<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-what-are-backdoors/</loc>
		<lastmod>2019-11-06T14:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-input-capture/</loc>
		<lastmod>2019-11-06T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/isc%c2%b2-finds-the-cybersecurity-workforce-needs-to-grow-145-to-close-skills-gap-and-better-defend-organizations-worldwide/</loc>
		<lastmod>2019-11-06T15:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-tips-for-responding-to-cyber-attacks/</loc>
		<lastmod>2019-11-06T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mobile-window-shopping-climbs-but-sites-are-still-failing-users/</loc>
		<lastmod>2019-11-06T16:18:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-tech-silverfort-deploys-multi-factor-authentication-to-lock-down-machine-identities/</loc>
		<lastmod>2019-11-06T16:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-mick-douglas-pete-petersens-swagger-defense/</loc>
		<lastmod>2019-11-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-megacortex-ransomware-variant-changes-victims-windows-passwords/</loc>
		<lastmod>2019-11-06T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/implementing-security-best-practices-in-the-virtual-data-center/</loc>
		<lastmod>2019-11-06T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/idaptive-among-the-three-highest-scoring-vendors-for-every-use-case-in-the-2019-gartner-access-management-critical-capabilities-report/</loc>
		<lastmod>2019-11-06T17:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-software-updates/</loc>
		<lastmod>2019-11-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/open-source-for-lawyers-costs-of-open-source-use/</loc>
		<lastmod>2019-11-06T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-is-not-the-enemy-of-successful-digital-transformation/</loc>
		<lastmod>2019-11-06T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-will-schroeders-kerberoasting-revisited/</loc>
		<lastmod>2019-11-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-increase-productivity-of-your-frontline-workers/</loc>
		<lastmod>2019-11-06T19:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/dont-skip-data-discovery-during-your-compliance-program/</loc>
		<lastmod>2019-11-06T19:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bytedance-tiktokd/</loc>
		<lastmod>2019-11-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/qa-with-new-avast-ciso-jaya-baloo-avast/</loc>
		<lastmod>2019-11-06T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/magento-1-end-of-life/</loc>
		<lastmod>2019-11-06T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinar-all-things-ctf/</loc>
		<lastmod>2019-11-06T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/researchers-reveal-light-commands-laser-based-audio-injection-attacks-on-voice-control-devices-like-alexa-siri-and-google-assistant/</loc>
		<lastmod>2019-11-06T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-healthy-is-your-web-of-connected-devices/</loc>
		<lastmod>2019-11-06T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/where-in-the-world-is-peter-carlisle-around-the-world-in-20-days-special-edition/</loc>
		<lastmod>2019-11-07T06:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/escaping-the-egregious-eleven-part-one/</loc>
		<lastmod>2019-11-07T06:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ciphercloud-casb-mobile-connect/</loc>
		<lastmod>2019-11-07T06:38:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/smart-buildings-securing-your-new-attack-surface/</loc>
		<lastmod>2019-11-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/anatomy-of-scalable-vector-graphics-svg-attack-surface-on-the-web/</loc>
		<lastmod>2019-11-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-we-need-to-know-about-bluetooth-security/</loc>
		<lastmod>2019-11-07T09:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mobility-of-frontline-workforce-why-your-field-employees-need-mobile-devices/</loc>
		<lastmod>2019-11-07T09:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mac-users-warned-that-disabling-all-office-macros-doesnt-actually-disable-all-office-macros/</loc>
		<lastmod>2019-11-07T10:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/debunking-the-bluekeep-exploit-hype-what-you-should-know/</loc>
		<lastmod>2019-11-07T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/thunder-on-the-horizon-4-security-threats-for-the-cloud/</loc>
		<lastmod>2019-11-07T10:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/oauth-risks-and-solutions-for-k-12/</loc>
		<lastmod>2019-11-07T11:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/networkminer-2-5-released/</loc>
		<lastmod>2019-11-07T11:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-assessment-techniques-for-go-projects/</loc>
		<lastmod>2019-11-07T12:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cloud-native-application-security-challenges/</loc>
		<lastmod>2019-11-07T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/spearhead-digital-transformation-for-frontline-workers/</loc>
		<lastmod>2019-11-07T12:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-campaign-used-subpoena-themed-email-to-deliver-infostealer/</loc>
		<lastmod>2019-11-07T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/to-tor-or-not-to-tor-2/</loc>
		<lastmod>2019-11-07T14:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-campaigns-boosting-success-with-google-analytics/</loc>
		<lastmod>2019-11-07T14:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-activity-rises-to-record-in-third-quarter-apwg-report-says/</loc>
		<lastmod>2019-11-07T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-incident-response-ir-what-incident-responders-should-know-about-networking/</loc>
		<lastmod>2019-11-07T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-event-based-analysis/</loc>
		<lastmod>2019-11-07T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-network-sniffing/</loc>
		<lastmod>2019-11-07T14:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bitglass-security-spotlight-microsoft-users-attacked-via-phishing/</loc>
		<lastmod>2019-11-07T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/detecting-account-takeover-botnets/</loc>
		<lastmod>2019-11-07T16:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/yubico-reveals-biometric-yubikey-at-microsoft-ignite/</loc>
		<lastmod>2019-11-07T16:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-joe-bs-theblindhacker-hacking-whilst-blind/</loc>
		<lastmod>2019-11-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/automate-password-policy-nist-password-guidelines/</loc>
		<lastmod>2019-11-07T17:02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ccpa-vs-gdpr-what-you-need-to-know-about-these-data-privacy-laws/</loc>
		<lastmod>2019-11-07T17:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-benefits-of-a-single-provider-dns-platform/</loc>
		<lastmod>2019-11-07T17:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-voting-referendum/</loc>
		<lastmod>2019-11-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/meet-threat-stack-at-aws-reinvent-2019/</loc>
		<lastmod>2019-11-07T18:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jamison-budackis-choose-your-own-ttx-redefining-the-incident-response-table-top-exercise/</loc>
		<lastmod>2019-11-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/study-ransomware-data-breaches-at-hospitals-tied-to-uptick-in-fatal-heart-attacks/</loc>
		<lastmod>2019-11-07T19:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ring-video-doorbell-pro-under-the-scope/</loc>
		<lastmod>2019-11-07T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/us-doj-charges-two-and-one-other-former-twitter-employees-under-18-united-states-code-951-18-united-states-code-1519/</loc>
		<lastmod>2019-11-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/social-media-account-takeover-is-as-vicious-as-a-bec-attack/</loc>
		<lastmod>2019-11-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/secure-developer-workstations-without-slowing-them-down/</loc>
		<lastmod>2019-11-07T20:21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/our-top-3-insights-on-alert-fatigue-in-cybersecurity/</loc>
		<lastmod>2019-11-07T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/skimmers-for-both-magento-and-wordpress/</loc>
		<lastmod>2019-11-07T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/soc-2-compliance-in-container-and-kubernetes-environments/</loc>
		<lastmod>2019-11-07T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/infographic-7-truths-to-improve-your-software-security-program/</loc>
		<lastmod>2019-11-07T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-machine-learning-is-changing-the-face-of-financial-services/</loc>
		<lastmod>2019-11-07T22:04:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/deloitte-names-sonatype-in-technology-fast-500-for-fourth-consecutive-year/</loc>
		<lastmod>2019-11-07T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-signature-based-defense-is-no-longer-adequate-for-todays-cybersecurity/</loc>
		<lastmod>2019-11-08T06:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortiguard-labs-weekly-threat-update-november-8-2019/</loc>
		<lastmod>2019-11-08T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortiguard-labs-weekly-threat-update-week-of-08-november-2019/</loc>
		<lastmod>2019-11-08T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/field-ciso-qa-jim-richberg/</loc>
		<lastmod>2019-11-08T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-facilitate-ios-app-distribution-without-app-store/</loc>
		<lastmod>2019-11-08T10:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xhelper-malware-for-android/</loc>
		<lastmod>2019-11-08T12:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/secure-browsing-on-corporate-owned-mobile-devices-need-on-the-hour/</loc>
		<lastmod>2019-11-08T13:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/original-google-pixel-to-get-the-last-update-this-december/</loc>
		<lastmod>2019-11-08T14:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/defending-the-perimeter-isnt-enough-on-election-hacking/</loc>
		<lastmod>2019-11-08T15:01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/texas-hhs-commission-penalized-1-6m-for-hipaa-violations/</loc>
		<lastmod>2019-11-08T15:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/paypal-surpasses-microsoft-as-favorite-target-of-phishing-attacks/</loc>
		<lastmod>2019-11-08T15:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/myths-and-truths-of-dmarc/</loc>
		<lastmod>2019-11-08T16:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-josh-rickards-hunting-phish-kits/</loc>
		<lastmod>2019-11-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-climate-emergency/</loc>
		<lastmod>2019-11-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/october-release-qa-with-ari-weil/</loc>
		<lastmod>2019-11-08T18:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-kate-mullins-one-womans-journey-to-ciso-leveraging-social-engineering/</loc>
		<lastmod>2019-11-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/better-web-shell-detections-with-signal-sciences-next-gen-waf/</loc>
		<lastmod>2019-11-08T19:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/automated-sensitive-data-leak-detection/</loc>
		<lastmod>2019-11-08T20:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/isolation-protects-you-from-threats-that-havent-even-been-discovered/</loc>
		<lastmod>2019-11-08T20:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-cfos-must-be-involved-in-cybersecurity/</loc>
		<lastmod>2019-11-08T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/megacortex-ransomware-worsens-hackers-change-users-passwords-make-blackmail-demands/</loc>
		<lastmod>2019-11-08T21:29:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-scam-poses-as-uk-ministry-of-justice-avast/</loc>
		<lastmod>2019-11-08T22:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/avast-opens-internet-of-things-lab-avast/</loc>
		<lastmod>2019-11-08T22:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/threat-alert-tcp-reflection-attacks/</loc>
		<lastmod>2019-11-09T00:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/to-the-moon-and-back/</loc>
		<lastmod>2019-11-09T07:25:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/does-vdi-protect-against-data-leaks/</loc>
		<lastmod>2019-11-09T12:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/windows-virtual-desktop-the-best-step-by-step-walkthrough/</loc>
		<lastmod>2019-11-09T16:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-brett-hawkins-sharpersist-windows-persistence-toolkit-in-c/</loc>
		<lastmod>2019-11-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-recombination-and-reionization/</loc>
		<lastmod>2019-11-09T18:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/life-cycle-of-a-security-bug/</loc>
		<lastmod>2019-11-09T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-nicole-schwartz-aka-circuitswan-formerly-amazonv-are-you-ready-to-leverage-devsecops-get-ready-and-use-it-for-good/</loc>
		<lastmod>2019-11-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-cybersecurity-breach-survivors-are-valued-assets/</loc>
		<lastmod>2019-11-09T20:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/researchers-find-security-flaws-in-amazons-ring-video-doorbell-pro-iot-device/</loc>
		<lastmod>2019-11-09T20:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/eliminating-the-social-media-cyber-security-blind-spot/</loc>
		<lastmod>2019-11-09T20:40:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vulnerable-versions-of-adminer-as-a-universal-infection-vector/</loc>
		<lastmod>2019-11-09T21:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/business-email-compromise-bec-email-forwarding-in-action/</loc>
		<lastmod>2019-11-10T00:37:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/4-dmz-best-practices-to-shield-you-from-attackers-2/</loc>
		<lastmod>2019-11-10T11:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/five-emails-you-dont-want-in-your-inbox/</loc>
		<lastmod>2019-11-10T13:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-attacks-remains-a-popular-money-spinner-for-cyber-criminals/</loc>
		<lastmod>2019-11-10T14:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/10-security-blunders-that-should-stay-in-2019/</loc>
		<lastmod>2019-11-10T14:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/think-before-you-click/</loc>
		<lastmod>2019-11-10T14:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-marisa-dyers-jessica-hazelriggs-shadow-it-in-the-cloud/</loc>
		<lastmod>2019-11-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/sevillage-orlando-2020/</loc>
		<lastmod>2019-11-10T17:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/2019-united-states-marine-corps-244th-birthday-message/</loc>
		<lastmod>2019-11-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-casey-smiths-net-manifesto-win-friends-and-influence-the-loader/</loc>
		<lastmod>2019-11-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-address-career-blind-spots/</loc>
		<lastmod>2019-11-10T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyber-security-roundup-for-october-2019/</loc>
		<lastmod>2019-11-10T21:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebook-data-leaks-smart-speaker-laser-attack-bluekeep-in-the-wild/</loc>
		<lastmod>2019-11-11T05:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/moving-to-the-cloud-to-save-money-think-again/</loc>
		<lastmod>2019-11-11T06:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/infographic-understanding-frontline-workers-how-to-make-them-do-better-at-their-jobs/</loc>
		<lastmod>2019-11-11T07:07:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyber-security-businesses-solving-challenges-through-new-technologies/</loc>
		<lastmod>2019-11-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/united-states-veterans-day-2019/</loc>
		<lastmod>2019-11-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/customers-choose-fortinet-secure-sd-wan-to-enable-sd-branch/</loc>
		<lastmod>2019-11-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/graduating-from-the-fortinet-fortivet-program-a-conversation-with-robert-baryo/</loc>
		<lastmod>2019-11-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hyperspecialization-in-cybersecurity-cyber-work-podcast/</loc>
		<lastmod>2019-11-11T08:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cfos-getting-more-involved-in-cyber-security-strategies/</loc>
		<lastmod>2019-11-11T10:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/are-cybersecurity-intelligence-and-security-metrics-statistically-significant/</loc>
		<lastmod>2019-11-11T11:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/everything-you-ever-wanted-to-know-about-test-case-reduction-but-didnt-know-to-ask/</loc>
		<lastmod>2019-11-11T12:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-geofencing-works-for-your-frontline-workers-and-field-force/</loc>
		<lastmod>2019-11-11T12:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/building-your-cyber-security-strategy-a-step-by-step-guide/</loc>
		<lastmod>2019-11-11T13:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/for-healthcare-cisos-theres-no-risk-quite-like-this-risk/</loc>
		<lastmod>2019-11-11T14:18:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/protect-yourself-from-social-media%e2%80%af-scams/</loc>
		<lastmod>2019-11-11T14:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-minute-briefing-designing-for-security-outcomes/</loc>
		<lastmod>2019-11-11T15:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/reba-and-verge-2019-climate-action-through-partnership-and-innovation/</loc>
		<lastmod>2019-11-11T16:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bluekeep-what-you-need-to-know/</loc>
		<lastmod>2019-11-11T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/glass-class-why-integration-matters-for-cloud-security/</loc>
		<lastmod>2019-11-11T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/somewhere-along-the-way-the-market-forgot-about-better-security-outcomes/</loc>
		<lastmod>2019-11-11T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/retailer-orvis-com-leaked-hundreds-of-internal-passwords-on-pastebin/</loc>
		<lastmod>2019-11-11T17:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/devsecops-and-the-shift-left-in-security-how-semmle-is-supporting-software-developers-podcast/</loc>
		<lastmod>2019-11-11T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-state-of-the-cybersecurity-skills-gap-heading-into-2020/</loc>
		<lastmod>2019-11-11T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/forallsecure-uncovers-critical-vulnerabilities-in-das-u-boot/</loc>
		<lastmod>2019-11-11T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/orvis-data-leak-and-the-need-to-monitor-paste-sites/</loc>
		<lastmod>2019-11-11T20:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/idaptive-named-to-crns-tech-innovators-for-security-identity-management-for-2019/</loc>
		<lastmod>2019-11-11T21:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-cyber-security-unicorns-and-donkeys/</loc>
		<lastmod>2019-11-11T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/top-10-moments-from-the-cybersec-ai-prague-conference-avast/</loc>
		<lastmod>2019-11-11T22:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/data-breach-fines-are-they-working-to-boost-consumer-safety/</loc>
		<lastmod>2019-11-12T01:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-reinfections-happen-with-a-waf/</loc>
		<lastmod>2019-11-12T01:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortress-information-security-strives-to-help-protect-critical-infrastructure/</loc>
		<lastmod>2019-11-12T02:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-rugged-devices-serve-the-supply-chain-industry/</loc>
		<lastmod>2019-11-12T07:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/november-patch-tuesday/</loc>
		<lastmod>2019-11-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-to-sponsor-the-mef19-global-networking-event/</loc>
		<lastmod>2019-11-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-joins-the-paris-call-for-trust-and-security-in-cyberspace/</loc>
		<lastmod>2019-11-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-prepare-for-a-ransomware-attack/</loc>
		<lastmod>2019-11-12T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-command-line-interface/</loc>
		<lastmod>2019-11-12T08:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-statistical-analysis/</loc>
		<lastmod>2019-11-12T08:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/state-of-the-firewall-report-2019-zero-touch-automation-is-more-headline-than-reality-network-complexity-and-lack-of-visibility-are-key-issues/</loc>
		<lastmod>2019-11-12T08:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/abcs-of-ueba-m-is-for-machine-learning/</loc>
		<lastmod>2019-11-12T08:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/multi-stream-cybersecurity-and-how-it-can-save-your-business-from-a-zero-day-attack/</loc>
		<lastmod>2019-11-12T08:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/improving-security-in-web-app-development/</loc>
		<lastmod>2019-11-12T09:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/shared-intel-what-can-be-done-today-to-keep-quantum-computing-from-killing-encryption/</loc>
		<lastmod>2019-11-12T09:10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-field-must-more-than-double-qualified-staff-to-meet-market-needs-survey-shows/</loc>
		<lastmod>2019-11-12T10:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/top-capabilities-your-mdm-should-have-to-empower-frontline-workers/</loc>
		<lastmod>2019-11-12T11:02:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hipaa-compliance-tips-best-practices-training-considerations/</loc>
		<lastmod>2019-11-12T11:44:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/giving-thanks-looking-forward-to-2020/</loc>
		<lastmod>2019-11-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-impact-of-digital-transformation-in-the-public-sector/</loc>
		<lastmod>2019-11-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/10-statistics-that-summarize-the-state-of-cybersecurity-in-financial-services/</loc>
		<lastmod>2019-11-12T12:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mexicos-pemex-said-it-quickly-neutralized-digital-attack/</loc>
		<lastmod>2019-11-12T12:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-is-nists-cybersecurity-framework-manufacturing-profile/</loc>
		<lastmod>2019-11-12T12:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5g-security-iot-and-roi-some-assembly-and-automation-required/</loc>
		<lastmod>2019-11-12T13:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cisco-fixes-high-risk-vulnerabilities-in-some-small-business-rv-series-routers/</loc>
		<lastmod>2019-11-12T13:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/conducting-a-vulnerability-assessment-a-step-by-step-guide-for-linux-workloads-in-the-cloud/</loc>
		<lastmod>2019-11-12T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/announcing-the-osqueryscale-conference/</loc>
		<lastmod>2019-11-12T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/attackers-still-finding-plenty-of-systems-vulnerable-to-bluekeep/</loc>
		<lastmod>2019-11-12T13:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-benefits-of-sd-wan-for-branch-office-connectivity/</loc>
		<lastmod>2019-11-12T14:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/uk-labour-party-servers-hit-by-ddos-from-russia-and-brazil/</loc>
		<lastmod>2019-11-12T14:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/delegated-credentials-facebook-mozilla-cloudflares-new-tls-protocol-explained/</loc>
		<lastmod>2019-11-12T15:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybrary-live-session-enhancing-networking-security-through-automation-and-enrichment/</loc>
		<lastmod>2019-11-12T15:30:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/firm-cybersecurity-professional-services-firms-are-vulnerable-targets/</loc>
		<lastmod>2019-11-12T15:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/eclypsium-named-to-coveted-cnbc-upstart-100-list/</loc>
		<lastmod>2019-11-12T15:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-lesley-carharts-confessions-of-an-it-ot-marriage-counselor/</loc>
		<lastmod>2019-11-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/does-google-read-your-email/</loc>
		<lastmod>2019-11-12T17:25:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/simple-rules-for-smart-iam-solutions-part-3-making-sense-of-data-risk-detection-and-intelligently-leveraging-it/</loc>
		<lastmod>2019-11-12T17:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/state-of-software-security-v10-top-5-takeaways-for-security-professionals/</loc>
		<lastmod>2019-11-12T17:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/robert-m-lees-jeff-hass-little-bobby-comics-the-lacking/</loc>
		<lastmod>2019-11-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/7-benefits-of-single-sign-on-sso/</loc>
		<lastmod>2019-11-12T18:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mother-of-all-drivers-new-vulnerabilities-found-in-windows-drivers/</loc>
		<lastmod>2019-11-12T18:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/five-reasons-to-begin-a-packt-subscription/</loc>
		<lastmod>2019-11-12T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-justin-leaplines-rick-yocums-rise-of-the-machines-using-machine-learning-with-grc/</loc>
		<lastmod>2019-11-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-in-academic-environments/</loc>
		<lastmod>2019-11-12T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-replication-through-removable-media/</loc>
		<lastmod>2019-11-12T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-alternatives-to-wireshark/</loc>
		<lastmod>2019-11-12T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/keep-github-dependencies-secure-with-nexus-lifecycles-automated-pull-requests/</loc>
		<lastmod>2019-11-12T19:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vert-threat-alert-november-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-11-12T19:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebookery-wheres-that-little-dutch-boy-we-hired/</loc>
		<lastmod>2019-11-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-zeronorth-platform-capabilities-focus-on-integrations-to-better-manage-business-risk-and-drive-security-into-devops/</loc>
		<lastmod>2019-11-12T20:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/november-2019-patch-tuesday-74-vulns-13-critical-actively-attacked-ie-vuln-hyper-v-escapes-adobe/</loc>
		<lastmod>2019-11-12T20:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-open-source-offerings-simplify-securing-kubernetes/</loc>
		<lastmod>2019-11-12T21:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sharpening-the-edge/</loc>
		<lastmod>2019-11-12T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/patch-tuesday-november-2019-edition/</loc>
		<lastmod>2019-11-12T22:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/jda-software-extending-their-sdlc-to-remediate-open-source-issues/</loc>
		<lastmod>2019-11-13T00:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tis-the-season-for-scams/</loc>
		<lastmod>2019-11-13T00:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vulnerability-management-program-best-practices-2/</loc>
		<lastmod>2019-11-13T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/hey-infosec-what-are-you-doing-to-protect-your-devops-team/</loc>
		<lastmod>2019-11-13T06:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-clean-bill-of-health-for-pci-compliance/</loc>
		<lastmod>2019-11-13T07:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-releases-threat-landscape-report-for-q3-2019/</loc>
		<lastmod>2019-11-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-emotet-report-details-threats-from-one-of-the-worlds-most-successful-malware-operations/</loc>
		<lastmod>2019-11-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/10-steps-organizations-can-take-in-the-fight-against-ransomware/</loc>
		<lastmod>2019-11-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/double-trouble-revengerat-and-wshrat/</loc>
		<lastmod>2019-11-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/novembers-patch-tuesday-review/</loc>
		<lastmod>2019-11-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/misconfiguration-new-code-word-for-human-error-sets-stage-for-increased-automation/</loc>
		<lastmod>2019-11-13T08:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-ensure-factory-reset-protection-using-scalefusion/</loc>
		<lastmod>2019-11-13T11:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/announcing-the-crytic-10k-research-prize/</loc>
		<lastmod>2019-11-13T12:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebook-app-for-ios-caught-accessing-camera-in-background/</loc>
		<lastmod>2019-11-13T12:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ciphercloud-achieves-highest-gartner-mq-critical-capabilities-scores/</loc>
		<lastmod>2019-11-13T12:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/stackrox-unique-innovations-for-hardening-kubernetes/</loc>
		<lastmod>2019-11-13T12:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-underworld-economy/</loc>
		<lastmod>2019-11-13T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/edge-computing-5g-iot-risks-and-opportunities-for-service-providers/</loc>
		<lastmod>2019-11-13T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/attackers-using-purelocker-ransomware-to-target-enterprises-servers/</loc>
		<lastmod>2019-11-13T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pci-pal-receives-double-shortlisting-in-the-2020-card-and-payment-awards/</loc>
		<lastmod>2019-11-13T14:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/orcus-rat-author-charged-in-malware-scheme/</loc>
		<lastmod>2019-11-13T15:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-is-everyones-responsibility-and-the-c-suite-needs-to-understand-that/</loc>
		<lastmod>2019-11-13T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/casp-overview-of-domains-2019-update/</loc>
		<lastmod>2019-11-13T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/network-traffic-analysis-for-ir-address-resolution-protocol-arp-with-wireshark/</loc>
		<lastmod>2019-11-13T15:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-at-the-edge-what-is-gartners-sase-why-does-it-matter/</loc>
		<lastmod>2019-11-13T16:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-second-marriott-breach-should-we-care-anymore/</loc>
		<lastmod>2019-11-13T16:14:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/combating-the-continuous-development-of-vulnerable-software/</loc>
		<lastmod>2019-11-13T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-adam-comptons-david-boyds-unix-the-other-white-meat/</loc>
		<lastmod>2019-11-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/report-security-and-development-teams-need-to-embrace-new-roles-in-devsecops/</loc>
		<lastmod>2019-11-13T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/renovate-joins-whitesource-to-help-developers-spend-less-time-on-manually-resolving-dependency-updates/</loc>
		<lastmod>2019-11-13T17:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/were-trusting-you-with-these-top-4-takeaways-from-our-risky-business-webinar/</loc>
		<lastmod>2019-11-13T17:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-perfect-intermediary-apis/</loc>
		<lastmod>2019-11-13T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/luke-kingmas-lou-patrick-mackays-futurism-comics-scrolling/</loc>
		<lastmod>2019-11-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/comforte-ag-to-partner-with-pci-security-standards-council-to-help-secure-payment-data-worldwide/</loc>
		<lastmod>2019-11-13T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-mauricio-velazcos-i-simulate-therefore-i-catch-enhancing-detection-engineering-with-adversary-simulation/</loc>
		<lastmod>2019-11-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/secure-your-digital-transformation/</loc>
		<lastmod>2019-11-13T19:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-flawed-network-by-any-other-name/</loc>
		<lastmod>2019-11-13T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malicious-android-application-used-in-phishing-scam/</loc>
		<lastmod>2019-11-13T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-really-browse-anonymously-3/</loc>
		<lastmod>2019-11-13T22:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/zeus-virus-aka-zbot-malware-of-the-month-november-2019/</loc>
		<lastmod>2019-11-13T22:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-deeper-dive-tufin-policy-orchestration-suite-r19-2/</loc>
		<lastmod>2019-11-14T00:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitigating-risk-and-high-risk-vulnerabilities-in-unsupported-operating-systems-bluekeep-edition/</loc>
		<lastmod>2019-11-14T04:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/managing-cybersecurity-during-cloud-migration/</loc>
		<lastmod>2019-11-14T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/for-autonomous-vehicles-theres-a-difference-between-security-and-safety-part-i/</loc>
		<lastmod>2019-11-14T05:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/for-autonomous-vehicles-theres-a-difference-between-security-and-safety-part-ii/</loc>
		<lastmod>2019-11-14T06:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinets-guide-to-aws-reinvent-2019/</loc>
		<lastmod>2019-11-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tips-and-tools-for-how-to-use-cryptocurrencies-to-invest/</loc>
		<lastmod>2019-11-14T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/scalefusion-samsung-knox-benefits-for-enterprises/</loc>
		<lastmod>2019-11-14T09:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/aligning-secaas-with-your-organizations-cloud-security-needs/</loc>
		<lastmod>2019-11-14T09:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/post-gdpr-developments-on-data-protection-and-privacy-regulations-around-the-world/</loc>
		<lastmod>2019-11-14T09:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-2020-insider-threat-report-is-here/</loc>
		<lastmod>2019-11-14T09:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/wfcm-1-4-improved-file-changes-coverage-for-wordpress-websites/</loc>
		<lastmod>2019-11-14T11:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/4-steps-to-managing-edtech-security-risks/</loc>
		<lastmod>2019-11-14T11:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tcp-reflection-attacks-then-and-now/</loc>
		<lastmod>2019-11-14T11:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/extracting-kerberos-credentials-from-pcap/</loc>
		<lastmod>2019-11-14T12:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-roi-of-security-awareness-training-2/</loc>
		<lastmod>2019-11-14T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/for-caught-in-the-crossfire-of-cyberwarfare/</loc>
		<lastmod>2019-11-14T12:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/quality-of-experience-how-machine-learning-net-neutrality-and-5g-relate-to-qoe/</loc>
		<lastmod>2019-11-14T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/technology-and-policymakers/</loc>
		<lastmod>2019-11-14T13:04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/three-cybersecurity-lessons-learned-in-the-2010s/</loc>
		<lastmod>2019-11-14T14:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-does-dark-web-monitoring-really-do/</loc>
		<lastmod>2019-11-14T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/be-aware-of-these-20-new-phishing-techniques/</loc>
		<lastmod>2019-11-14T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/10-factors-for-implementing-successful-and-effective-security-awareness-training/</loc>
		<lastmod>2019-11-14T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/introducing-iverify-the-security-toolkit-for-iphone-users/</loc>
		<lastmod>2019-11-14T14:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-ways-your-organization-benefits-from-devsecops/</loc>
		<lastmod>2019-11-14T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-leverage-yaml-to-integrate-veracode-solutions-into-ci-cd-pipelines/</loc>
		<lastmod>2019-11-14T14:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whitehat-security-names-former-appthority-flawcheck-ceo-anthony-bettini-chief-technology-officer/</loc>
		<lastmod>2019-11-14T15:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fcc-settles-with-infotrax-systems-for-failure-to-secure-data-of-1-million-clients/</loc>
		<lastmod>2019-11-14T15:05:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/1password-closes-200m-series-a-led-by-accel-to-bring-enterprise-password-managers-to-every-business/</loc>
		<lastmod>2019-11-14T15:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/apwg-two-thirds-of-all-phishing-sites-used-ssl-protection-in-q3/</loc>
		<lastmod>2019-11-14T15:20:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mixed-content-warnings-in-google-chrome/</loc>
		<lastmod>2019-11-14T15:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-security-next-quarter-is-worse-than-no-security/</loc>
		<lastmod>2019-11-14T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/record-number-of-breaches-and-leaked-records-registered-in-2019-study-shows/</loc>
		<lastmod>2019-11-14T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jason-blanchards-how-to-give-the-gift-that-keeps-on-giving-your-knowledge/</loc>
		<lastmod>2019-11-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/visit-akamai-at-aws-reinvent-2019/</loc>
		<lastmod>2019-11-14T17:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-transit-of-mercury/</loc>
		<lastmod>2019-11-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/alibabas-singles-day-set-sales-records-reinforces-mobile-optimization-lessons-for-all-retailers/</loc>
		<lastmod>2019-11-14T18:06:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/active-office-365-phishing-campaign-targeting-admin-credentials/</loc>
		<lastmod>2019-11-14T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cut-time-costs-7-best-practices-to-follow-when-choosing-a-cloud-security-solution/</loc>
		<lastmod>2019-11-14T18:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/self-sovereign-identity-a-distant-dream-or-an-immediate-possibility/</loc>
		<lastmod>2019-11-14T18:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whats-new-in-mixmode-november-2019/</loc>
		<lastmod>2019-11-14T18:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-rich-rumbles-rfid-sniffing-under-your-nose-and-in-your-face/</loc>
		<lastmod>2019-11-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/healthcare-organizations-continue-to-be-a-soft-target-for-phishing-attacks-2/</loc>
		<lastmod>2019-11-14T19:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/smart-is-it-not/</loc>
		<lastmod>2019-11-14T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-secure-apps-and-workloads-in-vmware-nsx-t-with-tufin/</loc>
		<lastmod>2019-11-14T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/only-after-running-out-of-hard-disk-space-did-firm-realise-hacker-had-stolen-one-million-users-details/</loc>
		<lastmod>2019-11-14T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/solara-medical-supplies-notifying-individuals-affected-by-data-breach/</loc>
		<lastmod>2019-11-14T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-is-a-software-bill-of-materials/</loc>
		<lastmod>2019-11-15T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/lets-talk-about-sec-making-impactful-security-updates-to-the-board-of-directors/</loc>
		<lastmod>2019-11-15T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortiguard-labs-weekly-threat-update-november-15-2019/</loc>
		<lastmod>2019-11-15T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-security-researchers-discover-multiple-vulnerabilities-in-adobe-and-cisco-products/</loc>
		<lastmod>2019-11-15T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/addressing-the-challenge-of-insider-risk/</loc>
		<lastmod>2019-11-15T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/location-tracking-of-field-force-and-frontline-workers-know-the-benefits/</loc>
		<lastmod>2019-11-15T11:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/broken-security-most-business-leaders-arent-confident-about-their-cybersecurity/</loc>
		<lastmod>2019-11-15T12:42:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/glen-singh-on-why-kali-linux-is-an-arsenal-for-any-cybersecurity-professional-interview/</loc>
		<lastmod>2019-11-15T14:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/using-benchmarks-to-make-the-case-for-appsec/</loc>
		<lastmod>2019-11-15T14:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/protecting-websocket-protocol-apps-and-apis-with-signal-sciences/</loc>
		<lastmod>2019-11-15T15:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/infographic-understanding-the-mobility-adoption-trends-and-its-future-outlook/</loc>
		<lastmod>2019-11-15T15:07:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/remote-screen-casting-for-ios-devices-the-business-benefits/</loc>
		<lastmod>2019-11-15T15:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-email-instructs-users-to-click-on-keep-same-password-button/</loc>
		<lastmod>2019-11-15T15:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tpm-fail-attacks-against-cryptographic-coprocessors/</loc>
		<lastmod>2019-11-15T15:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pipka-javascript-skimmer-deletes-itself-after-execution/</loc>
		<lastmod>2019-11-15T15:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-high-risk-of-data-loss-associated-with-employees/</loc>
		<lastmod>2019-11-15T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-sean-metcalfs-active-directory-security-beyond-the-easy-button/</loc>
		<lastmod>2019-11-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/iot-security-roi-model-guide/</loc>
		<lastmod>2019-11-15T17:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-extinction-level-events/</loc>
		<lastmod>2019-11-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-dave-mayers-the-backup-operators-guide-to-the-galaxy/</loc>
		<lastmod>2019-11-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/33-alarming-cybercrime-statistics-you-should-know-in-2019/</loc>
		<lastmod>2019-11-15T19:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/proxy-a-conda-repository-using-nexus-repo/</loc>
		<lastmod>2019-11-15T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/dods-cybersecurity-maturity-model-certification-are-smaller-companies-prepared-4/</loc>
		<lastmod>2019-11-15T20:25:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyberattacks-target-uk-labour-party-avast/</loc>
		<lastmod>2019-11-15T20:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/avasts-omni-is-among-best-ces-items-showcased-in-nyc-sneak-peak-avast/</loc>
		<lastmod>2019-11-15T20:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/wireless-pentesting-part-2-building-a-wifi-hacking-rig/</loc>
		<lastmod>2019-11-15T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/robert-m-lees-jeff-hass-little-bobby-comics-why-ai-doesnt-work-for-security/</loc>
		<lastmod>2019-11-15T20:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/big-data-security-series-part-3-how-to-run-analytics-on-protected-data/</loc>
		<lastmod>2019-11-15T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-10x10-promise-for-magnifying-email-effectiveness/</loc>
		<lastmod>2019-11-15T21:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinar-owasp-top-10-for-javascript-developers/</loc>
		<lastmod>2019-11-15T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/stackrox-pagerduty-know-about-your-kubernetes-security-issues-now/</loc>
		<lastmod>2019-11-15T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/keep-your-security-operations-in-shape/</loc>
		<lastmod>2019-11-16T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-wim-remes-product-security-shouldnt-be-painful/</loc>
		<lastmod>2019-11-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-machine-learning-captcha/</loc>
		<lastmod>2019-11-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-thomas-reeds-incident-response-on-macos/</loc>
		<lastmod>2019-11-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-paul-coggins-ss7-for-infosec/</loc>
		<lastmod>2019-11-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-a-new-sense-of-peace/</loc>
		<lastmod>2019-11-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-josh-bryants-robert-falcones-hunting-webshells-tracking-twoface/</loc>
		<lastmod>2019-11-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-dmarc-handles-domains-and-subdomains-in-email-addresses/</loc>
		<lastmod>2019-11-17T20:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/googles-health-record-storage-controversy-us-border-search-ruling-zelle-scams/</loc>
		<lastmod>2019-11-18T05:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/speeding-along-on-the-digital-superhighway/</loc>
		<lastmod>2019-11-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-now-integrates-with-aws-cloudformation-registry-and-cli-to-enhance-cloud-security/</loc>
		<lastmod>2019-11-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortinet-to-host-four-regional-accelerate-conferences-in-2020/</loc>
		<lastmod>2019-11-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/2020-election-cybersecurity-strategies-cyber-work-podcast/</loc>
		<lastmod>2019-11-18T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-implement-an-efficient-cloud-security-strategy-the-experts-guide/</loc>
		<lastmod>2019-11-18T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-october-update-extending-to-the-cloud/</loc>
		<lastmod>2019-11-18T08:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/best-practices-resurgence-of-encrypted-thumb-drives-shows-value-of-offline-backups-in-the-field/</loc>
		<lastmod>2019-11-18T09:09:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/a-singular-view-of-risk-key-bank-weighs-in-on-digital-transformation/</loc>
		<lastmod>2019-11-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishers-targeting-microsoft-office-365-admin-credentials/</loc>
		<lastmod>2019-11-18T12:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bitglass-security-spotlight-surveillance-vulnerability-impacts-ring/</loc>
		<lastmod>2019-11-18T14:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/compromised-disney-accounts-already-selling-on-dark-markets/</loc>
		<lastmod>2019-11-18T14:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/so-you-want-to-move-from-the-help-desk-to-the-security-team/</loc>
		<lastmod>2019-11-18T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/gpen-vs-oscp-which-one-is-better-for-a-career-in-ethical-hacking-and-or-pentesting/</loc>
		<lastmod>2019-11-18T15:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-apis-malicious-hackers-love-to-exploit-2/</loc>
		<lastmod>2019-11-18T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/instart-october-2019-product-release-2/</loc>
		<lastmod>2019-11-18T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/stop-magecart-defense-against-the-dark-arts-of-web-skimming-attacks-2/</loc>
		<lastmod>2019-11-18T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/insecure-slow-web-experiences-are-a-serious-threat-to-your-business-2/</loc>
		<lastmod>2019-11-18T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-instart-over-cloudflare-for-delivery-performance-and-security-2/</loc>
		<lastmod>2019-11-18T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/how-cybersecurity-leaders-can-best-navigate-the-c-suite-2/</loc>
		<lastmod>2019-11-18T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/no-need-to-worry-about-the-vbulletin-zero-day-exploit-instart-had-you-covered-2/</loc>
		<lastmod>2019-11-18T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/why-instart-is-more-effective-than-other-bot-management-solutions-2/</loc>
		<lastmod>2019-11-18T15:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/the-importance-of-leveraging-endpoint-data-for-bot-mitigation-2/</loc>
		<lastmod>2019-11-18T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vista-acquires-a-majority-interest-in-sonatype-a-great-day-for-our-customers-partners-and-community/</loc>
		<lastmod>2019-11-18T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/zeronorth-named-finalist-for-crns-2019-tech-innovator-awards-for-web-and-application-security/</loc>
		<lastmod>2019-11-18T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-marcello-salvatis-red-team-level-over-9000-fusing-the-powah-of-net-with-a-scripting-language-of-your-choosing-introducing-byoi-bring-your-own-interpreter-payloads/</loc>
		<lastmod>2019-11-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/team-pentesting-the-unspoken-reality-of-career-ethical-hacking/</loc>
		<lastmod>2019-11-18T17:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-are-man-in-the-middle-mitm-attacks/</loc>
		<lastmod>2019-11-18T17:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/robert-m-lees-jeff-haas-little-bobby-comics-sigint-analyst/</loc>
		<lastmod>2019-11-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bot-mitigation-could-be-the-answer-to-your-ato-worries-2/</loc>
		<lastmod>2019-11-18T18:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/integrating-coverity-scan-with-gitlab-ci/</loc>
		<lastmod>2019-11-18T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-tracy-z-maleeffs-empathy-as-a-service-to-create-a-culture-of-security/</loc>
		<lastmod>2019-11-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/national-cybersecurity-awareness-month-is-over-long-live-cybersecurity-awareness/</loc>
		<lastmod>2019-11-18T19:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ointment-fly-therein/</loc>
		<lastmod>2019-11-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebooks-transparency-report-expert-supervised-machine-learning-works/</loc>
		<lastmod>2019-11-18T21:07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-were-the-russians-so-set-against-this-hacker-being-extradited/</loc>
		<lastmod>2019-11-18T21:19:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/trusted-computing-group-triumph-as-it-reaches-its-20-year-milestone/</loc>
		<lastmod>2019-11-18T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/down-the-malware-rabbit-hole-part-ii/</loc>
		<lastmod>2019-11-18T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/american-shoppers-to-blame-financial-institutions-in-case-of-data-breach/</loc>
		<lastmod>2019-11-18T22:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/lessons-from-our-zero-trust-journey/</loc>
		<lastmod>2019-11-19T00:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-vulnerability-spotlight-account-manipulation/</loc>
		<lastmod>2019-11-19T02:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-evolving-identity-cloud/</loc>
		<lastmod>2019-11-19T03:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-our-identity-cloud-platform-milestone-means/</loc>
		<lastmod>2019-11-19T03:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pci-pal-urges-businesses-to-remove-tick-box-mentality-to-ensure-year-round-pci-dss-compliance/</loc>
		<lastmod>2019-11-19T07:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/addressing-modern-threats-to-the-integrity-of-free-elections/</loc>
		<lastmod>2019-11-19T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybercriminals-are-targeting-your-entire-digital-footprint/</loc>
		<lastmod>2019-11-19T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/packers-whats-in-the-box/</loc>
		<lastmod>2019-11-19T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whos-the-boss-is-cloud-it-working-for-you-or-are-you-working-for-it/</loc>
		<lastmod>2019-11-19T08:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/threat-hunting-strategies-for-2020/</loc>
		<lastmod>2019-11-19T09:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-for-cloud-services-saas-deep-dive/</loc>
		<lastmod>2019-11-19T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-stay-safe-online-on-black-friday/</loc>
		<lastmod>2019-11-19T11:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/practical-tips-leaders-can-use-to-build-a-culture-of-cybersecurity/</loc>
		<lastmod>2019-11-19T12:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/labour-party-ddos-cyber-attacks/</loc>
		<lastmod>2019-11-19T12:07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/macys-says-security-incident-might-have-exposed-customers-data/</loc>
		<lastmod>2019-11-19T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ransomware-strikes-again-in-the-state-of-louisiana/</loc>
		<lastmod>2019-11-19T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/zero-trust-casb-adaptive-access-controls/</loc>
		<lastmod>2019-11-19T13:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-top-cybersecurity-trends-that-will-shape-2020/</loc>
		<lastmod>2019-11-19T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ransomware-bites-400-veterinary-hospitals/</loc>
		<lastmod>2019-11-19T14:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/man-who-made-542925-renting-out-ddos-services-sentenced-to-prison/</loc>
		<lastmod>2019-11-19T15:07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/macys-com-checkout-page-hacked-customers-advised-to-be-vigilant-of-fraud/</loc>
		<lastmod>2019-11-19T15:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/six-things-you-should-be-spending-your-cybersecurity-budget-on/</loc>
		<lastmod>2019-11-19T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-vulnerability-spotlight-bash-history/</loc>
		<lastmod>2019-11-19T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-what-are-wipers/</loc>
		<lastmod>2019-11-19T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/an-open-conversation-about-cyber-risk-reporting-to-the-bod/</loc>
		<lastmod>2019-11-19T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/8-best-practices-for-strengthening-security-in-cloud-native-environments/</loc>
		<lastmod>2019-11-19T15:39:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-quickly-recover-after-a-third-party-data-breach/</loc>
		<lastmod>2019-11-19T15:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/investigating-threat-alerts-with-osquery-understanding-threat-surface-risk/</loc>
		<lastmod>2019-11-19T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/attackers-outrunning-outsmarting-healthcare-defenses/</loc>
		<lastmod>2019-11-19T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-attackers-could-hijack-your-android-camera-to-spy-on-you/</loc>
		<lastmod>2019-11-19T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/understanding-and-selecting-rasp-2019-new-paper/</loc>
		<lastmod>2019-11-19T16:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-ryan-linns-improving-cactustorch-payloads/</loc>
		<lastmod>2019-11-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/open-communication-how-idaptive-helped-74-year-old-multimedia-conglomerate-morris-communications-get-lighter-faster-and-more-secure/</loc>
		<lastmod>2019-11-19T17:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/an-introduction-to-baselining-technology/</loc>
		<lastmod>2019-11-19T17:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-rey-and-kylo/</loc>
		<lastmod>2019-11-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/flood-of-new-advisories-expose-massive-gaps-in-firmware-security/</loc>
		<lastmod>2019-11-19T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-bryson-borts-adversarial-emulation/</loc>
		<lastmod>2019-11-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sast-vs-sca-whats-the-difference-do-i-need-both/</loc>
		<lastmod>2019-11-19T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/take-your-career-to-the-next-level-with-comptia-and-infosec-skills/</loc>
		<lastmod>2019-11-19T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/feature-release-19-4/</loc>
		<lastmod>2019-11-19T20:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/kakistocracy-via-phone-and-twitter/</loc>
		<lastmod>2019-11-19T20:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-top-cyber-security-certifications-hiring-managers-will-look-for-in-2020/</loc>
		<lastmod>2019-11-19T20:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/qualys-introduces-vmdr-vulnerability-management-detection-and-response/</loc>
		<lastmod>2019-11-19T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-is-the-cybersecurity-maturity-model-certification/</loc>
		<lastmod>2019-11-19T23:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-tips-for-preventing-a-webcam-hack-avast/</loc>
		<lastmod>2019-11-20T00:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/it-pros-share-insights-to-keep-modern-networks-safe-avast/</loc>
		<lastmod>2019-11-20T00:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-opsec-is-for-everyone-not-just-for-people-with-something-to-hide-part-ii/</loc>
		<lastmod>2019-11-20T05:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-threat-predictions-for-2020/</loc>
		<lastmod>2019-11-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/stalking-app-ghosty-on-android-allowed-users-to-see-private-instagram-accounts/</loc>
		<lastmod>2019-11-20T08:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-you-should-use-kpis-for-iso-27001-compliance/</loc>
		<lastmod>2019-11-20T09:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/reduce-the-risk-of-ransomware-by-90-for-free-in-one-day/</loc>
		<lastmod>2019-11-20T11:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-decryption-tool-released-for-jigsaw-ransomware/</loc>
		<lastmod>2019-11-20T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/8-top-technical-resource-providers-for-ics-security-professionals/</loc>
		<lastmod>2019-11-20T12:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/okay-lets-say-you-are-a-ciso-this-is-how-our-newly-released-video-starts-now-its-time-to-watch-it/</loc>
		<lastmod>2019-11-20T12:46:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pharma-cyber-security-how-to-tackle-malware-threats/</loc>
		<lastmod>2019-11-20T13:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ddos-for-hire-boss-gets-13-months-jail-time/</loc>
		<lastmod>2019-11-20T13:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/millions-of-android-phones-may-be-vulnerable-to-camera-spying-vulnerability/</loc>
		<lastmod>2019-11-20T13:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/gtp-security-securing-5g-networks-with-a-gtp-firewall/</loc>
		<lastmod>2019-11-20T13:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/senior-healthcare-how-technology-and-mdm-are-paving-the-way-for-better-living/</loc>
		<lastmod>2019-11-20T14:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-ins-and-outs-of-securing-byod/</loc>
		<lastmod>2019-11-20T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-impact-and-tactics-of-retail-e-commerce-web-attacks/</loc>
		<lastmod>2019-11-20T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/from-thousands-of-security-alerts-to-a-handful-of-insights/</loc>
		<lastmod>2019-11-20T14:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/naughty-or-nice-pci-pal-study-identifies-seven-seasonal-security-sins-that-too-many-consumers-are-making-this-holiday-season/</loc>
		<lastmod>2019-11-20T14:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cryptocurrency-monero-website-hacked-original-binaries-replaced/</loc>
		<lastmod>2019-11-20T14:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/five-things-to-know-about-smart-speakers-for-the-holidays-avast/</loc>
		<lastmod>2019-11-20T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/evaluating-internet-isolation-clouds-must-have-features/</loc>
		<lastmod>2019-11-20T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/staffers-gone-bad-or-bad-decisions-which-should-you-worry-about-more/</loc>
		<lastmod>2019-11-20T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/login-friction-diminish-the-risk-not-the-user-experience/</loc>
		<lastmod>2019-11-20T15:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/living-in-a-post-perimeter-era/</loc>
		<lastmod>2019-11-20T15:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/rules-of-engagement-in-pentesting/</loc>
		<lastmod>2019-11-20T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-hardware-additions/</loc>
		<lastmod>2019-11-20T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-overview-graboid/</loc>
		<lastmod>2019-11-20T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-you-need-both-two-factor-authentication-strong-passwords-on-wordpress-sites/</loc>
		<lastmod>2019-11-20T15:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/smaller-ddos-attacks-against-organizations-quadruple-on-year-in-q3-survey-shows/</loc>
		<lastmod>2019-11-20T15:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/enterprise-threat-protector-as-a-security-enabler-in-2020/</loc>
		<lastmod>2019-11-20T16:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-artificial-intelligence-will-affect-patient-data-protection/</loc>
		<lastmod>2019-11-20T16:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-milio-gonzalez-francis-labelles-welcome-to-the-jumble-improving-rdp-tooling-for-malware-analysis-and-pentesting/</loc>
		<lastmod>2019-11-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/shared-intel-how-memory-attacks-and-firmware-spoilage-circumvent-perimeter-defenses/</loc>
		<lastmod>2019-11-20T17:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-versus-bracket/</loc>
		<lastmod>2019-11-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-andy-coopers-python-two-birds-with-one-stone/</loc>
		<lastmod>2019-11-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/october-2019-appsec-intelligence-report/</loc>
		<lastmod>2019-11-20T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/this-is-the-new-op-model-why-state-farm-sponsored-addo-and-the-results/</loc>
		<lastmod>2019-11-20T19:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/amazon-coughs-it-up-we-use-aggregated-ring-doorbell-data-for-our-monetary-gain/</loc>
		<lastmod>2019-11-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/social-engineering-the-insider-threat-to-cybersecurity/</loc>
		<lastmod>2019-11-20T20:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vandana-verma-passionate-guide-for-the-web-application-security-journey/</loc>
		<lastmod>2019-11-20T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cisos-focus-on-these-fundamentals-for-long-term-success/</loc>
		<lastmod>2019-11-20T21:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/disney-and-the-password-reuse-problem/</loc>
		<lastmod>2019-11-20T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/phishing-a-humiliating-experience/</loc>
		<lastmod>2019-11-21T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/simple-fraud-prevention-tips-for-black-friday-shopping/</loc>
		<lastmod>2019-11-21T00:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-address-career-blind-spots-and-challenge-assumptions/</loc>
		<lastmod>2019-11-21T00:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-internet-looking-back-and-forward-50-years/</loc>
		<lastmod>2019-11-21T00:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-awareness-materials-you-can-use-why-we-fall-for-cons/</loc>
		<lastmod>2019-11-21T00:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-recognize-a-phishing-campaign/</loc>
		<lastmod>2019-11-21T01:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/embrace-automation-to-pull-security-teams-together/</loc>
		<lastmod>2019-11-21T01:44:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/protecting-students-information-universities-and-secure-communications-2/</loc>
		<lastmod>2019-11-21T05:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/do-vpns-actually-protect-your-privacy-2/</loc>
		<lastmod>2019-11-21T05:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cybersecurity-is-about-teamwork-not-individuals-2/</loc>
		<lastmod>2019-11-21T05:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/your-network-has-been-compromised-what-now-2/</loc>
		<lastmod>2019-11-21T05:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/phishing-just-got-more-complicated-3/</loc>
		<lastmod>2019-11-21T05:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/vehicle-mounted-devices-a-guide-for-businesses/</loc>
		<lastmod>2019-11-21T07:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/helping-government-agencies-adapt-at-the-2019-security-transformation-summit/</loc>
		<lastmod>2019-11-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/companies-turn-to-mssps-to-manage-security-in-the-cloud/</loc>
		<lastmod>2019-11-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-spam-campaign-impersonates-a-variety-of-government-agencies-from-different-countries/</loc>
		<lastmod>2019-11-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/data-protection-on-demand-the-key-to-cloud-based-key-management/</loc>
		<lastmod>2019-11-21T08:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-much-is-your-data-worth-on-the-dark-web/</loc>
		<lastmod>2019-11-21T09:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/pci-pal-study-reveals-that-londoners-are-the-biggest-risk-takers-with-their-personal-data-security-practices/</loc>
		<lastmod>2019-11-21T10:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/chatbots-are-a-new-trend-in-financial-sphere/</loc>
		<lastmod>2019-11-21T10:55:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-get-360-degree-visibility-and-increased-cyber-resilience/</loc>
		<lastmod>2019-11-21T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/4-account-takeover-risks-for-district-cloud-apps/</loc>
		<lastmod>2019-11-21T11:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phantom-incident-scam-threatens-release-of-corporate-pii/</loc>
		<lastmod>2019-11-21T12:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/introducing-saltstack-protect-a-new-secops-solution-for-automated-discovery-and-remediation-of-security-vulnerabilities/</loc>
		<lastmod>2019-11-21T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nigerian-fraudster-pulled-off-1m-scam-while-serving-prison-term/</loc>
		<lastmod>2019-11-21T13:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/kubernetes-pentest-methodology-part-3/</loc>
		<lastmod>2019-11-21T14:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-cisos-can-be-accelerators-for-digital-transformation/</loc>
		<lastmod>2019-11-21T14:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/gatehub-and-epicbot-hacked-2-2-million-user-accounts-leaked/</loc>
		<lastmod>2019-11-21T14:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/irs-phishing-campaign-targeted-100000-people/</loc>
		<lastmod>2019-11-21T14:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-neutralize-the-rising-threat-of-ransomware/</loc>
		<lastmod>2019-11-21T15:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-what-is-apt/</loc>
		<lastmod>2019-11-21T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/new-cisco-certifications-and-changes-coming-in-2020/</loc>
		<lastmod>2019-11-21T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-7-seasonal-security-sins-make-sure-your-data-is-safe-this-holiday-season/</loc>
		<lastmod>2019-11-21T16:54:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-walter-legowskis-invoke-greatbirdofcommonknowledge-gathering-what-is-scattered-with-attck-an-atomic-bird-and-a-bit-of-homegrown-powershell/</loc>
		<lastmod>2019-11-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/securelink-introduces-new-features-to-simplify-management-of-vendor-privileged-access/</loc>
		<lastmod>2019-11-21T17:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-the-time-before-and-after-land/</loc>
		<lastmod>2019-11-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/macys-is-the-latest-victim-of-magecart-dont-be-next/</loc>
		<lastmod>2019-11-21T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-risks-of-pre-shared-keys-psks/</loc>
		<lastmod>2019-11-21T18:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybercrime-investigator-degree-requirements/</loc>
		<lastmod>2019-11-21T18:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-stuart-mcmurrays-adventures-in-systemd-injection/</loc>
		<lastmod>2019-11-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/c-level-security-compliance-the-need-for-communication-and-automation-3/</loc>
		<lastmod>2019-11-21T19:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/case-study-mixmode-ai-detects-attack-not-found-on-threat-intel/</loc>
		<lastmod>2019-11-21T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/get-the-lay-of-the-land/</loc>
		<lastmod>2019-11-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/will-your-waf-know-when-you-are-compromised/</loc>
		<lastmod>2019-11-21T23:09:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/just-12-of-ics-security-pros-very-sure-of-orgs-ability-to-respond-to-digital-attacks/</loc>
		<lastmod>2019-11-22T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-should-be-on-everyones-holiday-shopping-list/</loc>
		<lastmod>2019-11-22T05:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fortiguard-labs-weekly-threat-update-november-22-2019/</loc>
		<lastmod>2019-11-22T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/threat-landscape-trends-in-education/</loc>
		<lastmod>2019-11-22T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/monero-project-compromised/</loc>
		<lastmod>2019-11-22T09:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/shifting-from-managed-security-services-to-managed-detection-and-response/</loc>
		<lastmod>2019-11-25T08:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Security-CPB-Biometric.jpg</image:loc>
			<image:caption><![CDATA[managed detection and response]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-nsa-warns-of-tls-inspection/</loc>
		<lastmod>2019-11-22T12:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/let-bitdefender-take-care-of-your-business-security-over-the-holidays/</loc>
		<lastmod>2019-11-22T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-you-need-to-know-about-accountability-under-the-gdpr/</loc>
		<lastmod>2019-11-22T13:57:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/t-mobile-says-security-incident-might-have-affected-some-customer-data/</loc>
		<lastmod>2019-11-22T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/amazon-says-few-restrictions-on-police-use-of-ring-footage-avast/</loc>
		<lastmod>2019-11-22T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/google-drastically-increases-rewards-for-researchers-who-can-compromise-titan-m/</loc>
		<lastmod>2019-11-22T14:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-many-types-of-hackers-are-there/</loc>
		<lastmod>2019-11-22T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyber-attacks-are-killing-hospital-patients-could-cybercriminals-be-prosecuted-for-murder/</loc>
		<lastmod>2019-11-22T15:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/morphisec-protects-you-from-the-new-purelocker-ransomware-2/</loc>
		<lastmod>2019-11-22T15:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/bitpaymer-ransomware-leveraging-new-custom-packer-framework-against-targets-across-the-u-s-2/</loc>
		<lastmod>2019-11-22T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/get-some-peace-of-mind-at-aws-reinvent/</loc>
		<lastmod>2019-11-22T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-eric-escobars-frag-youre-it-hacking-laser-tag/</loc>
		<lastmod>2019-11-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-reaction-to-the-new-16-inch-macbook-pro/</loc>
		<lastmod>2019-11-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/upgrading-to-ws2016-2019-consider-a-safety-net-for-ad/</loc>
		<lastmod>2019-11-22T18:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/marketing-teams-are-not-equipped-to-monitor-social-media-threats/</loc>
		<lastmod>2019-11-22T18:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nist-cybersecurity-framework-scorecards-explained/</loc>
		<lastmod>2019-11-22T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-jared-atkinsons-waking-up-the-data-engineer-in-you/</loc>
		<lastmod>2019-11-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/lessons-from-the-louisiana-ransomware-attack/</loc>
		<lastmod>2019-11-22T19:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinar-static-analysis-security-testing-sast-in-ci-cd-why-and-how/</loc>
		<lastmod>2019-11-22T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-petard-pinch/</loc>
		<lastmod>2019-11-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/project-zero-shares-a-detailed-analysis-of-the-use-after-free-android-binder-vulnerability-that-affected-pixel-xioami-and-others/</loc>
		<lastmod>2019-11-22T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/shifting-to-an-integrated-security-approach/</loc>
		<lastmod>2019-11-22T21:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/are-you-a-fool-with-a-tool/</loc>
		<lastmod>2019-11-22T22:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whats-new-in-istio-1-4/</loc>
		<lastmod>2019-11-22T23:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/110-nursing-homes-cut-off-from-health-records-in-ransomware-attack/</loc>
		<lastmod>2019-11-23T05:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-michael-fowls-nick-defoes-old-tools-new-tricks-hacking-websockets/</loc>
		<lastmod>2019-11-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-olaf-hartongs-endpoint-detection-super-powers-on-the-cheap-with-sysmon/</loc>
		<lastmod>2019-11-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/attribute-based-access-control-for-amazon-web-services/</loc>
		<lastmod>2019-11-24T15:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/discussion-should-facial-recognition-be-banned-or-regulated/</loc>
		<lastmod>2019-11-24T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-evilmogs-automating-hashtopolis/</loc>
		<lastmod>2019-11-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/luke-kingmas-lou-patrick-mackays-futurism-comics-amazon-no-lines-no-checkout-no-jobs/</loc>
		<lastmod>2019-11-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-bill-gardners-social-engineering-in-non-linear-warfare/</loc>
		<lastmod>2019-11-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/disney-hacked-accounts-black-friday-scams-android-camera-exploits/</loc>
		<lastmod>2019-11-25T05:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cloud-security-threats-escaping-the-egregious-eleven-part-two/</loc>
		<lastmod>2019-11-25T06:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/your-holiday-guide-to-safe-cybershopping/</loc>
		<lastmod>2019-11-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cyber-fraud-protection-tips-for-secure-online-shopping/</loc>
		<lastmod>2019-11-25T08:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-the-future-workspace-might-look-like-in-2020-top-5-insights/</loc>
		<lastmod>2019-11-25T09:43:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hacking-since-age-six-cyber-work-podcast/</loc>
		<lastmod>2019-11-25T10:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/swimlane-gives-thanks-by-giving-back/</loc>
		<lastmod>2019-11-25T10:39:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/clearswift-wins-dlp-award-at-computing-security-excellence-awards-3/</loc>
		<lastmod>2019-11-25T10:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/another-fifth-quantum-dawn-cybersecurity-exercise/</loc>
		<lastmod>2019-11-25T11:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/deployment-isnt-the-final-step-monitoring-machine-learning-models-in-production/</loc>
		<lastmod>2019-11-25T13:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/catch-says-pos-malware-incident-might-have-exposed-customers-data/</loc>
		<lastmod>2019-11-25T13:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-must-have-qualities-of-an-entrepreneur-to-influence-people/</loc>
		<lastmod>2019-11-25T13:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hackers-attack-oneplus-again-this-time-stealing-customer-details/</loc>
		<lastmod>2019-11-25T14:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/almost-half-of-smb-executives-believe-employees-cant-recognize-phishing/</loc>
		<lastmod>2019-11-25T15:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cnbc-feature/</loc>
		<lastmod>2019-11-25T15:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nexus-lifecycle-now-integrates-with-red-hat-clair-to-secure-containers-across-the-sdlc/</loc>
		<lastmod>2019-11-25T16:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-need-for-secure-coding/</loc>
		<lastmod>2019-11-25T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/best-practices-to-ensure-your-organization-is-focused-on-the-right-types-of-risk/</loc>
		<lastmod>2019-11-25T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/malware-spotlight-what-is-rogue-security-software/</loc>
		<lastmod>2019-11-25T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-vulnerability-spotlight-brute-force/</loc>
		<lastmod>2019-11-25T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/</loc>
		<lastmod>2019-11-25T16:40:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-detect-browser-extensions-3/</loc>
		<lastmod>2019-11-25T16:56:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-micah-k-browns-how-to-cook-a-five-star-meal-from-the-convenience-of-your-hotel-room/</loc>
		<lastmod>2019-11-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-maximize-your-siem-benefits/</loc>
		<lastmod>2019-11-25T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/robert-m-lees-jeff-haas-little-bobby-comics-retainer/</loc>
		<lastmod>2019-11-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/idaptive-gives-back/</loc>
		<lastmod>2019-11-25T18:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-blockchain-train-get-on-board-with-caution/</loc>
		<lastmod>2019-11-25T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/derbycon2019-eddie-davids-virtual-smart-cards-for-lab-environments/</loc>
		<lastmod>2019-11-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/video-all-things-ctf/</loc>
		<lastmod>2019-11-25T19:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/reports-detail-newly-discovered-gps-spoofing-attack-attributed-to-prc/</loc>
		<lastmod>2019-11-25T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/hipaa-compliance-what-healthcare-administrators-need-to-know/</loc>
		<lastmod>2019-11-25T22:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/iso-27001-in-the-banking-industry-one-standard-to-rule-them-all/</loc>
		<lastmod>2019-11-25T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/phishing-trends-position-isps-to-protect-subscribers/</loc>
		<lastmod>2019-11-25T22:52:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/european-cybersecurity-what-happens-after-brexit/</loc>
		<lastmod>2019-11-25T23:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/join-signal-sciences-at-aws-reinvent-2019/</loc>
		<lastmod>2019-11-26T00:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/black-friday-cyber-monday-ecommerce-security-threats/</loc>
		<lastmod>2019-11-26T01:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/whats-new-with-trusted-computing/</loc>
		<lastmod>2019-11-26T02:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-succeed-at-aws-reinvent-2019/</loc>
		<lastmod>2019-11-26T03:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-definitive-list-of-the-benefits-of-integrated-risk-management/</loc>
		<lastmod>2019-11-26T04:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ransomware-tis-the-season-for-retailers-to-be-prepared/</loc>
		<lastmod>2019-11-26T05:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/security-for-cloud-services-paas-deep-dive/</loc>
		<lastmod>2019-11-26T05:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/information-security-corporate-owned-devices-vs-employee-owned-devices/</loc>
		<lastmod>2019-11-26T07:52:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/defining-cloud-security-ownership-with-devsecops/</loc>
		<lastmod>2019-11-26T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/its-in-the-cloud-so-it-secure-maybe/</loc>
		<lastmod>2019-11-26T09:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/casb-innovations-for-email-saas-and-iaas-applications/</loc>
		<lastmod>2019-11-26T12:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/8-online-shopping-security-tips-for-cyber-monday/</loc>
		<lastmod>2019-11-26T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/sale-of-4-million-stolen-cards-tied-to-breaches-at-4-restaurant-chains/</loc>
		<lastmod>2019-11-26T13:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/black-friday-dont-look-for-a-security-bargain/</loc>
		<lastmod>2019-11-26T13:54:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/study-finds-companies-may-be-wise-to-share-cybersecurity-efforts/</loc>
		<lastmod>2019-11-26T13:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/securing-ansible-automation-environments-with-cyberark/</loc>
		<lastmod>2019-11-26T14:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/fullz-house-group-using-phishing-and-web-skimming-to-maximize-profits/</loc>
		<lastmod>2019-11-26T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/facebook-and-twitter-warn-some-users-private-data-was-accessed-via-third-party-app-sdk/</loc>
		<lastmod>2019-11-26T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-i-hate-software-upgrades/</loc>
		<lastmod>2019-11-26T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/man-suspected-of-hacking-jack-dorseys-twitter-account-arrested/</loc>
		<lastmod>2019-11-26T14:35:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/active-trickbot-campaign-observed-abusing-sendgrid-and-google-docs/</loc>
		<lastmod>2019-11-26T15:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/five-ciso-priorities/</loc>
		<lastmod>2019-11-26T15:15:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/black-friday-online-shopping-checklist-avast/</loc>
		<lastmod>2019-11-26T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/an-unsecured-elasticsearch-server-exposed-1-2-billion-user-records-containing-their-personal-and-social-information/</loc>
		<lastmod>2019-11-26T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/10-key-announcements-from-microsoft-ignite-2019-you-should-know-about/</loc>
		<lastmod>2019-11-26T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/these-4-tips-will-make-you-fluent-in-cyber-risk-2/</loc>
		<lastmod>2019-11-26T16:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-eva-galperins-friday-keynote/</loc>
		<lastmod>2019-11-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/difenda-debuts-servicenow-integration-for-venafi-trust-protection-platform/</loc>
		<lastmod>2019-11-26T17:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/trend-micro-leads-the-industry-in-hybrid-cloud-security-market-share/</loc>
		<lastmod>2019-11-26T17:53:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/lookback-malware-targets-more-than-a-dozen-utilities/</loc>
		<lastmod>2019-11-26T17:56:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-hotel-room-party/</loc>
		<lastmod>2019-11-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/circleci-maven-release-orb/</loc>
		<lastmod>2019-11-26T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-ttimzens-securelyfitzs-r00tkillahs-_m46s-aagallags-bsidespdx-101/</loc>
		<lastmod>2019-11-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/next-year-security-predictions-again/</loc>
		<lastmod>2019-11-26T19:11:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-nsa-hsts-security-feature-mystery/</loc>
		<lastmod>2019-11-26T19:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinar-4-reasons-your-next-cybersecurity-tabletop-will-flop/</loc>
		<lastmod>2019-11-26T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tips-for-brits-to-stay-secure-on-black-friday/</loc>
		<lastmod>2019-11-26T19:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/death-of-privacy-state-of-california-department-of-motor-vehicles-selling-licensed-drivers-personal-data/</loc>
		<lastmod>2019-11-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/dropbox-phishing-scam-dont-get-fooled-by-fake-shared-documents/</loc>
		<lastmod>2019-11-26T21:25:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-lessons-learned-from-the-bsimm/</loc>
		<lastmod>2019-11-26T21:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-a-night-at-ignite/</loc>
		<lastmod>2019-11-26T21:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-create-a-baseline-for-your-network/</loc>
		<lastmod>2019-11-26T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/election-security-cybersecurity-concerns-for-future-elections/</loc>
		<lastmod>2019-11-26T22:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-vulnerability-spotlight-credentials-in-files/</loc>
		<lastmod>2019-11-26T22:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cybersecurity-architect-certifications/</loc>
		<lastmod>2019-11-26T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-protect-holiday-shoppers-from-bots-and-scammers/</loc>
		<lastmod>2019-11-26T23:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/speed-to-market-amid-a-rush-to-guard-the-grid-raytheon-finds-allies-in-innovation/</loc>
		<lastmod>2019-11-26T23:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-does-your-current-security-infrastructure-look-like-2/</loc>
		<lastmod>2019-11-27T00:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/moving-beyond-traditional-antivirus-protection/</loc>
		<lastmod>2019-11-27T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/its-way-too-easy-to-get-a-gov-domain-name/</loc>
		<lastmod>2019-11-27T02:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/on-the-convergence-of-data-privacy-and-data-security-part-1/</loc>
		<lastmod>2019-11-27T06:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/simplifying-digital-transformation-with-security-driven-networking/</loc>
		<lastmod>2019-11-27T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/spate-of-ransomware-attacks-on-healthcare-providers-raises-serious-health-concerns/</loc>
		<lastmod>2019-11-27T09:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/64-bits-ought-to-be-enough-for-anybody/</loc>
		<lastmod>2019-11-27T11:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/remote-file-transfer-how-to-sync-files-remotely-on-mobile-devices/</loc>
		<lastmod>2019-11-27T11:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mystery-server-found-to-host-private-data-in-the-open-for-1-2-billion-people/</loc>
		<lastmod>2019-11-27T13:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-holiday-hackers-are-coming-for-your-website-are-you-protected/</loc>
		<lastmod>2019-11-27T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/kiosk-mode-for-frontline-workers-devices-optimize-business-benefits/</loc>
		<lastmod>2019-11-27T14:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/deathransom-ransomware-fixes-issues-now-encrypting-victims-data/</loc>
		<lastmod>2019-11-27T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/shop-safely-this-cyber-monday/</loc>
		<lastmod>2019-11-27T15:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/deepfakes-welcome-to-the-post-truth-society/</loc>
		<lastmod>2019-11-27T16:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-make-istio-work-with-your-apps/</loc>
		<lastmod>2019-11-27T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/mitre-attck-vulnerability-spotlight-credentials-in-registry/</loc>
		<lastmod>2019-11-27T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/cyber-work-podcast-the-current-state-of-ai-in-cybersecurity/</loc>
		<lastmod>2019-11-27T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/take-our-survey-microservices-containers-and-serverless-development/</loc>
		<lastmod>2019-11-27T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/penetration-testing-certifications/</loc>
		<lastmod>2019-11-27T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/nexus-intelligence-insights-cve-2018-16487-lodash-rce-prototype-pollution/</loc>
		<lastmod>2019-11-27T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-maximize-your-waf/</loc>
		<lastmod>2019-11-27T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-wendy-knox-everettes-updates-from-the-crypto-war-2-0/</loc>
		<lastmod>2019-11-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-dr-googles-got-your-records/</loc>
		<lastmod>2019-11-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/persistent-network-security-demands-healthy-habits/</loc>
		<lastmod>2019-11-27T18:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/webinars-container-security-tool-misuse-and-abuse-open-source-in-ma/</loc>
		<lastmod>2019-11-27T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-dean-pierces-they-put-money-on-the-internet/</loc>
		<lastmod>2019-11-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/website-security-tips-for-black-friday-cyber-monday/</loc>
		<lastmod>2019-11-27T19:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/us-doe-oig-report-thousands-of-severe-security-flaws-discovered/</loc>
		<lastmod>2019-11-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/9-mistakes-your-b2b-business-website-is-making/</loc>
		<lastmod>2019-11-27T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tcg-japan-regional-forum-open-workshop-to-build-security-resilience-in-an-increasingly-connected-world/</loc>
		<lastmod>2019-11-27T20:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/ideas-that-become-obvious-in-hindsight-3/</loc>
		<lastmod>2019-11-27T21:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-hipaa-compliant-communication-tools-can-prepare-home-healthcare-for-pdgm/</loc>
		<lastmod>2019-11-27T23:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/kali-linux-2019-4-released-with-xfce-a-new-desktop-environment-a-new-gtk3-theme-and-much-more/</loc>
		<lastmod>2019-11-28T02:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/using-wpscan-to-find-wordpress-vulnerabilities-on-your-website/</loc>
		<lastmod>2019-11-28T04:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-future-of-cybersecurity-insurance/</loc>
		<lastmod>2019-11-28T04:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/tis-the-season-top-tips-for-staying-secure-during-the-holidays/</loc>
		<lastmod>2019-11-28T05:18:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/third-party-sdk-gathered-user-data-from-twitter-and-facebook-without-consent/</loc>
		<lastmod>2019-11-28T07:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/happy-thanksgiving-2/</loc>
		<lastmod>2019-11-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/face-off-security-challenges-in-the-age-of-facial-recognition/</loc>
		<lastmod>2019-11-28T09:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/dont-let-file-transfers-to-and-from-third-parties-leave-your-organization-vulnerable-2/</loc>
		<lastmod>2019-11-28T12:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/soc-prevalence-and-maturity-on-the-rise/</loc>
		<lastmod>2019-11-28T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-clock-is-ticking-on-californias-consumer-privacy-protection-act/</loc>
		<lastmod>2019-11-28T13:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/monthly-cyber-security-review-november-2019/</loc>
		<lastmod>2019-11-28T14:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/g-suite-vs-office-365-how-do-you-pick-the-right-one/</loc>
		<lastmod>2019-11-28T15:17:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/detroit-free-press-how-to-protect-your-money-from-online-crooks-on-black-friday-cyber-monday/</loc>
		<lastmod>2019-11-28T16:55:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/5-ways-to-enhance-customer-experience-in-e-commerce/</loc>
		<lastmod>2019-11-28T21:44:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/work-culture-at-promobi-what-sets-apart-best-from-the-rest/</loc>
		<lastmod>2019-11-29T10:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/palo-alto-networks-employee-data-breach-highlights-risks-posed-by-third-party-vendors/</loc>
		<lastmod>2019-11-29T10:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/professional-ransomware-gang-targets-1800-large-organizations-worldwide-dutch-investigators-find/</loc>
		<lastmod>2019-11-29T11:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-scalefusion-helped-a-leading-india-based-emergency-management-services-company/</loc>
		<lastmod>2019-11-29T12:51:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/customers-complain-after-alarms-go-offline-as-security-firm-hit-by-ransomware-attack/</loc>
		<lastmod>2019-11-29T14:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-nancy-eckerts-swarm-intelligence-and-human-systems/</loc>
		<lastmod>2019-11-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/xkcd-aurora-meaning/</loc>
		<lastmod>2019-11-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-nypd-and-the-rest-of-us-need-some-new-barricades/</loc>
		<lastmod>2019-11-29T18:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-krisztian-gados-a-game-theoretic-analysis-of-tors-resilience-to-entry-exit-and-end-to-end-attacks/</loc>
		<lastmod>2019-11-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/dexphot-malware-cryptojacked-80000-computers-avast/</loc>
		<lastmod>2019-11-29T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-kevin-fromans-improving-anonymous-networking/</loc>
		<lastmod>2019-11-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-joy-of-tech-the-cybertruck-conundrum/</loc>
		<lastmod>2019-11-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bsides-portland-2019-jarrod-oversons-how-did-8-million-developers-download-an-exploit-with-no-one-noticing/</loc>
		<lastmod>2019-11-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/1-2-billion-records-exposed-in-the-biggest-data-leak-in-a-decade/</loc>
		<lastmod>2019-11-30T21:38:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-virsec-story-game-changing-application-visibility-protection/</loc>
		<lastmod>2019-12-01T15:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-tobin-shields-giving-back-how-to-support-the-next-generation-of-infosec-professionals/</loc>
		<lastmod>2019-12-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-cyber-monday-carollers/</loc>
		<lastmod>2019-12-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-aaron-wangugis-hacking-hypebeasts-threat-modeling-reverse-engineering-nikes-self-lacing-shoes/</loc>
		<lastmod>2019-12-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/phone-and-voice-fraud-twitter-account-purge-adobe-magento-marketplace-data-breach/</loc>
		<lastmod>2019-12-02T05:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ensuring-performance-and-security-at-cloud-enabled-branch-offices/</loc>
		<lastmod>2019-12-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/honing-in-on-diversity-to-solve-the-cyber-skills-gap/</loc>
		<lastmod>2019-12-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-network-security-use-cases-with-amazon-vpc-ingress-routing/</loc>
		<lastmod>2019-12-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/facial-recognition-technology-benefits-much-more-than-unlocking-smartphones/</loc>
		<lastmod>2019-12-02T10:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/we-phish-you-a-very-merry-christmas-and-a-fraudulent-new-year/</loc>
		<lastmod>2019-12-02T11:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/security-for-cloud-services-iaas-deep-dive/</loc>
		<lastmod>2019-12-02T11:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/five-ws-for-vulnerability-management/</loc>
		<lastmod>2019-12-02T11:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/time-for-something-new/</loc>
		<lastmod>2019-12-02T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/tornados-necessity-and-the-evolution-of-mitigating-controls/</loc>
		<lastmod>2019-12-02T13:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-make-a-connected-life-safe-again-avast/</loc>
		<lastmod>2019-12-02T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/erica-olsen-of-nnedv-on-iot-devices-avast/</loc>
		<lastmod>2019-12-02T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/blackdirect-microsoft-azure-account-takeover/</loc>
		<lastmod>2019-12-02T15:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/unsecured-server-with-private-data-from-millions-of-sms-messages-found-online/</loc>
		<lastmod>2019-12-02T15:04:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hey-alexa-whats-a-phone-book/</loc>
		<lastmod>2019-12-02T15:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/for-cisos-a-zero-trust-security-model-wont-work-until-you-do-this-first/</loc>
		<lastmod>2019-12-02T15:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/glass-class-casb-vs-swg/</loc>
		<lastmod>2019-12-02T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/one-world-identity-report-names-loginradius-a-customer-identity-and-access-management-ciam-industry-leader/</loc>
		<lastmod>2019-12-02T16:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/akamai-prolexic-mitigating-large-scale-ddos-attacks-in-0-seconds/</loc>
		<lastmod>2019-12-02T16:52:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/saying-goodbye/</loc>
		<lastmod>2019-12-02T16:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-eric-goldstroms-interactive-threat-defense-incident-response-threat-intel-and-red-team-oh-my/</loc>
		<lastmod>2019-12-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-macys-magecart-data-breach-what-you-need-to-know-to-protect-your-customers/</loc>
		<lastmod>2019-12-02T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ask-the-experts-what-are-the-biggest-cyber-security-threats-for-2020/</loc>
		<lastmod>2019-12-02T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/tcg-and-ietf-further-cement-interoperability-in-attestation-with-long-term-partnership/</loc>
		<lastmod>2019-12-02T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/truedialogs-unprotected-database-exposes-millions-of-sms-messages-containing-two-factor-codes-and-more/</loc>
		<lastmod>2019-12-02T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/another-fake-google-domain-fonts-googlesapi-com/</loc>
		<lastmod>2019-12-02T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/forbes-feature-how-to-avoid-cyber-monday-scams/</loc>
		<lastmod>2019-12-02T18:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-greg-stromires-2fa-so-strong-it-could-be-1fa/</loc>
		<lastmod>2019-12-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-idaptive-helped-appen-get-a-million-workers-speaking-180-languages-on-the-same-page/</loc>
		<lastmod>2019-12-02T19:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/robert-m-lees-jeff-haas-little-bobby-comics-pie/</loc>
		<lastmod>2019-12-02T19:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-dmarc-works-with-subdomains-and-the-sp-tag/</loc>
		<lastmod>2019-12-02T20:38:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hiding-the-hidden-kali-linux-2019-4-unleashed/</loc>
		<lastmod>2019-12-02T20:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-celestial/</loc>
		<lastmod>2019-12-02T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/knowledge-and-skills-related-to-applied-cryptography-and-cryptanalysis/</loc>
		<lastmod>2019-12-02T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybercrime-investigator-salary/</loc>
		<lastmod>2019-12-02T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybercrime-certifications/</loc>
		<lastmod>2019-12-02T20:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-needs-in-megacorporations-cyber-work-podcast-2/</loc>
		<lastmod>2019-12-02T23:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/build-vs-buy-how-should-you-implement-security-analytics/</loc>
		<lastmod>2019-12-03T01:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-blue-teams-need-rasp-continuous-application-threat-monitoring-with-runtime-exploit-prevention/</loc>
		<lastmod>2019-12-03T02:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/7-big-ideas-from-cybersecurity-leaders-weve-interviewed/</loc>
		<lastmod>2019-12-03T04:08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-round-up-of-data-breaches-in-november-2019/</loc>
		<lastmod>2019-12-03T07:12:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-use-your-baseline-for-network-security/</loc>
		<lastmod>2019-12-03T08:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/climbing-the-vulnerability-management-mountain-reaching-maturity-level-2/</loc>
		<lastmod>2019-12-03T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/time-series-databases-the-future-of-monitoring-and-logging/</loc>
		<lastmod>2019-12-03T09:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/lawsuit-alleges-tiktok-sends-user-videos-to-chinese-servers-for-surveillance/</loc>
		<lastmod>2019-12-03T09:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cliff-notes-to-5-studies-about-the-state-of-cybersecurity-in-healthcare/</loc>
		<lastmod>2019-12-03T12:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/network-security-spending-rises-as-business-environments-grow-too-complex-for-traditional-endpoint-security/</loc>
		<lastmod>2019-12-03T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/deep-ibm-collaboration-delivers-unified-it-and-ot-cyber-security/</loc>
		<lastmod>2019-12-03T12:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pci-pal-selected-for-membership-in-avayas-devconnect-program/</loc>
		<lastmod>2019-12-03T13:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rpa-citizen-developers-at-the-corner-of-speed-and-value/</loc>
		<lastmod>2019-12-03T14:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/application-layer-protection-for-istio-service-mesh/</loc>
		<lastmod>2019-12-03T14:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/old-vs-new-methods-for-employee-password-hardening/</loc>
		<lastmod>2019-12-03T14:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/network-traffic-analysis-for-incident-response-ir-tls-decryption/</loc>
		<lastmod>2019-12-03T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-what-is-a-remote-access-trojan-rat/</loc>
		<lastmod>2019-12-03T15:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/acbackdoor-malware-targets-windows-linux-users/</loc>
		<lastmod>2019-12-03T16:24:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/smith-wesson-online-store-affected-by-magecart-attack/</loc>
		<lastmod>2019-12-03T16:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-aaron-pareckis-how-to-hack-oauth/</loc>
		<lastmod>2019-12-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/combatting-the-accidental-insider-data-leakage-threat/</loc>
		<lastmod>2019-12-03T17:47:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-how-to-deliver-christmas-presents/</loc>
		<lastmod>2019-12-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-dns-visibility-matters-in-education/</loc>
		<lastmod>2019-12-03T18:15:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyber-security-roundup-for-november-2019/</loc>
		<lastmod>2019-12-03T18:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/biggest-2019-data-breaches-some-of-the-worst-of-the-worst/</loc>
		<lastmod>2019-12-03T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/network-traffic-analysis-for-ir-data-collection-and-monitoring/</loc>
		<lastmod>2019-12-03T18:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-alex-ivkins-argghh-yer-kubernetes-be-now-a-shark-bait/</loc>
		<lastmod>2019-12-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/alert-logic-and-aws-enhance-visibility-to-improve-threat-detection-and-response/</loc>
		<lastmod>2019-12-03T19:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/tracking-trackers-the-new-hiding-game-leveraging-cname-entries-in-dns-records/</loc>
		<lastmod>2019-12-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/destination-crm-feature-avaya-adds-pci-pal-as-a-devconnect-partner/</loc>
		<lastmod>2019-12-03T20:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rogue-staff-member-at-leading-cybersecurity-company-leaks-customer-data/</loc>
		<lastmod>2019-12-03T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-bedrock-of-security/</loc>
		<lastmod>2019-12-03T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/first-girls4tech-event-at-mastercard-vancouver-kicks-off/</loc>
		<lastmod>2019-12-03T22:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-vpns-are-a-compliance-nightmare/</loc>
		<lastmod>2019-12-03T22:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/throttle-bandwidth-hogging-inactive-pages/</loc>
		<lastmod>2019-12-04T03:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-iphone-11-pros-location-data-puzzler/</loc>
		<lastmod>2019-12-04T03:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/universal-network-level-call-blocking-what-you-need-to-know/</loc>
		<lastmod>2019-12-04T04:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/verizons-2019-payment-security-report-not-just-for-pci/</loc>
		<lastmod>2019-12-04T04:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-protection-in-the-digital-transformation-era/</loc>
		<lastmod>2019-12-04T06:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/swimlane-launches-level-up-initiative-with-inaugural-rsa-conference-raffle-to-embolden-industry-analysts/</loc>
		<lastmod>2019-12-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-level-up-initiative-supports-security-analyst-training-2/</loc>
		<lastmod>2019-12-04T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/fortinet-named-a-challenger-with-highest-ability-to-execute-in-the-2019-gartner-wan-edge-infrastructure-magic-quadrant/</loc>
		<lastmod>2019-12-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/turning-aspiration-into-action-to-protect-financial-institutions/</loc>
		<lastmod>2019-12-04T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nudata-now-offers-aws-privatelink-connection/</loc>
		<lastmod>2019-12-04T08:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rsa-240-factored/</loc>
		<lastmod>2019-12-04T09:26:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/gravityzone-sandbox-analyzer-on-premises-now-generally-available/</loc>
		<lastmod>2019-12-04T10:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hiring-come-join-chronicle-gcp-as-security-data-scientist/</loc>
		<lastmod>2019-12-04T11:08:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-predictions-whats-next-for-the-cloud-connected-cars-and-medicine-and-cybersecurity/</loc>
		<lastmod>2019-12-04T11:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/sql-injection-loses-1-spot-as-most-dangerous-attack-technique/</loc>
		<lastmod>2019-12-04T11:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/adding-some-salt-to-our-network-part-1/</loc>
		<lastmod>2019-12-04T12:19:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/retailers-must-improve-cybersecurity-this-holiday-season/</loc>
		<lastmod>2019-12-04T13:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dangerous-android-vulnerability-that-lets-attackers-steal-sensitive-data-found-in-wild/</loc>
		<lastmod>2019-12-04T14:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/zerocleare-malware-targeting-energy-industrial-sectors-in-middle-east/</loc>
		<lastmod>2019-12-04T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/tripwire-patch-priority-index-for-november-2019/</loc>
		<lastmod>2019-12-04T14:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/infosec-skills-network-traffic-analysis-for-ir-dns-protocol-with-wireshark/</loc>
		<lastmod>2019-12-04T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-types-of-business-email-compromise-bec/</loc>
		<lastmod>2019-12-04T14:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-architect-salary/</loc>
		<lastmod>2019-12-04T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-compliance-carol-a-visit-from-the-ghost-of-compliance-past/</loc>
		<lastmod>2019-12-04T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/avast-releases-2020-threat-landscape-report-avast/</loc>
		<lastmod>2019-12-04T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mobile-device-data-breach-leads-to-3-million-hipaa-settlement/</loc>
		<lastmod>2019-12-04T15:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/protect-your-digital-assets-with-unified-access-to-enterprise-content-repositories/</loc>
		<lastmod>2019-12-04T16:27:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-franklin-hardings-modern-websites-require-modern-vulnerabilities/</loc>
		<lastmod>2019-12-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/characteristics-and-challenges-of-advanced-persistent-threats-apts-2/</loc>
		<lastmod>2019-12-04T17:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-the-online-shopping-experience/</loc>
		<lastmod>2019-12-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/open-source-for-lawyers-challenges-of-open-source-use/</loc>
		<lastmod>2019-12-04T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-john-andersens-down-the-dependency-rabbit-hole/</loc>
		<lastmod>2019-12-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-integration-to-visual-studio-code-nexus-iq-and-oss-index/</loc>
		<lastmod>2019-12-04T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitglass-security-spotlight-domains-used-to-target-microsoft-users/</loc>
		<lastmod>2019-12-04T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/black-friday-stays-mobile/</loc>
		<lastmod>2019-12-04T19:39:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-website-vulnerability-scanning-tools/</loc>
		<lastmod>2019-12-04T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/feature-release-19-5/</loc>
		<lastmod>2019-12-04T21:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/towards-a-concept-of-security-specification-for-software-supply-chain/</loc>
		<lastmod>2019-12-04T21:05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/seczetta-launches-new-saas-based-solution-to-manage-identity-risk/</loc>
		<lastmod>2019-12-04T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-anti-robocall-law-goes-to-president-for-signatory-approval/</loc>
		<lastmod>2019-12-04T21:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/injection-vulnerabilities-20-years-and-counting/</loc>
		<lastmod>2019-12-04T21:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/webinar-burp-less-hacking-learning-web-application-pentesting-on-a-budget/</loc>
		<lastmod>2019-12-05T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/openbsd-multiple-authentication-vulnerabilities/</loc>
		<lastmod>2019-12-05T04:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/psa-beware-of-exposing-ports-in-docker/</loc>
		<lastmod>2019-12-05T05:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ncipher-security-achieves-common-criteria-eal4-certification/</loc>
		<lastmod>2019-12-05T06:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/11-cybersecurity-predictions-for-2020/</loc>
		<lastmod>2019-12-05T06:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/air-peace-ceo-charged-with-millions-in-money-laundering-re-buying-planes-he-already-owns/</loc>
		<lastmod>2019-12-05T06:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-rise-of-security-driven-networking-and-the-future-of-network-security/</loc>
		<lastmod>2019-12-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dissecting-tor-bridges-and-pluggable-transport-part-i-finding-the-built-in-tor-bridges-and-how-tor-browser-works/</loc>
		<lastmod>2019-12-05T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/fake-python-libraries-caught-trying-to-steal-ssh-and-gpg-keys/</loc>
		<lastmod>2019-12-05T08:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/generative-unsupervised-learning-vs-discriminative-clustering-technology-which-prevents-zero-day-attacks/</loc>
		<lastmod>2019-12-05T08:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-write-perfect-cyber-security-strategy-for-your-venture/</loc>
		<lastmod>2019-12-05T09:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/study-shows-many-organizations-need-to-improve-their-efforts-to-comply-with-data-privacy-laws/</loc>
		<lastmod>2019-12-05T09:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/k-12-content-filtering-cloud-security-why-you-need-both/</loc>
		<lastmod>2019-12-05T11:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/research-email-remains-a-weak-link-in-u-s-election-infrastructure/</loc>
		<lastmod>2019-12-05T12:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/choice-hotels-if-a-b-c-d-then-oops-we-might-have-leaked-some-safari-users-personal-info/</loc>
		<lastmod>2019-12-05T13:36:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/iranian-malware-targeted-energy-and-industrial-sectors-in-the-middle-east/</loc>
		<lastmod>2019-12-05T13:54:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/third-party-access-is-a-top-10-organizational-risk/</loc>
		<lastmod>2019-12-05T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/major-data-center-provider-hit-by-ransomware-attack-claims-report/</loc>
		<lastmod>2019-12-05T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/last-watchdogs-iot-and-zero-trust-coverage-win-mvp-awards-from-information-management-today/</loc>
		<lastmod>2019-12-05T15:38:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dont-suffer-from-a-data-breach-over-the-holidays-protect-your-website-at-no-cost-for-30-days/</loc>
		<lastmod>2019-12-05T15:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/protect-your-private-data-this-holiday-season-announcing-privacy-alert-by-instart-a-new-chrome-plugin-for-better-browser-security/</loc>
		<lastmod>2019-12-05T15:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/awards-highlight-exceptional-momentum-for-untangle-in-the-network-security-for-small-to-medium-business-market-2/</loc>
		<lastmod>2019-12-05T16:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/iam-access-analyzer-review/</loc>
		<lastmod>2019-12-05T16:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/unique-countermeasures-in-active-phishing-campaign-avoids-security-tools/</loc>
		<lastmod>2019-12-05T16:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-matt-woods-how-not-to-be-seen-creating-non-speculative-side-channel-resistant-code/</loc>
		<lastmod>2019-12-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/managing-traffic-from-the-outset-how-gtm-can-make-your-deployments-easier/</loc>
		<lastmod>2019-12-05T17:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/securing-your-network-in-preparation-for-the-holidays/</loc>
		<lastmod>2019-12-05T17:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/worlds-top-hackers-meet-at-the-first-5g-cyber-security-hackathon/</loc>
		<lastmod>2019-12-05T17:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-group-chat-rules/</loc>
		<lastmod>2019-12-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/legacy-vs-adaptive-sso-how-machine-learning-prevents-breaches/</loc>
		<lastmod>2019-12-05T18:25:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-you-need-a-software-bill-of-materials-more-than-ever/</loc>
		<lastmod>2019-12-05T18:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-secure-are-air-gapped-computers/</loc>
		<lastmod>2019-12-05T18:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-hidden-cost-of-a-third-party-data-breach/</loc>
		<lastmod>2019-12-05T18:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/legal-entity-identifiers-take-center-stage-in-new-digicert-partnership/</loc>
		<lastmod>2019-12-05T18:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-you-need-pam-and-vpam-in-2020-2/</loc>
		<lastmod>2019-12-05T18:54:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-alexei-kojenovs-insecure-deserialization-and-how-not-to-do-it/</loc>
		<lastmod>2019-12-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/apple-explains-mysterious-iphone-11-location-requests/</loc>
		<lastmod>2019-12-05T19:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-migrate-apps-and-workloads-to-the-cloud-securely-and-efficiently/</loc>
		<lastmod>2019-12-05T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-cybersecurity-predictions/</loc>
		<lastmod>2019-12-05T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/code-complete/</loc>
		<lastmod>2019-12-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-importance-of-trust-in-leading-a-market-transition/</loc>
		<lastmod>2019-12-05T20:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pki-is-the-cornerstone-of-digital-privacy-avast/</loc>
		<lastmod>2019-12-05T21:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-mitigate-phishing-threats-inyour-organization/</loc>
		<lastmod>2019-12-05T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-outsmart-cyber-attackers-when-you-can-remove-them-entirely/</loc>
		<lastmod>2019-12-05T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-popcorn/</loc>
		<lastmod>2019-12-05T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mitre-attck-drive-by-compromise/</loc>
		<lastmod>2019-12-05T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/network-traffic-analysis-for-ir-ftp-protocol-with-wireshark/</loc>
		<lastmod>2019-12-05T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-conquer-physical-threats/</loc>
		<lastmod>2019-12-05T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/an-epidemic-of-ransomware-washes-over-healthcare/</loc>
		<lastmod>2019-12-05T22:15:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/fake-python-libraries-removed-from-pypi-when-caught-stealing-ssh-and-gpg-keys-reports-zdnet/</loc>
		<lastmod>2019-12-06T00:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mozilla-removes-avast-and-avg-extensions-from-firefox-to-secure-user-data/</loc>
		<lastmod>2019-12-06T00:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyber-security-in-2020-and-beyond-insights-from-the-experts/</loc>
		<lastmod>2019-12-06T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/staying-safe-when-shopping-this-holiday-season-bricks-and-clicks-edition/</loc>
		<lastmod>2019-12-06T05:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dissecting-tor-bridges-and-pluggable-transport-part-ii-how-obfs4-bridges-defeats-censorship/</loc>
		<lastmod>2019-12-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/apple-confirms-iphone-regularly-gathers-location-data-but-says-it-doesnt-leave-the-phone/</loc>
		<lastmod>2019-12-06T11:19:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/moving-on-from-encryption-the-case-for-edrm-2/</loc>
		<lastmod>2019-12-06T14:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/manipulating-machine-learning-systems-by-manipulating-training-data/</loc>
		<lastmod>2019-12-06T14:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/fbi-announces-5-million-bounty-for-information-on-russian-hackers-behind-dridex-attacks/</loc>
		<lastmod>2019-12-06T14:49:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hackerone-bug-bounty-website-hacked/</loc>
		<lastmod>2019-12-06T14:49:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/devsecops-challenges-from-a-security-perspective/</loc>
		<lastmod>2019-12-06T15:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/managing-risk-in-the-extended-enterprise/</loc>
		<lastmod>2019-12-06T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/accelerated-digital-innovation-to-impact-the-cybersecurity-threat-landscape-in-2020/</loc>
		<lastmod>2019-12-06T16:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/three-consequences-of-a-misaddressed-email/</loc>
		<lastmod>2019-12-06T16:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-challenges-of-uk-cyber-security-standards/</loc>
		<lastmod>2019-12-06T16:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-brian-myers-xxe-for-dummies/</loc>
		<lastmod>2019-12-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-guide-to-state-sponsored-cyberthreats/</loc>
		<lastmod>2019-12-06T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-grinch-who-almost-stole-black-friday-2/</loc>
		<lastmod>2019-12-06T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/big-data-and-machine-learning-solutions-2/</loc>
		<lastmod>2019-12-06T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/stop-bots-from-taking-a-bite-out-of-your-marketing-spend-2/</loc>
		<lastmod>2019-12-06T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/the-growing-threat-of-payment-fraud-for-online-retailers-2/</loc>
		<lastmod>2019-12-06T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/retailers-how-much-of-your-holiday-traffic-is-actually-human-2/</loc>
		<lastmod>2019-12-06T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/why-organizations-are-failing-to-deal-with-rising-bot-attacks-4/</loc>
		<lastmod>2019-12-06T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/how-to-recover-from-a-ddos-attack-2/</loc>
		<lastmod>2019-12-06T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-is-it-christmas/</loc>
		<lastmod>2019-12-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/avast-threat-labs-uncovers-brazil-cyberattacks-avast/</loc>
		<lastmod>2019-12-06T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/two-russian-hackers-wanted-for-widespread-cyberattacks-avast/</loc>
		<lastmod>2019-12-06T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-privacy-event-disclosed-by-sunrise-community-health/</loc>
		<lastmod>2019-12-06T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bsides-portland-2019-brian-delgados-tejaswini-vibhutes-abc-to-xyz-of-writing-system-management-mode-smm-drivers/</loc>
		<lastmod>2019-12-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/guest-essay-addressing-dns-domain-names-and-certificates-to-improve-security-postures/</loc>
		<lastmod>2019-12-06T19:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pants-on-fire-mobile-telecom-edition/</loc>
		<lastmod>2019-12-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-25-most-dangerous-vulnerabilities-smart-city-privacy-duckduckgo-vs-google/</loc>
		<lastmod>2019-12-06T20:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/no-jitter-feature-no-jitter-roll-five-for-friday/</loc>
		<lastmod>2019-12-06T20:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/deepfake-the-ai-endangering-your-cybersecurity/</loc>
		<lastmod>2019-12-06T20:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/something-for-conferences/</loc>
		<lastmod>2019-12-06T20:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/juice-jacking-meh/</loc>
		<lastmod>2019-12-06T22:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/personal-online-privacy-data-browser-privacy/</loc>
		<lastmod>2019-12-07T00:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/researchers-find-a-new-linux-vulnerability-that-allows-attackers-to-sniff-or-hijack-vpn-connections/</loc>
		<lastmod>2019-12-07T01:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/united-states-of-american-national-pearl-harbor-remembrance-day/</loc>
		<lastmod>2019-12-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/amazon-battles-leaky-s3-buckets-with-a-new-security-tool/</loc>
		<lastmod>2019-12-07T12:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/going-after-the-good-guys-the-governments-ransomware-identity-crisis/</loc>
		<lastmod>2019-12-07T14:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/social-engineers-are-no-match-for-artificial-intelligence/</loc>
		<lastmod>2019-12-07T20:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-changing-landscape-of-customer-acquisition-engagement-and-retention-in-2020/</loc>
		<lastmod>2019-12-07T20:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-at-colorado-it-provider-affects-100-dental-offices/</loc>
		<lastmod>2019-12-07T21:17:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-the-social-engineering-village-r-paul-wilson/</loc>
		<lastmod>2019-12-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/robert-m-lees-jeff-haas-little-bobby-comics-dont/</loc>
		<lastmod>2019-12-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-wayne-ronaldsons-red-teaming-from-down-under/</loc>
		<lastmod>2019-12-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/just-how-effective-are-russian-political-social-media-ops/</loc>
		<lastmod>2019-12-08T19:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-youre-tracked-online-new-mass-surveillance-concerns-malicious-android-app-hijack/</loc>
		<lastmod>2019-12-09T05:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/five-essentials-for-your-sd-branch-security-deployments/</loc>
		<lastmod>2019-12-09T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/installing-a-fake-internet-with-inetsim-and-polarproxy/</loc>
		<lastmod>2019-12-09T08:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/windows-hello-for-business-affected-by-serious-vulnerability-microsoft-issues-advisory/</loc>
		<lastmod>2019-12-09T08:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/moving-to-the-cloud-motivations-behind-the-migration/</loc>
		<lastmod>2019-12-09T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cmmc-the-logical-end-of-iso-27001-soc-2-hitrust-certifications/</loc>
		<lastmod>2019-12-09T09:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/my-take-why-its-now-crucial-to-preserve-pki-digital-certificates-as-the-core-of-internet-security/</loc>
		<lastmod>2019-12-09T10:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/strong-authentication-is-good-unless/</loc>
		<lastmod>2019-12-09T11:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-you-need-a-chief-trust-officer/</loc>
		<lastmod>2019-12-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mainnet360-joint-economic-and-security-reviews-with-prysm-group/</loc>
		<lastmod>2019-12-09T12:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cognitive-biases-in-security-decision-making-cyber-work-podcast/</loc>
		<lastmod>2019-12-09T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/sodinokibi-ransomware-gang-infects-yet-another-it-provider-serving-dentists-100-offices-hit/</loc>
		<lastmod>2019-12-09T13:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/glass-class-securing-g-suite/</loc>
		<lastmod>2019-12-09T13:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/microsoft-finds-44-million-compromised-credentials-used-for-its-services/</loc>
		<lastmod>2019-12-09T14:01:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/optiv-announces-new-software-assurance-as-a-service-offering-powered-by-veracode/</loc>
		<lastmod>2019-12-09T15:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hackers-steal-credit-card-details-from-sweaty-betty-customers/</loc>
		<lastmod>2019-12-09T15:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/want-to-be-a-ciso-know-this-first/</loc>
		<lastmod>2019-12-09T16:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-the-sepodcast-ep-120-live-with-guest-robin-dreeke/</loc>
		<lastmod>2019-12-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hidden-complexity-is-biggest-threat-to-compliance/</loc>
		<lastmod>2019-12-09T17:05:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-there-go-the-google-guys/</loc>
		<lastmod>2019-12-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/domain-provider-network-solutions-announces-data-breach/</loc>
		<lastmod>2019-12-09T18:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/spotify-phishing-campaign-tells-users-that-their-subscriptions-are-frozen/</loc>
		<lastmod>2019-12-09T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-ryan-macdougalls-osint-in-the-real-world/</loc>
		<lastmod>2019-12-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-cyber-security-software-is-critical-infrastructure/</loc>
		<lastmod>2019-12-09T19:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/3-hr-risks-and-how-to-avoid-them/</loc>
		<lastmod>2019-12-09T19:49:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nordvpn-dipping-their-toes-in-the-evil-end-of-the-pool/</loc>
		<lastmod>2019-12-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitdefender-and-datto-integration/</loc>
		<lastmod>2019-12-09T20:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-hackers-create-phishing-campaigns/</loc>
		<lastmod>2019-12-09T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/book-review-virus-bomb/</loc>
		<lastmod>2019-12-09T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/when-will-blockchain-technology-be-a-game-changer/</loc>
		<lastmod>2019-12-09T21:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-state-of-soar-2019-how-using-soar-tools-makes-life-easier/</loc>
		<lastmod>2019-12-10T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-swagshop/</loc>
		<lastmod>2019-12-10T00:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-smoking-led-to-social-engineers-gaining-physical-access-to-a-network/</loc>
		<lastmod>2019-12-10T00:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ethical-hacking-top-10-browser-extensions-for-hacking/</loc>
		<lastmod>2019-12-10T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/whats-new-in-kubernetes-1-17-a-deeper-look-at-new-features/</loc>
		<lastmod>2019-12-10T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/benefits-of-an-insider-threat-detection-program/</loc>
		<lastmod>2019-12-10T01:06:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-evolution-of-threat-hunting/</loc>
		<lastmod>2019-12-10T02:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/repost-five-factors-to-impact-fintech-cybersecurity-in-2020/</loc>
		<lastmod>2019-12-10T05:06:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/navigating-ics-security-knowing-the-basics/</loc>
		<lastmod>2019-12-10T08:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/raising-your-software-security-programs-to-the-star-level/</loc>
		<lastmod>2019-12-10T08:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dont-fall-for-the-hype-marketing-myths-in-artificial-intelligence-for-cybersecurity/</loc>
		<lastmod>2019-12-10T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-monitoring-outgoing-traffic-will-help-find-out-if-your-servers-been-compromised/</loc>
		<lastmod>2019-12-10T09:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-state-sponsored-cyberthreat-landscape/</loc>
		<lastmod>2019-12-10T11:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/more-stolen-credit-cards-top-fraudsters-holiday-wishlist/</loc>
		<lastmod>2019-12-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/should-fido2-be-on-your-christmas-wishlist/</loc>
		<lastmod>2019-12-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/year-in-review-18-cybersecurity-statistics-and-research-figures-summarizing-2019/</loc>
		<lastmod>2019-12-10T12:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/how-to-apply-the-risk-management-framework-rmf/</loc>
		<lastmod>2019-12-10T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/updated-ryuk-ransomware-decryptor-could-damage-larger-files/</loc>
		<lastmod>2019-12-10T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-for-building-automation-systems/</loc>
		<lastmod>2019-12-10T13:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/unsecured-aws-bucket-exposes-personal-data-of-750000-u-s-residents/</loc>
		<lastmod>2019-12-10T13:01:15+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->