/</loc>
		<lastmod>2019-11-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/employee-negligence-remains-the-biggest-threat-in-data-breaches/</loc>
		<lastmod>2019-11-01T18:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/younger-workers-lax-when-it-comes-to-cybersecurity-survey-finds/</loc>
		<lastmod>2019-11-01T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/firewalla-review-15-most-dangerous-apps-for-kids-rise-of-the-deepfake/</loc>
		<lastmod>2019-11-01T19:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinars-ci-cd-optimization-and-automated-testing-open-source-audit-reports/</loc>
		<lastmod>2019-11-01T19:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/public-vs-private-certificate-authority/</loc>
		<lastmod>2019-11-01T22:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/friday-squid-blogging-triassic-kraken/</loc>
		<lastmod>2019-11-01T21:12:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-first-the-double-edged-sword-of-remote-collaboration/</loc>
		<lastmod>2019-11-01T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cimcor-interview-for-hot-150-cybersecurity-companies/</loc>
		<lastmod>2019-11-01T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fraudsters-use-salary-increase-scam-to-steal-employees-credentials/</loc>
		<lastmod>2019-11-02T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-trent-los-attacking-with-automation-how-office-365-automation-provides-another-new-risk-to-the-cloud/</loc>
		<lastmod>2019-11-02T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-screen-time/</loc>
		<lastmod>2019-11-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jim-shavers-api-keys-now-what-taking-the-pen-test-into-the-amazon-cloud/</loc>
		<lastmod>2019-11-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/analyst-discusses-reporting-hack-of-computer-system-at-indian-nuclear-reactor-avast/</loc>
		<lastmod>2019-11-02T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/advantages-of-kubernetes-native-security-explained-video-interview/</loc>
		<lastmod>2019-11-03T01:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/patches-for-cve-2019-11253-released-why-you-should-upgrade-your-kubernetes-clusters-immediately/</loc>
		<lastmod>2019-11-03T01:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/stackrox-secures-kubernetes-and-simplifies-soc-2-for-fintech-disruptor-yaypay/</loc>
		<lastmod>2019-11-03T01:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/holistic-kubernetes-and-cloud-native-app-security-podcast/</loc>
		<lastmod>2019-11-03T01:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/kubernetes-security-best-practices-video-and-demo/</loc>
		<lastmod>2019-11-03T01:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/protecting-system-firmware-storage/</loc>
		<lastmod>2019-11-03T01:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-firmware-face-of-fileless-threats/</loc>
		<lastmod>2019-11-03T01:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/virtual-media-vulnerability-in-bmc-opens-servers-to-remote-attack/</loc>
		<lastmod>2019-11-03T01:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/screwed-drivers-signed-sealed-delivered/</loc>
		<lastmod>2019-11-03T01:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/using-run-time-hardware-telemetry-to-detect-firmware-attack-behavior/</loc>
		<lastmod>2019-11-03T01:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/vulnerable-firmware-in-the-supply-chain-of-enterprise-servers/</loc>
		<lastmod>2019-11-03T01:49:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/mind-the-gap-securing-traveler-laptops-from-common-cybersecurity-threats/</loc>
		<lastmod>2019-11-03T01:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/firmware-security-comes-of-age/</loc>
		<lastmod>2019-11-03T01:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/fisma-compliance-firmware-security-best-practices/</loc>
		<lastmod>2019-11-03T01:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/shadowhammer-and-the-firmware-supply-chain/</loc>
		<lastmod>2019-11-03T01:49:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/seczetta-closes-10m-series-a-funding/</loc>
		<lastmod>2019-11-03T01:57:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/s3-partners-with-seczetta-to-address-third-party-identity-risk/</loc>
		<lastmod>2019-11-03T01:57:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/seczetta-will-sponsor-navigate-austin-june-2019/</loc>
		<lastmod>2019-11-03T01:57:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/seczetta-will-sponsor-idm-europe-september-2019/</loc>
		<lastmod>2019-11-03T01:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/seczetta-appoints-new-vp-of-global-alliances-channel/</loc>
		<lastmod>2019-11-03T01:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/why-a-service-account-is-more-like-a-non-employee-than-you-think/</loc>
		<lastmod>2019-11-03T01:57:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/dynamic-and-flexible-ai-for-network-security/</loc>
		<lastmod>2019-11-03T02:08:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/leveraging-mixmode-to-monitor-aws-cloudtrail/</loc>
		<lastmod>2019-11-03T02:08:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-autonomous-ai-is-needed-in-cybersecurity/</loc>
		<lastmod>2019-11-03T02:08:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-security-pain-points-revealed-building-baselines-cloud-and-visibility-among-concerns/</loc>
		<lastmod>2019-11-03T02:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/too-many-alerts-a-national-security-threat/</loc>
		<lastmod>2019-11-03T02:08:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/e-book-how-unsupervised-learning-ai-will-solve-all-major-roadblocks-in-the-cybersecurity-industry/</loc>
		<lastmod>2019-11-03T02:08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/what-is-network-traffic-analysis-a-beginners-guide/</loc>
		<lastmod>2019-11-03T02:08:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/whitepaper-unsupervised-ai-ai-for-complex-network-security/</loc>
		<lastmod>2019-11-03T02:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/mixmode-6-1-8-investigator-massive-data-optimum-performance/</loc>
		<lastmod>2019-11-03T02:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/4-ways-to-protect-your-business-from-zero-day-attacks/</loc>
		<lastmod>2019-11-03T02:08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-unsupervised-machine-learning-is-the-future-of-cybersecurity/</loc>
		<lastmod>2019-11-03T02:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-difference-between-artificial-intelligence-and-machine-learning-in-network-security/</loc>
		<lastmod>2019-11-03T02:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/unsupervised-ai-as-a-service-predictive-intelligence-for-cybersecurity/</loc>
		<lastmod>2019-11-03T02:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/anomaly-detection-with-unsupervised-ai-in-mixmode-why-threat-intel-alone-is-not-enough/</loc>
		<lastmod>2019-11-03T02:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/improvements-to-mixmodes-pql-packetsled-query-language/</loc>
		<lastmod>2019-11-03T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/false-positives-and-negatives-the-plague-of-cybersecurity-software/</loc>
		<lastmod>2019-11-03T02:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/a-third-of-experts-predict-cybersecurity-wont-need-human-decision-makers-within-a-decade-this-week-in-ai/</loc>
		<lastmod>2019-11-03T02:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/how-mixmodes-ai-builds-your-networks-baseline/</loc>
		<lastmod>2019-11-03T02:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/turning-the-unsupervised-tables-on-the-turing-test/</loc>
		<lastmod>2019-11-03T02:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/69-of-it-executives-say-they-cannot-respond-to-cybersecurity-threats-without-ai-this-week-in-ai/</loc>
		<lastmod>2019-11-03T02:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-patrick-matthews-the-19-95-anonymous-cyber-profile/</loc>
		<lastmod>2019-11-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/luke-kingmas-lou-patrick-mackays-futurism-comics-gmoh/</loc>
		<lastmod>2019-11-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-james-condons-prepare-to-be-boarded-a-tale-of-kubernetes-plunder-and-cryptobooty/</loc>
		<lastmod>2019-11-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ncr-barred-mint-quickbooks-from-banking-platform-during-account-takeover-storm/</loc>
		<lastmod>2019-11-03T21:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-targeted-phish-from-a-linkedin-connection/</loc>
		<lastmod>2019-11-03T22:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whatsapps-nso-group-lawsuit-this-week-in-data-breaches-office-365-voicemail-phishing/</loc>
		<lastmod>2019-11-04T05:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nists-new-framework-to-mitigate-privacy-risks/</loc>
		<lastmod>2019-11-04T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/lacking-direction-to-address-your-ics-cybersecurity-issues-heres-what-you-can-do/</loc>
		<lastmod>2019-11-04T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-fortinet-cloud-security-offerings-for-microsoft-azure/</loc>
		<lastmod>2019-11-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-power-of-custom-security-processing/</loc>
		<lastmod>2019-11-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/insider-tips-from-a-cybersecurity-ceo-cyber-work-podcast/</loc>
		<lastmod>2019-11-04T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-tech-can-an-operational-system-of-record-alleviate-rising-knowledge-worker-frustrations/</loc>
		<lastmod>2019-11-04T09:47:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/transparent-cybersecurity-policies-make-companies-more-attractive-to-investors/</loc>
		<lastmod>2019-11-04T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/domain-joined-vs-non-domain-joined-best-management-tool/</loc>
		<lastmod>2019-11-04T14:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/six-times-more-data-breaches-reported-in-canada-after-disclosure-rules-tightened/</loc>
		<lastmod>2019-11-04T14:36:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-steps-to-securing-your-office-365-migration/</loc>
		<lastmod>2019-11-04T14:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/google-releases-patches-for-two-high-level-security-vulnerabilities-in-chrome-one-of-which-is-still-being-exploited-in-the-wild/</loc>
		<lastmod>2019-11-04T15:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-biometric-authentication-is-just-part-of-the-security-puzzle/</loc>
		<lastmod>2019-11-04T15:47:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/threatmetrix-cybercrime-report-an-interview/</loc>
		<lastmod>2019-11-04T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-point-of-sale-malware/</loc>
		<lastmod>2019-11-04T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-screen-capture/</loc>
		<lastmod>2019-11-04T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-michael-vieaus-kevin-bongs-build-your-own-multi-user-password-manager-using-open-source-software/</loc>
		<lastmod>2019-11-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/robert-m-lees-jeff-hass-little-bobby-comics/</loc>
		<lastmod>2019-11-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/configuring-yubikey-desktop-login-on-jamf-managed-devices/</loc>
		<lastmod>2019-11-04T18:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/my-take-how-blockchain-technology-came-to-seed-the-next-great-techno-industrial-revolution/</loc>
		<lastmod>2019-11-04T18:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-safely-shop-online-this-holiday-season/</loc>
		<lastmod>2019-11-04T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-tom-ruffs-no-class-low-tech-high-damage/</loc>
		<lastmod>2019-11-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pharma-spam-redirects-to-su-eu-sites/</loc>
		<lastmod>2019-11-04T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ask-the-experts-how-has-software-security-improved-in-the-last-few-years/</loc>
		<lastmod>2019-11-04T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/expedition-into-vulnerability/</loc>
		<lastmod>2019-11-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/encryption-issues-plague-cybersecurity-for-small-and-medium-businesses/</loc>
		<lastmod>2019-11-04T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nunavut-governments-it-system-struck-by-ransomware-attack/</loc>
		<lastmod>2019-11-04T20:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/keep-doing-what-youre-doing/</loc>
		<lastmod>2019-11-04T22:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/passwords-need-fixing-adaptive-mfa-everywhere-is-the-solution/</loc>
		<lastmod>2019-11-04T23:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/if-statements/</loc>
		<lastmod>2019-11-04T23:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bluekeep-attacks-observed-months-after-initial-release/</loc>
		<lastmod>2019-11-05T01:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/picking-up-both-ends-of-the-cloud/</loc>
		<lastmod>2019-11-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bluekeep-rdp-attacks-are-starting-patch-cve-2019-0708-now/</loc>
		<lastmod>2019-11-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nikkei-worker-tricked-into-transferring-29-million-into-scammers-bank-account/</loc>
		<lastmod>2019-11-05T08:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/developing-cybersecurity-muscle-memory-with-table-top-sessions/</loc>
		<lastmod>2019-11-05T09:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/building-and-maintaining-trust-in-the-not-for-profit-sector/</loc>
		<lastmod>2019-11-05T10:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-woodland-trust-enhances-telephone-payment-security-thanks-to-pci-pal/</loc>
		<lastmod>2019-11-05T10:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-security-megatrends-in-2020/</loc>
		<lastmod>2019-11-05T10:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/operationalizing-incident-response/</loc>
		<lastmod>2019-11-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/open-source-security-software-takeaways-from-a-case-study-on-diy-fatigue/</loc>
		<lastmod>2019-11-05T12:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-phish-that-scans-for-viruses/</loc>
		<lastmod>2019-11-05T12:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/secure-and-empower-employee-workflows-with-enterprise-application-plugins/</loc>
		<lastmod>2019-11-05T13:56:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cloud-adoption-2019-a-for-adoption/</loc>
		<lastmod>2019-11-05T13:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bec-scam-swindled-media-conglomerate-nikkei-out-of-29-million/</loc>
		<lastmod>2019-11-05T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-social-engineering-attacks-to-watch-out-for/</loc>
		<lastmod>2019-11-05T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/harvesting-likes-on-social-media-or-a-window-for-the-hacker-to-climb-through/</loc>
		<lastmod>2019-11-05T14:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-worrying-about-election-security-only-during-election-season-is-part-of-the-problem/</loc>
		<lastmod>2019-11-05T15:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/akamai-and-microsoft-delivering-a-better-zero-trust-access-model-for-the-hybrid-enterprise-together/</loc>
		<lastmod>2019-11-05T15:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/untangle-extends-the-network-to-the-edge-with-the-release-of-untangle-sd-wan-router-and-new-eseries-appliances/</loc>
		<lastmod>2019-11-05T15:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/50-shades-of-gray-in-cybersecurity/</loc>
		<lastmod>2019-11-05T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-do-you-prioritize-risk-for-privilege-access-management/</loc>
		<lastmod>2019-11-05T16:07:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/setting-up-a-vendor-management-program-3/</loc>
		<lastmod>2019-11-05T16:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jason-nesters-early-detection-through-deception/</loc>
		<lastmod>2019-11-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-what-are-botnets/</loc>
		<lastmod>2019-11-05T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/switch-statements/</loc>
		<lastmod>2019-11-05T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-audio-capture/</loc>
		<lastmod>2019-11-05T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-apple-tv-bet-you-cant-eat-just-one/</loc>
		<lastmod>2019-11-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/video-hacking-humans/</loc>
		<lastmod>2019-11-05T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mixmode-on-premise-now-available/</loc>
		<lastmod>2019-11-05T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-configure-wpa2-enterprise-on-each-operating-system/</loc>
		<lastmod>2019-11-05T18:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-harold-tabellions-the-quest-for-10g-ids/</loc>
		<lastmod>2019-11-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/end-to-end-encryption-the-good-the-bad-and-the-politics/</loc>
		<lastmod>2019-11-05T19:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fbi-alerts-that-2fa-is-bypassed-by-phishing-attacks-2/</loc>
		<lastmod>2019-11-05T19:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cooks-computational-survivalism/</loc>
		<lastmod>2019-11-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/win10-3-perspectives-on-endpoint-security-strategies/</loc>
		<lastmod>2019-11-05T21:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/what-is-bluekeep-and-why-should-i-care-avast/</loc>
		<lastmod>2019-11-05T22:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-data-analysis-for-incident-response/</loc>
		<lastmod>2019-11-05T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sonatype-partners-with-all-day-devops-to-deliver-the-largest-devops-conference-for-36000/</loc>
		<lastmod>2019-11-05T23:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/firemon-and-palo-alto-networks-unbeatable-value-together/</loc>
		<lastmod>2019-11-05T23:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitigating-the-threat-of-hackers-to-your-supply-chain/</loc>
		<lastmod>2019-11-05T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/multiple-bills-seek-to-secure-elections-will-they-do-it/</loc>
		<lastmod>2019-11-06T00:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-is-public-key-cryptography/</loc>
		<lastmod>2019-11-06T00:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/do-we-need-to-make-the-transition-from-iso-223012012-to-the-2019-revision/</loc>
		<lastmod>2019-11-06T02:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-pam-should-be-a-cisos-top-priority/</loc>
		<lastmod>2019-11-06T06:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-importance-of-threat-intelligence-to-partner-business/</loc>
		<lastmod>2019-11-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/6-of-the-best-reports-for-your-iso-27001-audit/</loc>
		<lastmod>2019-11-06T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-adopting-a-zero-trust-mentality-is-positive-when-it-comes-to-staying-secure-in-the-cloud/</loc>
		<lastmod>2019-11-06T08:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/spear-phishing-is-now-the-main-attack-vector-for-cybercriminals-says-europol/</loc>
		<lastmod>2019-11-06T08:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/microsoft-ignite-cyber-security-takeaways/</loc>
		<lastmod>2019-11-06T09:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/password-policy-manager-2-0-multisite-networks-support-first-time-login-password-change/</loc>
		<lastmod>2019-11-06T10:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-support-communication-between-your-field-force-with-eva-communication-suite/</loc>
		<lastmod>2019-11-06T12:24:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/consistent-security-meets-continuous-deployment-on-azure/</loc>
		<lastmod>2019-11-06T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/meet-guardian-community-edition-a-free-tool-for-ot-iot-security/</loc>
		<lastmod>2019-11-06T12:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/throwing-more-money-at-cyber-security-challenges-will-not-necessarily-address-them-companies-need-to-spend-wisely/</loc>
		<lastmod>2019-11-06T13:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fast-growing-network-security-startup-bricata-enlists-new-chief-product-officer-and-vice-president-of-sales/</loc>
		<lastmod>2019-11-06T13:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/breaking-down-the-owasp-api-security-top-10-part-1/</loc>
		<lastmod>2019-11-06T13:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-growing-presence-and-security-risks-of-iot/</loc>
		<lastmod>2019-11-06T14:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/preparing-for-the-new-regulatory-environment/</loc>
		<lastmod>2019-11-06T14:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-connection-analysis/</loc>
		<lastmod>2019-11-06T14:58:28+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->