<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2018/03/the-shared-security-podcast-episode-74-special-guest-rachel-tobac-racheltobac/</loc>
		<lastmod>2018-03-29T16:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-set-up-aws-cloudtrail-an-important-step-in-account-security/</loc>
		<lastmod>2018-03-29T16:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/new-york-cybersecurity-regulations-an-important-step-but-still-a-long-way-from-the-gdpr/</loc>
		<lastmod>2018-03-29T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/security-analyst-summit-2018-in-cancun-ai-ml-and-the-sun/</loc>
		<lastmod>2018-03-29T17:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ready-for-tax-season-phishing-scams/</loc>
		<lastmod>2018-03-29T20:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bitcoin-explained/</loc>
		<lastmod>2018-03-29T21:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/the-data-breach-epidemic-no-info-is-safe/</loc>
		<lastmod>2018-03-29T21:12:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/malicious-cryptomining-evil-mining/</loc>
		<lastmod>2018-03-29T21:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/critical-drupal-core-vulnerability-what-you-need-to-know/</loc>
		<lastmod>2018-03-29T21:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/wannacry-after-one-year/</loc>
		<lastmod>2018-03-30T02:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-language-to-speak-devsecops/</loc>
		<lastmod>2018-03-30T06:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/spyware-presence-in-enterprise-networks/</loc>
		<lastmod>2018-03-30T07:02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/payment-gateways-what-are-the-risks-lurking-around/</loc>
		<lastmod>2018-03-30T07:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/securityeverafter-2018-03-29-211700/</loc>
		<lastmod>2018-03-30T07:36:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/njrat-pushes-lime-ransomware-and-bitcoin-wallet-stealer/</loc>
		<lastmod>2018-03-30T08:47:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/myfitnesspal-hacked-150-million-user-accounts-compromised/</loc>
		<lastmod>2018-03-30T11:49:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/under-armour-notifies-150m-myfitnesspal-users-of-data-breach/</loc>
		<lastmod>2018-03-30T11:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/state-of-software-security-checking-the-pulse-of-the-healthcare-industry/</loc>
		<lastmod>2018-03-30T13:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bitdefenders-business-insights-nominated-at-the-2018-security-blogger-awards-cast-your-vote/</loc>
		<lastmod>2018-03-30T14:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/robert-m-lee-jeff-hasss-little-bobby-press-release/</loc>
		<lastmod>2018-03-30T14:36:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/take-the-pledge-to-prevent-a-ransomware-disaster-world-backup-day-2018/</loc>
		<lastmod>2018-03-30T14:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/tls-1-3-is-nearly-here/</loc>
		<lastmod>2018-03-30T15:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/bens-book-of-the-month-review-of-machine-learning-and-security-protecting-systems-with-data-and-algorithms/</loc>
		<lastmod>2018-03-30T16:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/you-down-with-p2p-10-tips-to-secure-your-mobile-payment-app/</loc>
		<lastmod>2018-03-30T17:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/coinhive-expose-prompts-cancer-research-fundraiser/</loc>
		<lastmod>2018-03-30T17:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/comptia-stackable-certifications/</loc>
		<lastmod>2018-03-30T18:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/j-d-illiad-frazers-nearly-payday/</loc>
		<lastmod>2018-03-30T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/fed-up-fire-up-this-cloud-browser/</loc>
		<lastmod>2018-03-30T22:24:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/weekly-cyber-risk-roundup-myfitnesspal-breach-carbanak-leader-arrested/</loc>
		<lastmod>2018-03-31T17:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/owasp-appsec-cali-2018-women-in-security-the-panel/</loc>
		<lastmod>2018-03-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/xkcd-star-lore/</loc>
		<lastmod>2018-03-31T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-phenom/</loc>
		<lastmod>2018-04-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/compute-visualize-drive-space-consumption-of-your-installed-r-packages/</loc>
		<lastmod>2018-04-01T16:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-andrew-van-der-stocks-owasp-top-10/</loc>
		<lastmod>2018-04-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/j-d-illiad-frazers-90-crapola/</loc>
		<lastmod>2018-04-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/more-options-for-querying-dns-from-r-with-1-1-1-1/</loc>
		<lastmod>2018-04-02T00:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/why-the-crypto-backdoor-side-is-morally-corrupt/</loc>
		<lastmod>2018-04-02T02:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-weekly-blaze-facebooks-privacy-firestorm-myfitnesspal-data-breach-ramifications-of-cloud-and-fosta/</loc>
		<lastmod>2018-04-02T04:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/bsidessf-preview-planning-for-a-threat-model-in-the-home/</loc>
		<lastmod>2018-04-02T04:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-invest-in-your-employees-to-strengthen-it-security-for-your-business/</loc>
		<lastmod>2018-04-02T04:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/data-integrity-follow-up-ways-to-protect-your-data/</loc>
		<lastmod>2018-04-02T04:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/facebook-and-cambridge-analytica/</loc>
		<lastmod>2018-04-02T07:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/gdpr-data-controllers-be-prepared/</loc>
		<lastmod>2018-04-02T07:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/sail-smooth-with-cloud-threats-cloud-security-issues/</loc>
		<lastmod>2018-04-02T07:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/costs-of-non-compliance-are-getting-higher/</loc>
		<lastmod>2018-04-02T07:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-14-controlled-access-based-on-the-need-to-know/</loc>
		<lastmod>2018-04-02T08:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/my-take-how-behavior-monitoring-can-reduce-workplace-violence-protect-sensitive-data/</loc>
		<lastmod>2018-04-02T09:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/over-5-million-payment-cards-compromised-in-saks-lord-taylor-data-breach/</loc>
		<lastmod>2018-04-02T10:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/saks-fifth-avenue-lord-taylor-suffer-payment-card-data-breach/</loc>
		<lastmod>2018-04-02T11:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/3d-secure-2-0-what-the-protocol-means-for-merchants/</loc>
		<lastmod>2018-04-02T11:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/speaking-at-gartner-security-summit-2018/</loc>
		<lastmod>2018-04-02T12:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/nykolas-z-updates-global-alternative-dns-speed-test-to-include-cloudflare-1-1-1-1/</loc>
		<lastmod>2018-04-02T13:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-forward-secrecy-chronicles-tls-1-3-hath-garnered-favor/</loc>
		<lastmod>2018-04-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/devcentrals-featured-member-for-april-daniel-varela/</loc>
		<lastmod>2018-04-02T15:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-study-in-exploit-development-part-2-taking-it-to-the-next-level/</loc>
		<lastmod>2018-04-02T16:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-smart-is-my-smart-tv/</loc>
		<lastmod>2018-04-02T16:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsac-ondemand-set-to-debut-in-2018/</loc>
		<lastmod>2018-04-02T16:20:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/devops-ready-waf-scaling-security-for-a-more-agile-environment/</loc>
		<lastmod>2018-04-02T16:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/privacy-and-consent-the-heart-of-the-cambridge-analytica-scandal/</loc>
		<lastmod>2018-04-02T16:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/complete-guide-to-enterprise-container-security-new-paper/</loc>
		<lastmod>2018-04-02T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/spycloud-secures-5-million-in-funding-to-eradicate-account-takeover/</loc>
		<lastmod>2018-04-02T17:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mobile-menace-monday-fake-whatsapp-can-steal-info-from-your-phone/</loc>
		<lastmod>2018-04-02T17:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-week-in-security-march-26-april-01/</loc>
		<lastmod>2018-04-02T17:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-jonathan-marcils-threat-modeling-toolkit/</loc>
		<lastmod>2018-04-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybersecurity-approaches-to-keep-phi-safe/</loc>
		<lastmod>2018-04-02T20:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/robert-m-lee-jeff-hasss-little-bobby-blind-faith/</loc>
		<lastmod>2018-04-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/panerabread-com-leaks-millions-of-customer-records/</loc>
		<lastmod>2018-04-02T21:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/women-in-information-security-amanda-berlin/</loc>
		<lastmod>2018-04-03T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/networkminer-2-3-released/</loc>
		<lastmod>2018-04-03T06:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/toolsmith-132-the-helk-vs-aptsimulator-part-2/</loc>
		<lastmod>2018-04-03T07:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/more-than-half-of-cios-suspect-their-mobile-workers-have-been-hacked-in-the-past-12-months/</loc>
		<lastmod>2018-04-03T08:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/authentication-authorization-accounting-and-identity-management/</loc>
		<lastmod>2018-04-03T10:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/oracle-ebs-penetration-testing-tool/</loc>
		<lastmod>2018-04-03T10:42:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/5-best-practices-for-credentialed-scanning/</loc>
		<lastmod>2018-04-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-conference-2018-security-takes-center-stage/</loc>
		<lastmod>2018-04-03T12:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/u-s-pipeline-network-disables-transactions-system-after-digital-attack/</loc>
		<lastmod>2018-04-03T12:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-13-data-protection/</loc>
		<lastmod>2018-04-03T12:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-threat-stack-cloud-secops-program-why-we-built-it-how-it-can-help-your-organization-become-more-secure/</loc>
		<lastmod>2018-04-03T12:19:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/panera-breads-half-baked-security/</loc>
		<lastmod>2018-04-03T12:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/google-officially-bans-all-crypto-miners-from-chrome-web-store/</loc>
		<lastmod>2018-04-03T13:09:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybergeorgia-state-of/</loc>
		<lastmod>2018-04-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/data-backup-considering-your-options-and-the-alternative/</loc>
		<lastmod>2018-04-03T14:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sip-protection-what-your-sip-security-solution-should-have/</loc>
		<lastmod>2018-04-03T14:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/2018-ieee-security-privacy-filtered-paper-dump/</loc>
		<lastmod>2018-04-03T15:20:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-cybersecurity-jobseekers-are-telling-us/</loc>
		<lastmod>2018-04-03T16:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsac-2018-ninja-sessions-after-dark/</loc>
		<lastmod>2018-04-03T16:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/malicious-gaming-extensions-a-childs-play-to-infection/</loc>
		<lastmod>2018-04-03T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-preview-the-latest-phishing-trends-and-intelligence-report/</loc>
		<lastmod>2018-04-03T17:45:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-threat-modeling-panel/</loc>
		<lastmod>2018-04-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/would-you-know-if-attackers-are-hiding-on-your-network/</loc>
		<lastmod>2018-04-03T18:09:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/panera-breads-website-reportedly-leaked-millions-of-customer-records/</loc>
		<lastmod>2018-04-03T19:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/proof-of-concept-and-patch-for-critical-cisco-ios-vulnerability-cve-2018-0171/</loc>
		<lastmod>2018-04-03T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-conversational-dynamics/</loc>
		<lastmod>2018-04-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/panerabread-com-breach-could-have-impacted-millions/</loc>
		<lastmod>2018-04-03T21:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ios-update-11-3-security-details/</loc>
		<lastmod>2018-04-04T00:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/practical-attacks-with-dns-rebinding/</loc>
		<lastmod>2018-04-04T03:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/smart-watch-data-helps-australian-police-close-murder-case/</loc>
		<lastmod>2018-04-04T07:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/thales-executives-speak-to-press-about-uk-cybersecurity-developments/</loc>
		<lastmod>2018-04-04T08:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gdpr-edr-protecting-personally-identifiable-information-of-eu-citizens/</loc>
		<lastmod>2018-04-04T08:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/grindr-says-sharing-of-sensitive-user-information-is-industry-practice/</loc>
		<lastmod>2018-04-04T10:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/vulnerability-modeling-with-binary-ninja/</loc>
		<lastmod>2018-04-04T10:50:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/self-driving-cars-we-are-the-robots/</loc>
		<lastmod>2018-04-04T11:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mark-zuckerberg-doesnt-plan-to-extend-gdpr-to-all-facebook-users/</loc>
		<lastmod>2018-04-04T11:52:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/exploring-r-bloggers-posts-with-the-feedly-api/</loc>
		<lastmod>2018-04-04T12:18:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-security-update-april-2018/</loc>
		<lastmod>2018-04-04T12:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ad-supported-apps-pose-data-privacy-security-risks/</loc>
		<lastmod>2018-04-04T13:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dot-cm-typosquatting-sites-visited-12m-times-so-far-in-2018/</loc>
		<lastmod>2018-04-04T13:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/training-gamification-cia-board-game/</loc>
		<lastmod>2018-04-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/pci-council-loses-600k-in-revenue-po-population-on-the-decline/</loc>
		<lastmod>2018-04-04T14:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-security-lesson-brief-from-the-under-armour-breach/</loc>
		<lastmod>2018-04-04T15:07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/choosing-the-right-ddos-solution-part-iii-always-on-cloud-service/</loc>
		<lastmod>2018-04-04T15:22:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/origins-of-information-security/</loc>
		<lastmod>2018-04-04T15:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/untangle-wins-edtech-digest-2018-cool-tool-awards-2/</loc>
		<lastmod>2018-04-04T16:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/its-three-conferences-in-one-at-rsac/</loc>
		<lastmod>2018-04-04T16:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/lockcrypt-ransomware-weakness-in-code-can-lead-to-recovery/</loc>
		<lastmod>2018-04-04T16:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/monitoring-for-gdpr-compliance/</loc>
		<lastmod>2018-04-04T16:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-security-roundup-for-march-2018/</loc>
		<lastmod>2018-04-04T17:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-eric-baizes-opening-keynote-flipping-the-script-fighting-advanced-threats-at-their-software-roots/</loc>
		<lastmod>2018-04-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyberspace-intervention-law-and-evolving-views/</loc>
		<lastmod>2018-04-04T18:52:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/streamline-compliance-with-swift-customer-security-program-requirements/</loc>
		<lastmod>2018-04-04T19:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/https-beware-the-false-sense-of-security/</loc>
		<lastmod>2018-04-04T20:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-if-psychologists-wrote-screenplays/</loc>
		<lastmod>2018-04-04T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/obfuscation-through-legitimate-appearances/</loc>
		<lastmod>2018-04-04T21:22:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/iot-and-machine-identity-protection-getting-smarter-about-securing-smart-technologies-2/</loc>
		<lastmod>2018-04-05T01:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/bsidessf-preview-why-it-is-important-to-understand-the-http-based-botnets-cc-deployments/</loc>
		<lastmod>2018-04-05T03:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cloud-vs-on-premises-understanding-the-security-differences/</loc>
		<lastmod>2018-04-05T03:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/iot-security-spending-due-to-surge-as-enterprises-address-big-gaps/</loc>
		<lastmod>2018-04-05T08:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/subverting-backdoored-encrryption/</loc>
		<lastmod>2018-04-05T09:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/guest-essay-how-orbitzs-poor-execution-of-a-systems-upgrade-left-data-exposed/</loc>
		<lastmod>2018-04-05T09:44:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/amazon-addresses-best-practice-secrets-management-with-aws-secrets-manager/</loc>
		<lastmod>2018-04-05T10:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-12-boundary-defense/</loc>
		<lastmod>2018-04-05T11:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/take-back-control-of-your-privacy-with-avast-secure-browser-avast/</loc>
		<lastmod>2018-04-05T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-multi-cloud-era-creates-new-encryption-challenges/</loc>
		<lastmod>2018-04-05T12:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/semafone-wins-most-disruptive-category-in-pymnts-voice-challenge-with-amazon-alexa/</loc>
		<lastmod>2018-04-05T12:53:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-is-sap-s-4hana-business-introduction/</loc>
		<lastmod>2018-04-05T13:07:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/find-out-who-is-leaking-your-secrets-with-help-from-invisible-zero-width-characters/</loc>
		<lastmod>2018-04-05T13:22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-rsas-acquisition-of-fortscale-acts-as-a-force-multiplier-for-the-soc-and-iam-teams/</loc>
		<lastmod>2018-04-05T13:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/intelligent-soc-series-the-role-of-your-soc-in-managing-digital-risk/</loc>
		<lastmod>2018-04-05T13:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/microsoft-begins-censoring-outlook-office-365-et-cetera-will-terminate-offending-accounts/</loc>
		<lastmod>2018-04-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/nessus-turns-20/</loc>
		<lastmod>2018-04-05T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/silent-librarian-university-attacks-continue-unabated-in-days-following-indictment/</loc>
		<lastmod>2018-04-05T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/marrying-the-business-need-with-technology-drive-recapping-it-all/</loc>
		<lastmod>2018-04-05T15:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/research-reveals-that-21-of-open-source-serverless-applications-have-critical-vulnerabilities/</loc>
		<lastmod>2018-04-05T15:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-deep-dive-into-database-attacks-part-iv-delivery-and-execution-of-malicious-executables-through-sql-commands-mysql/</loc>
		<lastmod>2018-04-05T15:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/into-the-breach-how-cyber-prepared-is-your-organization/</loc>
		<lastmod>2018-04-05T16:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/f5-agility-is-coming-to-boston-ma-this-august/</loc>
		<lastmod>2018-04-05T16:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/7-tips-for-making-the-most-of-office-365-for-enterprise/</loc>
		<lastmod>2018-04-05T17:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-caroline-wongs-the-only-reason-security-really-matters-for-devops/</loc>
		<lastmod>2018-04-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/secret-service-warns-of-chip-card-scheme/</loc>
		<lastmod>2018-04-05T19:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/j-d-illiad-frazers-three-laws-of-robotics/</loc>
		<lastmod>2018-04-05T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/will-facebook-cso-face-jail-time/</loc>
		<lastmod>2018-04-05T21:47:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/uk-army-museum-reveals-hidden-world-of-the-special-forces/</loc>
		<lastmod>2018-04-05T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/amazons-pay-as-you-go-private-ca-what-does-it-mean-for-you/</loc>
		<lastmod>2018-04-06T01:19:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-many-hats-club-color-doesnt-matter/</loc>
		<lastmod>2018-04-06T03:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/adding-macos-touch-bar-support-to-rstudio/</loc>
		<lastmod>2018-04-06T09:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-11-secure-configuration-for-network-devices-such-as-firewalls-routers-and-switches/</loc>
		<lastmod>2018-04-06T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-prepare-for-a-security-audit/</loc>
		<lastmod>2018-04-06T10:50:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/introducing-the-same-origin-policy-whitepaper/</loc>
		<lastmod>2018-04-06T11:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/shoppers-lawsuit-seeks-5m-in-damages-for-data-breach-at-saks-fifth-avenue-lord-taylor/</loc>
		<lastmod>2018-04-06T11:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/microsoft-defends-windows-defender-from-remote-code-execution-cve-2018-0986/</loc>
		<lastmod>2018-04-06T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/protect-your-genius-and-visit-bromium-at-rsac-2018/</loc>
		<lastmod>2018-04-06T13:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/krebs-on-security-usss-warns-of-chip-card-gambit/</loc>
		<lastmod>2018-04-06T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-attacks-on-u-s-cities-the-new-norm/</loc>
		<lastmod>2018-04-06T16:40:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/facebook-privacy-stance-proves-we-need-gdprforall/</loc>
		<lastmod>2018-04-06T17:15:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-skip-hovsmiths-a-tour-of-api-underprotection/</loc>
		<lastmod>2018-04-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hacked-website-trend-report-2017/</loc>
		<lastmod>2018-04-06T18:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/physician-protect-thyself-an-ounce-of-prevention-is-worth-a-pound-of-cure/</loc>
		<lastmod>2018-04-06T19:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-oatmeal-immutable-law-of-multiplicative-idiocy/</loc>
		<lastmod>2018-04-06T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/deep-fakes/</loc>
		<lastmod>2018-04-07T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-mike-shemas-devops-is-automation-devsecops-is-people/</loc>
		<lastmod>2018-04-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/supply-chain-accountability/</loc>
		<lastmod>2018-04-07T18:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/james-lecarpentiers-good-bear-comics-job-interview/</loc>
		<lastmod>2018-04-07T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dissecting-r-package-utility-belts/</loc>
		<lastmod>2018-04-08T12:41:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/username-thatll-be-rm-rf/</loc>
		<lastmod>2018-04-08T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-josh-sokols-architecting-for-security-in-the-cloud/</loc>
		<lastmod>2018-04-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/robert-m-lee-jeff-hasss-little-bobby-preparatory-action/</loc>
		<lastmod>2018-04-08T21:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-weekly-blaze-the-deletefacebook-movement-cloudflares-new-privacy-focused-dns-service-saks-fifth-avenue-and-panera-data-breaches/</loc>
		<lastmod>2018-04-09T04:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/iso-27001-and-why-it-matters-for-your-business/</loc>
		<lastmod>2018-04-09T04:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-confront-the-cyber-security-workforce-crisis/</loc>
		<lastmod>2018-04-09T04:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dont-give-away-historic-details-about-yourself/</loc>
		<lastmod>2018-04-09T04:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/trust-but-verify-keeping-watch-over-privileged-users/</loc>
		<lastmod>2018-04-09T07:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/disaster-recovery-as-a-service-failover-and-or-recovery/</loc>
		<lastmod>2018-04-09T10:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybersecurity-fails-government-not-keeping-up/</loc>
		<lastmod>2018-04-09T10:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/memcached-fueled-1-3-tbps-attacks/</loc>
		<lastmod>2018-04-09T11:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-scam-targeting-corporations-chip-cards-warns-secret-service/</loc>
		<lastmod>2018-04-09T11:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-10-data-recovery-capabilities/</loc>
		<lastmod>2018-04-09T11:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/more-visibility-into-metrics-tenable-io-gets-new-dashboards/</loc>
		<lastmod>2018-04-09T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hey-rsa-archer-summit-fans-pre-summit-training-courses-are-discounted/</loc>
		<lastmod>2018-04-09T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/your-phones-betrayal/</loc>
		<lastmod>2018-04-09T13:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/social-engineer-newsletter-vol-08-issue-103-2/</loc>
		<lastmod>2018-04-09T13:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ca-technologies-acquires-sourceclear-advancing-sca-capabilities-for-a-devsecops-world/</loc>
		<lastmod>2018-04-09T13:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dhs-to-create-lists-of-journalists-and-bloggers-based-on-sentiment/</loc>
		<lastmod>2018-04-09T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/labs-ctnt-report-shows-shift-in-threat-landscape-to-cryptomining/</loc>
		<lastmod>2018-04-09T14:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/looking-ahead-to-rsa-why-appsec-will-take-center-stage/</loc>
		<lastmod>2018-04-09T14:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/understanding-shared-responsibility-for-a-saas-environment/</loc>
		<lastmod>2018-04-09T15:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-james-wicketts-the-path-of-devops-enlightenment-for-infosec/</loc>
		<lastmod>2018-04-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-week-in-security-april-02-april-08/</loc>
		<lastmod>2018-04-09T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-apples-flexing-its-arms/</loc>
		<lastmod>2018-04-09T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-white-papers-law-firms-face-cyber-security-challenges-around-client-confidentiality-and-due-diligence/</loc>
		<lastmod>2018-04-09T22:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/my-take-a-breakdown-of-why-spectre-meltdown-signal-a-coming-wave-of-microcode-attacks/</loc>
		<lastmod>2018-04-10T00:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/women-in-information-security-sorene-assefa/</loc>
		<lastmod>2018-04-10T04:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/podcast-why-companies-need-a-strategy-to-manage-compliance-now-more-than-ever/</loc>
		<lastmod>2018-04-10T07:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cryptomining-is-here-to-stay-in-the-enterprise/</loc>
		<lastmod>2018-04-10T08:19:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/seven-steps-toward-bridging-the-cybersecurity-skills-gap/</loc>
		<lastmod>2018-04-10T08:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-9-limitation-and-control-of-network-ports-protocols-and-services/</loc>
		<lastmod>2018-04-10T10:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-do-you-wish-osquery-could-do/</loc>
		<lastmod>2018-04-10T10:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gmail-dots-dont-matter-feature-exposes-netflix-users-to-phishing-attacks/</loc>
		<lastmod>2018-04-10T11:29:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ransomware-named-most-prevalent-malware-in-verizons-2018-dbir/</loc>
		<lastmod>2018-04-10T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/choosing-an-ot-security-solution-here-are-the-7-questions-to-ask/</loc>
		<lastmod>2018-04-10T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/china-forces-spyware-onto-muslims-android-phones-complete-with-security-holes/</loc>
		<lastmod>2018-04-10T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tax-free-criminal-cyber-profits-reveal-economic-hierarchy/</loc>
		<lastmod>2018-04-10T13:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/brandos-rules-for-success/</loc>
		<lastmod>2018-04-10T13:52:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-noggin-tales-flaws-of-eeg/</loc>
		<lastmod>2018-04-10T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-ngfw-is-dead/</loc>
		<lastmod>2018-04-10T14:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssl-review-march-2018/</loc>
		<lastmod>2018-04-10T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/countdown-to-gdpr-6-data-transfers/</loc>
		<lastmod>2018-04-10T14:36:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-research-only-52-of-developers-using-components-in-their-apps-update-them-when-a-new-vulnerability-is-announced/</loc>
		<lastmod>2018-04-10T15:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/an-overview-of-the-tcp-optimization-process/</loc>
		<lastmod>2018-04-10T15:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-benchmark-your-secops-maturity-and-make-continuous-improvement/</loc>
		<lastmod>2018-04-10T15:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/</loc>
		<lastmod>2018-04-10T15:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-tune-your-database-security-to-protect-big-data/</loc>
		<lastmod>2018-04-10T15:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/heres-to-fido-alliance-in-praise-of-authentication-protocols/</loc>
		<lastmod>2018-04-10T15:46:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sap-cyber-threat-intelligence-report-april-2018/</loc>
		<lastmod>2018-04-10T15:53:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/fast-detection-of-breaches-is-ideal-to-keep-financial-data-safe/</loc>
		<lastmod>2018-04-10T16:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/trees-falling-in-a-forest-chronicles-of-a-data-breach/</loc>
		<lastmod>2018-04-10T16:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-clint-giblers-secdevops-current-research-and-best-practices/</loc>
		<lastmod>2018-04-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/unwanted-ads-via-baidu-links/</loc>
		<lastmod>2018-04-10T18:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-is-gdpr-why-is-it-important-for-business/</loc>
		<lastmod>2018-04-10T20:20:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cagle-posts-paresh-nath-facebook-and-public-trust/</loc>
		<lastmod>2018-04-10T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/vert-threat-alert-april-2018-patch-tuesday-analysis/</loc>
		<lastmod>2018-04-10T21:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-file-integrity-monitoring-fim-helps-with-gdpr-compliance/</loc>
		<lastmod>2018-04-10T22:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/socks-proxy-sdks-a-new-risk-for-enterprises/</loc>
		<lastmod>2018-04-10T23:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/adobe-microsoft-push-critical-security-fixes/</loc>
		<lastmod>2018-04-11T00:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dynamism-in-the-cloud-complicates-the-task-of-securing-machine-communication/</loc>
		<lastmod>2018-04-11T00:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/on-the-job-evolution-is-a-requirement-of-a-ciso/</loc>
		<lastmod>2018-04-11T03:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qa-how-to-prepare-for-spectre-meltdown-exploits-and-next-gen-microcode-attacks/</loc>
		<lastmod>2018-04-11T07:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-the-digital-human/</loc>
		<lastmod>2018-04-11T07:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cisos-latest-struggle-when-prevention-is-faulty-but-investigation-is-a-burden/</loc>
		<lastmod>2018-04-11T08:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-8-malware-defenses/</loc>
		<lastmod>2018-04-11T10:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/great-western-rail-resets-all-customer-passwords-after-detecting-password-reuse-attacks/</loc>
		<lastmod>2018-04-11T11:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cisco-smart-install-how-to-prevent-attacks-on-switches/</loc>
		<lastmod>2018-04-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/</loc>
		<lastmod>2018-04-11T12:36:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/predictably-evil/</loc>
		<lastmod>2018-04-11T12:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-serverless-blog-series-episode-0x06-dont-just-stand-there-do-something/</loc>
		<lastmod>2018-04-11T13:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dr-fred-cohens-how-cyber-security-punishes-good-behavior/</loc>
		<lastmod>2018-04-11T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/coin-mining-malware-and-what-akamai-can-do-about-it/</loc>
		<lastmod>2018-04-11T14:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/amid-cambridge-analytica-scandal-facebook-launches-data-abuse-bounty-program/</loc>
		<lastmod>2018-04-11T14:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/climbing-the-ladder-zero-trust-single-sign-on-multiple-applications/</loc>
		<lastmod>2018-04-11T14:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/best-secops-tools-50-must-have-tools-for-your-secops-arsenal/</loc>
		<lastmod>2018-04-11T15:28:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/smart-homes-of-tomorrow-this-is-not-what-we-expected/</loc>
		<lastmod>2018-04-11T15:40:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-devcentral-chronicles-volume-1-issue-4/</loc>
		<lastmod>2018-04-11T15:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/keeping-your-business-and-personal-instant-messages-secure/</loc>
		<lastmod>2018-04-11T16:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/innovate-follow-or-get-out-of-reys-way/</loc>
		<lastmod>2018-04-11T16:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/reconsidering-personal-privacy-perceptions/</loc>
		<lastmod>2018-04-11T16:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-swapnil-deshmukhs-pack-your-android-everything-you-need-to-know-about-android-boxing/</loc>
		<lastmod>2018-04-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/when-identity-thieves-hack-your-accountant/</loc>
		<lastmod>2018-04-11T18:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/not-all-incidents-are-created-equal/</loc>
		<lastmod>2018-04-11T19:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/untangle-wins-gold-at-security-today-2018-government-security-awards-2/</loc>
		<lastmod>2018-04-11T19:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-stay-out-of-the-security-shelfware-trap/</loc>
		<lastmod>2018-04-11T19:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/silent-shout-out-one-hundred-and-eighteen-years-of-silent-service/</loc>
		<lastmod>2018-04-11T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/4-ways-to-speed-up-mobile-charging/</loc>
		<lastmod>2018-04-11T20:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-paperwork/</loc>
		<lastmod>2018-04-11T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/from-my-gartner-blog-big-data-and-ai-craziness-is-ruining-security-innovation/</loc>
		<lastmod>2018-04-11T22:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind/</loc>
		<lastmod>2018-04-12T00:20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-fix-a-hacked-wordpress-site/</loc>
		<lastmod>2018-04-12T03:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/holding-facebook-executives-responsible-for-crimes/</loc>
		<lastmod>2018-04-12T05:09:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/nick-jovanovic-vp-federal-of-thales-esecurity-federal-speaks-to-media-about-data-security/</loc>
		<lastmod>2018-04-12T07:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-the-internet-of-things-energy-utilities/</loc>
		<lastmod>2018-04-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/thinking-of-moving-erp-to-the-cloud-dont-forget-about-security/</loc>
		<lastmod>2018-04-12T08:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/identifying-interested-parties-and-their-expectations-for-an-iso-27001-isms/</loc>
		<lastmod>2018-04-12T09:36:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sail-smooth-with-cloud-threats-part-2-cloud-apis/</loc>
		<lastmod>2018-04-12T09:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/u-s-appeals-court-says-barnes-noble-data-breach-victims-can-seek-damages/</loc>
		<lastmod>2018-04-12T11:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybersecurity-insurance/</loc>
		<lastmod>2018-04-12T11:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/convert-epub-to-text-for-processing-in-r/</loc>
		<lastmod>2018-04-12T11:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tenable-research-advisory-axis-camera-app-malicious-package-distribution-weakness/</loc>
		<lastmod>2018-04-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/netsparker-surveys-us-based-c-levels-on-gdpr-compliance/</loc>
		<lastmod>2018-04-12T12:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/opm-provides-guidance-to-address-cybersecurity-skills-gap/</loc>
		<lastmod>2018-04-12T12:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-role-of-identity-in-gdpr-compliance/</loc>
		<lastmod>2018-04-12T13:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/looking-ahead-to-rsa-what-youll-see-at-booth-n3309/</loc>
		<lastmod>2018-04-12T13:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-avoid-bursting-the-buy-in-bubble/</loc>
		<lastmod>2018-04-12T13:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-big-listen/</loc>
		<lastmod>2018-04-12T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-5-biggest-obstacles-to-secops-success/</loc>
		<lastmod>2018-04-12T14:38:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/can-security-be-efficient-without-expertise-or-intelligence/</loc>
		<lastmod>2018-04-12T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/can-you-detect-fileless-malware/</loc>
		<lastmod>2018-04-12T16:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tcg-members-infineon-microsoft-and-onboard-security-to-host-security-solutions-workshop-and-demonstrations-at-internet-of-things-north-america/</loc>
		<lastmod>2018-04-12T17:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-izar-tarandachs-the-best-flaw-didnt-make-into-production/</loc>
		<lastmod>2018-04-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/efficiently-testing-pipelined-microservices/</loc>
		<lastmod>2018-04-12T18:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/effectively-detecting-low-throughput-and-malicious-dns-exfiltration/</loc>
		<lastmod>2018-04-12T19:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-nonverbal-analysis-of-mark-zuckerbergs-congress-testimony/</loc>
		<lastmod>2018-04-12T19:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/incident-response-in-the-cloud-4-ways-to-improve-your-investigation-and-containment-capabilities/</loc>
		<lastmod>2018-04-12T19:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/protecting-routers-and-other-network-equipment/</loc>
		<lastmod>2018-04-12T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-dark-side-of-apis-part-1-api-overview/</loc>
		<lastmod>2018-04-12T19:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/obscure-e-mail-vulnerability/</loc>
		<lastmod>2018-04-12T20:50:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/james-lecarpentiers-good-bear-comics-phone-solicitors/</loc>
		<lastmod>2018-04-12T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/venafi-study-results-will-we-see-future-browser-distrust-events/</loc>
		<lastmod>2018-04-12T21:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/encryption-101-decryption-tool-code-walkthrough/</loc>
		<lastmod>2018-04-12T23:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/good-girls-go-to-heaven-but-girls-in-cyber-go-everywherean-exclusive-interview-with-lisa-lorenzin-director-emerging-technology-solutions-americas-at-zscaler/</loc>
		<lastmod>2018-04-12T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/thousands-of-compromised-websites-spreading-malware-via-fake-updates/</loc>
		<lastmod>2018-04-13T01:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/navigating-the-tech-industrys-great-shakeout-experts-advice-for-securely-migrating-to-the-cloud/</loc>
		<lastmod>2018-04-13T03:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tenable-research-february-and-march-vulnerability-disclosure-roundup/</loc>
		<lastmod>2018-04-13T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/radrat-an-all-in-one-toolkit-for-complex-espionage-ops/</loc>
		<lastmod>2018-04-13T07:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cryptowire-ransomware-not-dead/</loc>
		<lastmod>2018-04-13T08:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/enterprise-networks-hit-by-cryptominers-2-5-billion-attacks-blocked-in-six-months/</loc>
		<lastmod>2018-04-13T09:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/coppa-compliance/</loc>
		<lastmod>2018-04-13T11:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/akamai-and-duo-have-announced-a-technology-partnership-for-zero-trust/</loc>
		<lastmod>2018-04-13T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/inside-job-behind-theft-of-3m-from-bitcoin-exchange-says-ceo/</loc>
		<lastmod>2018-04-13T12:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-dod-ai-mineshaft-gap/</loc>
		<lastmod>2018-04-13T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-lessons-can-companies-learn-from-getting-breached/</loc>
		<lastmod>2018-04-13T15:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-businesses-can-learn-from-verizons-annual-data-breach-investigations-report/</loc>
		<lastmod>2018-04-13T15:22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/us-discusses-authorizing-cyber-attacks-outside-war-zone/</loc>
		<lastmod>2018-04-13T15:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/facebook-spammers-making-things-worse/</loc>
		<lastmod>2018-04-13T16:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-modern-web-applications-threats-and-types-of-attacks/</loc>
		<lastmod>2018-04-13T16:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/no-shortage-of-compelling-topics-as-rsa-conference-2018-approaches/</loc>
		<lastmod>2018-04-13T16:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-gdpr-means-for-encryption/</loc>
		<lastmod>2018-04-13T17:14:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-matt-austins-markdoom-how-i-hacked-every-major-ide-in-2-weeks/</loc>
		<lastmod>2018-04-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/drupalgeddon-2-0-are-hackers-slacking-off/</loc>
		<lastmod>2018-04-13T19:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/does-congress-really-care-about-your-privacy/</loc>
		<lastmod>2018-04-13T19:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/daniel-storis-commitland/</loc>
		<lastmod>2018-04-13T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/content-security-policy/</loc>
		<lastmod>2018-04-13T23:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/as-businesses-rush-to-comply-with-gdpr-some-face-costs-of-over-1-million/</loc>
		<lastmod>2018-04-14T08:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/reciprocal-strategies-systems-aware-red-teaming/</loc>
		<lastmod>2018-04-14T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-insecurity-spyware-targeting-uyghur-population/</loc>
		<lastmod>2018-04-14T14:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-omer-levi-hevronis-authentication-without-authentication/</loc>
		<lastmod>2018-04-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-davi-ottenheimers-unpoisoned-fruit-seeding-trust-into-a-growing-world-of-algorithmic-warfare/</loc>
		<lastmod>2018-04-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dr-eric-coles-what-you-need-to-know-about-facebook/</loc>
		<lastmod>2018-04-14T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/carnegie-mellon-university-conference-on-ethics-ai/</loc>
		<lastmod>2018-04-15T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/automating-politicians-the-ai-of-stupidity/</loc>
		<lastmod>2018-04-15T16:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-astha-singhal-patrick-thomas-we-come-bearing-gifts-enabling-product-security-with-culture-and-cloud/</loc>
		<lastmod>2018-04-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-conference-2018-fun-telco-history-in-sf/</loc>
		<lastmod>2018-04-15T18:55:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-word-about-tracking-on-this-site/</loc>
		<lastmod>2018-04-15T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-every-click-you-make/</loc>
		<lastmod>2018-04-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/robert-m-lee-jeff-hasss-little-bobby-the-problem/</loc>
		<lastmod>2018-04-15T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/schadenfreude-of-facebookery/</loc>
		<lastmod>2018-04-15T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tls-1-3-support-is-coming-this-spring/</loc>
		<lastmod>2018-04-16T11:00:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/lets-stop-talking-about-password-strength/</loc>
		<lastmod>2018-04-16T01:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/are-we-taking-our-online-privacy-seriously-enough/</loc>
		<lastmod>2018-04-16T03:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-the-blockchain-is-helping-secure-iot-technology/</loc>
		<lastmod>2018-04-16T03:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/putting-the-s-m-a-r-t-in-smart-cities-how-to-address-the-expanding-attack-surface/</loc>
		<lastmod>2018-04-16T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-weekly-blaze-facebook-goes-to-congress-more-data-breach-announcements-new-hope-for-replacing-passwords/</loc>
		<lastmod>2018-04-16T04:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/leaky-buckets-in-a-multi-cloud-world/</loc>
		<lastmod>2018-04-16T07:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cisos-who-deliver-a-compelling-narrative-stand-a-better-chance-of-expanding-their-it-security-budgets/</loc>
		<lastmod>2018-04-16T08:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/my-letter-urging-georgia-governor-to-veto-anti-hacking-bill/</loc>
		<lastmod>2018-04-16T11:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-dmca-and-its-chilling-effects-on-research/</loc>
		<lastmod>2018-04-16T11:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/pain-and-progress-in-managing-digital-risk/</loc>
		<lastmod>2018-04-16T12:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/patch-plugs-more-than-a-dozen-vulnerabilities-affecting-industrial-secure-router-series/</loc>
		<lastmod>2018-04-16T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/notes-on-setting-up-raspberry-pi-3-as-wifi-hotspot/</loc>
		<lastmod>2018-04-16T12:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mobile-security-trinity-how-vmware-google-and-appthority-help-secure-mobility-in-the-enterprise/</loc>
		<lastmod>2018-04-16T13:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/powerhammer-the-mains-exploitation/</loc>
		<lastmod>2018-04-16T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/akamai-announces-new-enhancements-to-worlds-largest-and-most-trusted-cloud-delivery-platform/</loc>
		<lastmod>2018-04-16T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-cyber-threat-alliance-stopping-attackers-in-their-tracks/</loc>
		<lastmod>2018-04-16T14:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/identity-thieves-phishing-and-pilfering-your-pii/</loc>
		<lastmod>2018-04-16T14:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/8-secops-related-sessions-you-dont-want-to-miss-at-rsa-conference-2018/</loc>
		<lastmod>2018-04-16T14:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/untangle-announces-firewall-as-a-service-fwaas-for-public-cloud-deployments/</loc>
		<lastmod>2018-04-16T15:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/week-in-security-april-09-april-15/</loc>
		<lastmod>2018-04-16T16:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/free-android-apps-with-poor-password-security/</loc>
		<lastmod>2018-04-16T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/firefox-for-ios-tracking-protection-by-default/</loc>
		<lastmod>2018-04-16T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/myspace-vs-facebook-the-good-old-days/</loc>
		<lastmod>2018-04-16T17:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-mayank-dhimans-breaking-fraud-and-bot-detection-solutions/</loc>
		<lastmod>2018-04-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/by-request-retrieving-your-feedly-saved-for-later-entries/</loc>
		<lastmod>2018-04-16T19:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/whats-inside-matters-page-construction-metrics/</loc>
		<lastmod>2018-04-16T20:13:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/soar-webinar-questions-answered/</loc>
		<lastmod>2018-04-16T20:37:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-congressional-testimony/</loc>
		<lastmod>2018-04-16T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-beginning-of-the-end-of-the-corporate-network/</loc>
		<lastmod>2018-04-16T21:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/deleted-facebook-cybercrime-groups-had-300000-members/</loc>
		<lastmod>2018-04-16T22:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mpulse-measure-what-matters-new-metrics-to-improve-user-experiences/</loc>
		<lastmod>2018-04-16T22:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/day-1-recap-innovation-sandbox-contest-and-more/</loc>
		<lastmod>2018-04-17T01:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/putting-pci-dss-in-perspective/</loc>
		<lastmod>2018-04-17T03:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/women-in-information-security-cindy-valladares/</loc>
		<lastmod>2018-04-17T03:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-security-risks-should-msps-expect-in-2018/</loc>
		<lastmod>2018-04-17T09:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/over-3000-free-android-apps-violate-kids-us-privacy-law/</loc>
		<lastmod>2018-04-17T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-is-an-mssp/</loc>
		<lastmod>2018-04-17T10:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-7-email-and-web-browser-protections/</loc>
		<lastmod>2018-04-17T10:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ncsc-advice-about-zte-equipment-services/</loc>
		<lastmod>2018-04-17T11:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/your-protection-is-our-mission-and-were-serious-about-it/</loc>
		<lastmod>2018-04-17T11:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-distribution-agreement-for-the-netherlands/</loc>
		<lastmod>2018-04-17T12:31:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tenable-pledges-to-fight-global-cyberattacks-with-33-leading-companies/</loc>
		<lastmod>2018-04-17T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/kicking-off-rsa-thales-esecurity-celebrates-its-partners-and-customers/</loc>
		<lastmod>2018-04-17T13:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/blatant-pervasive-incompetencies-recent-history-of/</loc>
		<lastmod>2018-04-17T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/user-photo-tagging-brings-major-class-action-lawsuit-for-facebook/</loc>
		<lastmod>2018-04-17T14:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/teen-faces-10-years-in-prison-for-downloading-7k-freedom-of-information-releases/</loc>
		<lastmod>2018-04-17T14:16:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/social-media-versus-data-privacy-gdpr/</loc>
		<lastmod>2018-04-17T14:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssl-certificates-boost-security-many-dont/</loc>
		<lastmod>2018-04-17T14:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/2018-phishing-trends-intelligence-report-the-shift-to-enterprise/</loc>
		<lastmod>2018-04-17T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/untangle-wins-three-awards-from-cyber-defense-magazine/</loc>
		<lastmod>2018-04-17T15:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/adventures-in-data-visualization-part-2/</loc>
		<lastmod>2018-04-17T15:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/us-uk-and-australian-governments-accuse-russia-of-targeting-networking-infrastructure/</loc>
		<lastmod>2018-04-17T15:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/miscellaneous-android-issues/</loc>
		<lastmod>2018-04-17T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/three-mistakes-teams-make-in-operationalizing-security-and-a-better-alternative/</loc>
		<lastmod>2018-04-17T15:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/this-years-innovation-sandbox-theme-taking-humans-out-of-the-security-equation/</loc>
		<lastmod>2018-04-17T16:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/devops-connect-devsecops-day-at-rsa-demonstrates-how-the-thinking-around-secure-software-has-evolved/</loc>
		<lastmod>2018-04-17T16:22:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/5-cybersecurity-questions-retailers-must-ask-to-protect-their-businesses/</loc>
		<lastmod>2018-04-17T16:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/kremlin-accused-of-sponsoring-cyberattacks-targeting-us-national-security/</loc>
		<lastmod>2018-04-17T17:47:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/devsecops-survey-reveals-heightened-interest-in-automated-security/</loc>
		<lastmod>2018-04-17T17:52:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/magnitude-exploit-kit-switches-to-gandcrab-ransomware/</loc>
		<lastmod>2018-04-17T17:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-anthony-trummers-european-vacation-leveraging-gdpr-for-security/</loc>
		<lastmod>2018-04-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-actors-targeting-network-infrastructure-devices-what-you-need-to-know/</loc>
		<lastmod>2018-04-17T18:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsac-2018-unveils-recipients-of-annual-awards/</loc>
		<lastmod>2018-04-17T18:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-panic/</loc>
		<lastmod>2018-04-17T19:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/why-cyber-security-is-critical-to-the-loyalty-of-your-most-valued-customers/</loc>
		<lastmod>2018-04-17T19:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/beware-of-watering-hole-attacks/</loc>
		<lastmod>2018-04-17T20:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dnswatch-blocking-popular-websites-a-recap-and-future-plans/</loc>
		<lastmod>2018-04-17T20:16:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/budget-for-encryption-increasing-over-time-reveals-survey/</loc>
		<lastmod>2018-04-17T20:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/defining-rpo-and-rto-in-the-age-of-cloud-computing/</loc>
		<lastmod>2018-04-17T20:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/malicious-activities-with-google-tag-manager/</loc>
		<lastmod>2018-04-17T20:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/from-my-gartner-blog-threat-simulation-open-source-projects/</loc>
		<lastmod>2018-04-17T20:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-shady-security-apps/</loc>
		<lastmod>2018-04-17T20:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-seasons-in-the-sun/</loc>
		<lastmod>2018-04-17T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/akamai-2018-spring-release-in-a-nutshell/</loc>
		<lastmod>2018-04-17T21:14:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/analyzing-oracle-security-critical-patch-update-for-april-2018/</loc>
		<lastmod>2018-04-17T22:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/day-2-recap-opening-keynote-womens-leadership-reception-and-more/</loc>
		<lastmod>2018-04-18T01:52:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-restful-api-delivers-flexibility-for-vormetric-application-encryption/</loc>
		<lastmod>2018-04-18T07:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/70-percent-of-energy-security-pros-fear-digital-attacks-could-produce-a-catastrophic-failure/</loc>
		<lastmod>2018-04-18T07:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ransomware-moving-into-business-critical-systems-employees-a-key-weakness-research-shows/</loc>
		<lastmod>2018-04-18T08:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/technology-for-gdpr-compliance-turning-plans-into-action/</loc>
		<lastmod>2018-04-18T10:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/weaknesses-in-hybrid-serverless-container-apps/</loc>
		<lastmod>2018-04-18T11:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gdpr-is-coming-so-what-now-for-whois-domain-registration-data/</loc>
		<lastmod>2018-04-18T11:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-6-maintenance-monitoring-and-analysis-of-audit-logs/</loc>
		<lastmod>2018-04-18T11:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/oblivious-dns/</loc>
		<lastmod>2018-04-18T11:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/access-your-saved-for-later-feedly-items-by-hooking-up-dropbox-to-feedly/</loc>
		<lastmod>2018-04-18T12:36:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/facebook-removes-120-cybercrime-groups-with-300000-members/</loc>
		<lastmod>2018-04-18T12:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/joscha-bach-ph-d-the-lebowski-theorem-of-machine-superintelligence/</loc>
		<lastmod>2018-04-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/customer-success-story-why-cap-com-chose-ca-veracode/</loc>
		<lastmod>2018-04-18T14:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/threat-stack-a-four-time-winner-in-2018-info-security-products-guides-global-excellence-awards/</loc>
		<lastmod>2018-04-18T14:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/stresspaint-malware-campaign-targeting-facebook-credentials/</loc>
		<lastmod>2018-04-18T15:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/pbot-a-python-based-adware/</loc>
		<lastmod>2018-04-18T15:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/alex-halderman-ph-d-i-hacked-an-election-so-can-the-russians/</loc>
		<lastmod>2018-04-18T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-sobering-look-at-fake-online-reviews/</loc>
		<lastmod>2018-04-18T16:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/examining-potus-executive-orders/</loc>
		<lastmod>2018-04-18T16:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/jolokia-vulnerabilities-rce-xss/</loc>
		<lastmod>2018-04-18T16:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-coleen-coolidges-decrease-your-stress-and-increase-your-reach-with-appsec-champions/</loc>
		<lastmod>2018-04-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-war-on-encryptions-first-casualty-russia-assaults-telegram-messaging-app/</loc>
		<lastmod>2018-04-18T19:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/from-baidu-to-googles-open-redirects/</loc>
		<lastmod>2018-04-18T20:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-rickrolling-anniversary/</loc>
		<lastmod>2018-04-18T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/day-3-recap-keynote-highlights-giving-it-the-old-college-trydont-forget-the-2018-bash/</loc>
		<lastmod>2018-04-19T02:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tripwirebookclub-attacking-network-protocols/</loc>
		<lastmod>2018-04-19T03:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-podcast-episode-75-cybersecurity-education-with-gotham-sharma-g0thamsharma-and-dr-brian-krupp-briankrupp/</loc>
		<lastmod>2018-04-19T04:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/alaskan-airline-hacker-sentenced-to-5-years-probation/</loc>
		<lastmod>2018-04-19T07:24:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/48-million-people-put-at-risk-after-firm-that-scraped-info-from-social-networks-left-it-exposed-for-anyone-to-download/</loc>
		<lastmod>2018-04-19T07:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/businesses-invest-heavily-toward-secure-by-design-gdpr-requirement/</loc>
		<lastmod>2018-04-19T08:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-5-secure-configurations-for-hardware-and-software-on-mobile-devices-laptops-workstations-and-servers/</loc>
		<lastmod>2018-04-19T11:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-report/</loc>
		<lastmod>2018-04-19T13:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/patch-your-cisco-webex-clients-now/</loc>
		<lastmod>2018-04-19T13:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/excel-pivot-table-data-leak-leads-to-120000-fine-for-london-council/</loc>
		<lastmod>2018-04-19T13:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/starbucks-moves-from-coffee-purveyor-to-surveillance-company/</loc>
		<lastmod>2018-04-19T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/5g-security-challenges-and-ways-to-overcome-them/</loc>
		<lastmod>2018-04-19T14:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-awareness-training-and-how-it-impacts-reported-suspicious-emails/</loc>
		<lastmod>2018-04-19T15:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/to-cyber-or-not-the-cyber-that-is-the-rsac-talk-analysis/</loc>
		<lastmod>2018-04-19T15:17:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-war-on-encryption-who-decides-what-private-really-means/</loc>
		<lastmod>2018-04-19T15:32:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qa-common-misconceptions-about-threat-hunting-and-compromise-assessments/</loc>
		<lastmod>2018-04-19T16:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/perspectives-on-russian-hacking/</loc>
		<lastmod>2018-04-19T17:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-kiran-shiralis-hunter-optimize-your-pentesters-time/</loc>
		<lastmod>2018-04-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/building-a-security-awareness-ambassador/</loc>
		<lastmod>2018-04-19T18:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/components-increasing-speed-and-risk/</loc>
		<lastmod>2018-04-19T18:05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/as-rsa-conference-convenes-tech-companies-promise-to-take-security-reins/</loc>
		<lastmod>2018-04-19T18:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-gdpr-and-its-benefits-to-your-organization/</loc>
		<lastmod>2018-04-19T18:58:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/bellevue-washington-based-localblox-leaves-48-million-users-scraped-data-fluttering-in-the-breeze/</loc>
		<lastmod>2018-04-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-big-banks-fight-online-fraud/</loc>
		<lastmod>2018-04-19T19:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/understanding-cryptojacking-why-it-matters-to-you-and-how-to-defend-against-it/</loc>
		<lastmod>2018-04-19T20:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/silo-vs-chrome-study-kind-of-eye-opening/</loc>
		<lastmod>2018-04-19T20:14:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-evangelism/</loc>
		<lastmod>2018-04-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/day-4-recap-keynote-highlights-rsac-college-day-2018-and-the-hugh-thompson-show-returning/</loc>
		<lastmod>2018-04-20T02:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-chaos-engineering/</loc>
		<lastmod>2018-04-20T02:36:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-look-inside-the-april-update-to-the-mitre-attck-framework/</loc>
		<lastmod>2018-04-20T03:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/machine-learning-is-also-a-tool-for-cybercriminals/</loc>
		<lastmod>2018-04-20T08:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/on-reviews-flexispy-com-flexispy-codigo-para-el-acceso-a-comprar/</loc>
		<lastmod>2018-04-20T09:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-look-at-the-2018-verizon-dbir-key-takeaways-and-industry-highlights/</loc>
		<lastmod>2018-04-20T11:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-elections/</loc>
		<lastmod>2018-04-20T11:44:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsac-panel-discussion-how-can-we-protect-our-digital-society/</loc>
		<lastmod>2018-04-20T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/maktub-ransomware-possibly-rebranded-as-iron/</loc>
		<lastmod>2018-04-20T12:31:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/free-report-incredible-research-reveals-cybercrimes-complex-economy/</loc>
		<lastmod>2018-04-20T12:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-facebooks-anti-abuse-system-broken/</loc>
		<lastmod>2018-04-20T12:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-it-a-phish-april-20-edition/</loc>
		<lastmod>2018-04-20T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/linkedin-fixes-major-bug-in-autofill-plugin/</loc>
		<lastmod>2018-04-20T13:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/4-tips-to-secure-your-online-gaming-account-and-prevent-it-from-getting-hacked/</loc>
		<lastmod>2018-04-20T13:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ios-the-trust-jacking-gambit/</loc>
		<lastmod>2018-04-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/online-trust-do-executives-consumers-and-security-pros-define-it-differently/</loc>
		<lastmod>2018-04-20T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/painless-odbc-dplyr-connections-to-amazon-athena-and-apache-drill-with-r-odbc/</loc>
		<lastmod>2018-04-20T15:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-ben-johnsons-seeing-through-the-fog-navigating-the-security-landscape-of-a-cloud-first-world/</loc>
		<lastmod>2018-04-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cloudflares-new-dns-service/</loc>
		<lastmod>2018-04-20T18:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-parent-teacher/</loc>
		<lastmod>2018-04-20T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/final-day-recap-wrapping-up-another-great-year/</loc>
		<lastmod>2018-04-20T23:04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/uk-id-theft-iwf-report-on-child-abuse-gold-galleon-bec/</loc>
		<lastmod>2018-04-21T13:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/miscellaneous-mobile-malfeasance/</loc>
		<lastmod>2018-04-21T13:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-secrets-mangler/</loc>
		<lastmod>2018-04-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/01/security-pros-need-know-machine-learning-year-ahead/</loc>
		<lastmod>2018-04-21T16:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Demand.jpg</image:loc>
			<image:title><![CDATA[Demand]]></image:title>
			<image:caption><![CDATA[SDP]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2017/11/insecurity-podcast-liz-wharton-on-the-perils-of-connected-tech-2/</loc>
		<lastmod>2018-04-21T16:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-john-studaruss-leveraging-cloud-sdns-to-solve-owasp-top-ten/</loc>
		<lastmod>2018-04-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/some-cisos-are-turning-the-security-skills-shortage-into-an-opportunity/</loc>
		<lastmod>2018-04-21T18:44:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/explosive-cyber-attacks-in-oil-and-gas-are-life-threatening/</loc>
		<lastmod>2018-04-21T18:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dilbert-dumb-question/</loc>
		<lastmod>2018-04-21T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/us-uk-issue-security-warning-and-tech-giants-join-forces-avast/</loc>
		<lastmod>2018-04-22T05:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-your-business-vulnerable-to-a-cyberattack-avast-business/</loc>
		<lastmod>2018-04-22T05:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/recent-findings-from-ccleaner-apt-investigation-reveal-that-attackers-entered-the-piriform-network-via-teamviewer-avast/</loc>
		<lastmod>2018-04-22T05:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-successfully-harness-ai-to-combat-fraud-and-abuse/</loc>
		<lastmod>2018-04-22T06:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/inhibiting-malicious-macros-by-blocking-risky-api-calls/</loc>
		<lastmod>2018-04-22T06:19:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/iot-radio-communication-attack/</loc>
		<lastmod>2018-04-22T06:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/establishing-unique-identity-and-security-for-cost-sensitive-embedded-products/</loc>
		<lastmod>2018-04-22T06:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/inspeckage-dynamic-assessment-tool-for-android/</loc>
		<lastmod>2018-04-22T07:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/maintaining-your-cisa-certification-renewal-requirements/</loc>
		<lastmod>2018-04-22T07:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cisa-certification-overview-and-career-path/</loc>
		<lastmod>2018-04-22T07:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/zlab-malware-analysis-report-ransomware-as-a-service-platforms/</loc>
		<lastmod>2018-04-22T07:03:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/infosec-institute-fortifies-organizations-against-business-email-compromise-with-new-bec-defense-suite-for-securityiq/</loc>
		<lastmod>2018-04-22T07:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tiredful-api-part-one/</loc>
		<lastmod>2018-04-22T07:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securityiq-release-blitz-social-media-mobile-device-training/</loc>
		<lastmod>2018-04-22T07:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-dod-information-assurance-ia-levels/</loc>
		<lastmod>2018-04-22T07:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-investigations-support-and-requirements/</loc>
		<lastmod>2018-04-22T07:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-perimeter-defenses/</loc>
		<lastmod>2018-04-22T07:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-secure-communication-channels/</loc>
		<lastmod>2018-04-22T07:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-ultimate-guide-to-ec-council-certifications/</loc>
		<lastmod>2018-04-22T07:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/osquery-tour/</loc>
		<lastmod>2018-04-22T07:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-security-pros-guide-to-comptia-certifications/</loc>
		<lastmod>2018-04-22T07:04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-create-bec-templates-in-securityiq/</loc>
		<lastmod>2018-04-22T07:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/its-not-only-whether-you-win-or-lose-its-how-you-use-and-protect-customer-data/</loc>
		<lastmod>2018-04-22T07:04:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/privacy-pundits-finally-get-their-day-in-the-sun/</loc>
		<lastmod>2018-04-22T07:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/your-data-is-only-as-secure-as-least-secure-link-in-your-supply-chain/</loc>
		<lastmod>2018-04-22T07:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/top-11-reasons-why-you-should-not-miss-the-sans-dfir-summit-and-training-this-year/</loc>
		<lastmod>2018-04-22T07:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/controlling-the-risks-of-cloud-enabled-end-point-security-products/</loc>
		<lastmod>2018-04-22T07:18:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/effective-threat-detection-and-incident-response/</loc>
		<lastmod>2018-04-22T07:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-ios-macos-security-issues/</loc>
		<lastmod>2018-04-22T07:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/virustotals-android-sandbox/</loc>
		<lastmod>2018-04-22T07:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-action-updates/</loc>
		<lastmod>2018-04-22T07:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/virus-bulletin-paper-on-app-collusion/</loc>
		<lastmod>2018-04-22T07:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/puresec-for-aws-lambda-is-now-in-beta/</loc>
		<lastmod>2018-04-22T07:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/quick-dive-into-containers-kubernetes-and-security/</loc>
		<lastmod>2018-04-22T07:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/threat-stack-launches-cloud-secops-program/</loc>
		<lastmod>2018-04-22T07:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/welcome-to-rsa-conference-usa-2018/</loc>
		<lastmod>2018-04-22T07:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-to-do-when-faced-with-large-scale-cyberattacks/</loc>
		<lastmod>2018-04-22T08:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/minecraft-players-exposed-to-malicious-code-in-modified-skins-avast/</loc>
		<lastmod>2018-04-22T08:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/take-the-cryptomining-challenge-at-rsa-avast/</loc>
		<lastmod>2018-04-22T08:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/get-rid-of-toolbars-adware-trials-and-bloatware-avast/</loc>
		<lastmod>2018-04-22T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/facebook-goes-to-washington-and-verizon-announces-1-threat-avast/</loc>
		<lastmod>2018-04-22T08:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/should-you-use-an-ad-blocker-avast/</loc>
		<lastmod>2018-04-22T08:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/best-practices-to-protect-data-devices-and-people-avast-business/</loc>
		<lastmod>2018-04-22T08:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/book-review-cracking-codes-with-python/</loc>
		<lastmod>2018-04-22T09:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-standoff-googles-project-zero-microsfts-unpatched-windows-10-bypass/</loc>
		<lastmod>2018-04-22T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/social-the-final-frontier/</loc>
		<lastmod>2018-04-22T14:56:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-annoyance-of-add-ons/</loc>
		<lastmod>2018-04-22T15:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-critical-need-for-threat-intelligence/</loc>
		<lastmod>2018-04-22T15:55:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-development-environment-security-controls/</loc>
		<lastmod>2018-04-22T16:07:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tiredful-api-part-two/</loc>
		<lastmod>2018-04-22T16:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-cutting-through-the-noise/</loc>
		<lastmod>2018-04-22T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/fortinet-and-ibm-working-together-to-address-todays-digital-transformation-challenges/</loc>
		<lastmod>2018-04-22T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/are-endpoints-integrated-into-your-network-security-strategy/</loc>
		<lastmod>2018-04-22T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/fortinet-delivers-the-industrys-first-integrated-noc-soc-solution/</loc>
		<lastmod>2018-04-22T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/searching-for-the-reuse-of-mirai-code-hide-n-seek-bot/</loc>
		<lastmod>2018-04-22T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cloud-based-malware-weather-forecast-for-financial-firms/</loc>
		<lastmod>2018-04-22T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/recent-healthcare-regulations-and-guidelines-providers-should-be-aware-of/</loc>
		<lastmod>2018-04-22T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/looking-back-to-look-ahead-cyber-threat-trends-to-watch/</loc>
		<lastmod>2018-04-22T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/microsoft-windows-jet-database-engine-heap-overflow-vulnerability/</loc>
		<lastmod>2018-04-22T17:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-cornucopia-of-flaws-the-lte-debacle/</loc>
		<lastmod>2018-04-22T17:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-christina-kubeckas-how-privacy-violations-fines-and-economic-sanctions-create-darker-opportunities/</loc>
		<lastmod>2018-04-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/april-patch-tuesday-63-microsoft-vulnerabilities-19-for-adobe/</loc>
		<lastmod>2018-04-22T21:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-address-opportunities-in-iso-27001-risk-management-using-iso-31000/</loc>
		<lastmod>2018-04-22T22:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/webinar-the-new-eh-net-advancing-your-infosec-career-with-rafal-los/</loc>
		<lastmod>2018-04-22T22:41:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hot-topics-at-rsa-2018-digital-transformation-projects-gdpr-and-protecting-your-business-critical-applications/</loc>
		<lastmod>2018-04-22T22:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/omg-the-stupid-it-burns/</loc>
		<lastmod>2018-04-22T23:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssd-advisory-terramaster-tos-unauthenticated-remote-command-execution/</loc>
		<lastmod>2018-04-23T00:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sap-security-notes-april-18-testing-assumptions/</loc>
		<lastmod>2018-04-23T00:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/robert-m-lee-jeff-hasss-little-bobby-he-knew-it/</loc>
		<lastmod>2018-04-23T00:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-weekly-blaze-androids-toxic-hellstew-of-vulnerabilities-facebooks-new-privacy-controls-russian-router-hacking/</loc>
		<lastmod>2018-04-23T04:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/blockchain-and-gdpr-between-a-block-and-a-hard-place/</loc>
		<lastmod>2018-04-23T04:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/fedramp-and-federal-cloud-security/</loc>
		<lastmod>2018-04-23T04:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/information-security-risks-gray-rhinos-and-black-swans/</loc>
		<lastmod>2018-04-23T06:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/highlights-from-rsa-conference-2018/</loc>
		<lastmod>2018-04-23T07:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/multi-factor-authentication-is-a-commodity-play-what-now/</loc>
		<lastmod>2018-04-23T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/financial-services-remains-hackers-most-targeted-industry-for-second-straight-year/</loc>
		<lastmod>2018-04-23T09:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/part-2-the-dark-side-of-apis/</loc>
		<lastmod>2018-04-23T11:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dont-give-money-to-the-chinese-consulate-ftc-says-in-scam-busting-report/</loc>
		<lastmod>2018-04-23T11:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-use-alerts-to-become-more-proactive-about-security/</loc>
		<lastmod>2018-04-23T13:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cybersecurity-silver-linings/</loc>
		<lastmod>2018-04-23T13:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/jelastic-shield-5-4-upgraded-cloud-protection-with-firewall-management-and-private-network-isolation/</loc>
		<lastmod>2018-04-24T14:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/who-is-a-data-protection-officer-under-the-gdpr/</loc>
		<lastmod>2018-04-23T13:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-justin-collins-taking-on-the-king-killing-injection-vulnerabilities/</loc>
		<lastmod>2018-04-23T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/current-forecast-cloudy-with-a-chance-of-exposed-data/</loc>
		<lastmod>2018-04-23T15:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/2018-casp-exam-changes/</loc>
		<lastmod>2018-04-23T15:48:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/interesting-doj-investigation-peering-into-mobile-telecom-carriers-esim-locking-attempts/</loc>
		<lastmod>2018-04-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/as-gdpr-deadline-looms-readiness-lags/</loc>
		<lastmod>2018-04-23T16:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-week-in-security-april-16-april-22/</loc>
		<lastmod>2018-04-23T17:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-arseny-reutovs-predicting-random-numbers-in-ethereum-smart-contracts/</loc>
		<lastmod>2018-04-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-most-important-thing-you-will-read-today-theodore-roosevelts-citizenship-in-a-republic-speech-1910/</loc>
		<lastmod>2018-04-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/why-legislators-are-eager-to-mandate-encryption-backdoors/</loc>
		<lastmod>2018-04-23T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-keep-sensitive-data-safe-from-business-email-compromise/</loc>
		<lastmod>2018-04-23T20:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-business-email-compromise-attacks-work-a-detailed-case-study/</loc>
		<lastmod>2018-04-23T20:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/5-business-email-compromise-attack-examples-we-can-learn-from/</loc>
		<lastmod>2018-04-23T20:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-trickbot-plugin-harvests-email-addresses-from-sql-servers-screenlocker-module-not-for-ransom/</loc>
		<lastmod>2018-04-23T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-clutter/</loc>
		<lastmod>2018-04-23T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/transcription-service-leaked-medical-records/</loc>
		<lastmod>2018-04-23T21:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/countdown-to-gdpr-7-data-protection-impact-assessment/</loc>
		<lastmod>2018-04-23T22:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-earn-cgeit-cpe-credits/</loc>
		<lastmod>2018-04-23T22:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cgeit-resources/</loc>
		<lastmod>2018-04-23T22:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cgeit-overview-of-domains/</loc>
		<lastmod>2018-04-23T23:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/semafone-to-showcase-cardprotect-secure-payment-solution-at-genesys-cx18-2/</loc>
		<lastmod>2018-04-24T02:16:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/a-patch-for-the-meltdown-patch-released-out-of-band-thursday-night/</loc>
		<lastmod>2018-04-24T03:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/encrypting-popular-client-emails-is-hard-work/</loc>
		<lastmod>2018-04-24T03:14:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/are-you-securing-cloud-storage-wrong/</loc>
		<lastmod>2018-04-24T03:14:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/global-data-protection-laws-japan/</loc>
		<lastmod>2018-04-24T03:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/global-data-protection-laws-south-korea/</loc>
		<lastmod>2018-04-24T03:15:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/more-vendors-mean-more-cyberattacks-protect-your-supply-chain/</loc>
		<lastmod>2018-04-24T03:15:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/preparing-for-industrial-cyberattacks-does-your-industry-have-a-plan/</loc>
		<lastmod>2018-04-24T03:15:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/global-data-protection-laws-the-philippines/</loc>
		<lastmod>2018-04-24T03:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/acunetix-heads-to-university-for-ksu-careers-week/</loc>
		<lastmod>2018-04-24T03:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/welcome-to-the-eh-net-relaunch/</loc>
		<lastmod>2018-04-24T03:28:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/hello-world-get-published-in-the-eh-net-community/</loc>
		<lastmod>2018-04-24T03:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-security-alerts-your-analysts-should-be-following/</loc>
		<lastmod>2018-04-24T03:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cipher-selected-as-a-top-global-managed-security-services-provider/</loc>
		<lastmod>2018-04-24T03:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/5-reasons-why-you-need-24x7-cyber-security-monitoring/</loc>
		<lastmod>2018-04-24T03:35:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/3-technical-controls-for-ongoing-gdpr-compliance/</loc>
		<lastmod>2018-04-24T03:35:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cipher-mentioned-as-a-strong-gdpr-service-provider-by-an-independent-global-research-firm/</loc>
		<lastmod>2018-04-24T03:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/managed-service-provider-msp-vs-managed-security-services-provider-mssp/</loc>
		<lastmod>2018-04-24T03:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/planning-responding-to-your-next-data-breach/</loc>
		<lastmod>2018-04-24T03:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/owasp-top-10-2017-ten-most-critical-web-application-security-risks/</loc>
		<lastmod>2018-04-24T03:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/quick-guide-security-as-a-service-secaas/</loc>
		<lastmod>2018-04-24T03:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/what-role-does-cybersecurity-play-in-your-physical-security/</loc>
		<lastmod>2018-04-24T03:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/could-data-regulations-actually-fuel-growth-and-innovation/</loc>
		<lastmod>2018-04-24T03:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/protegrity-prime-tearing-up-the-rules-for-data-protection-software/</loc>
		<lastmod>2018-04-24T03:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/ssd-advisory-western-digital-my-cloud-pro-series-pr2100-authenticated-rce/</loc>
		<lastmod>2018-04-24T03:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/overcoming-devops-implementation-challenges/</loc>
		<lastmod>2018-04-24T04:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/03/how-to-perform-background-checks-according-to-iso-27001-2/</loc>
		<lastmod>2018-04-24T04:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/windows-privilege-escalation-unquoted-services/</loc>
		<lastmod>2018-04-24T04:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/maintaining-your-cgeit-certification-renewal-requirements/</loc>
		<lastmod>2018-04-24T06:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/python-based-malware-uses-nsa-exploit-to-propagate-monero-xmr-miner/</loc>
		<lastmod>2018-04-24T07:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/oh-btw-the-russians-cyberattacked-the-u-s-critical-infrastructure/</loc>
		<lastmod>2018-04-24T10:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/your-ebusiness-and-cybersecurity-how-to-stay-safe/</loc>
		<lastmod>2018-04-24T10:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-exposure-meets-political-practicality/</loc>
		<lastmod>2018-04-24T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/secmon-state-of-the-union-revisiting-the-team-of-rivals/</loc>
		<lastmod>2018-04-24T12:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-2018-phishing-trends-intelligence-report-now-available/</loc>
		<lastmod>2018-04-24T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/wannacry-notpetya-mbr-oni-and-friends-tales-of-wiper-attacks-and-active-directory-destruction/</loc>
		<lastmod>2018-04-24T13:04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-queen-agrees/</loc>
		<lastmod>2018-04-24T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-cryptojacking-here-to-stay/</loc>
		<lastmod>2018-04-24T13:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsac-2018-the-leakage/</loc>
		<lastmod>2018-04-24T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/critical-actions-to-finalize-your-gdpr-compliance-program/</loc>
		<lastmod>2018-04-24T15:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/choosing-the-right-ddos-solution-part-iv-hybrid-protection/</loc>
		<lastmod>2018-04-24T15:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/securing-financial-data-of-the-future-behavioral-biometrics-explained/</loc>
		<lastmod>2018-04-24T16:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-guide-to-the-must-have-security-tools-for-gdpr-compliance/</loc>
		<lastmod>2018-04-24T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/emphasis-on-privacy-and-data-protection-at-dataworks-summit/</loc>
		<lastmod>2018-04-24T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-crossrider-variant-installs-configuration-profiles-on-macs/</loc>
		<lastmod>2018-04-24T17:16:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/steps-to-keep-your-site-clean-updates/</loc>
		<lastmod>2018-04-24T17:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-rahim-jina-eoin-kearys-edgeguard-client-side-dom-security-detecting-malice-an-open-framework/</loc>
		<lastmod>2018-04-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/zero-day-risks-and-the-return-of-hacking-team/</loc>
		<lastmod>2018-04-24T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-detection-curveball/</loc>
		<lastmod>2018-04-24T18:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-prevent-bec-with-security-awareness-training/</loc>
		<lastmod>2018-04-24T18:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/job-outlook-for-cisa-professionals/</loc>
		<lastmod>2018-04-24T19:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/certified-information-systems-auditor-cisa-exam-details-and-processes/</loc>
		<lastmod>2018-04-24T19:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mobile-security-getting-to-total-mobile-threat-protection/</loc>
		<lastmod>2018-04-24T20:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-support-group-for-writers-of-end-user-licensing-agreements/</loc>
		<lastmod>2018-04-24T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-business-continuity-planning-and-exercises/</loc>
		<lastmod>2018-04-24T21:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-incident-management/</loc>
		<lastmod>2018-04-24T22:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/avast-at-rsa-what-an-amazing-week-avast/</loc>
		<lastmod>2018-04-24T23:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/need-a-scalable-security-solution-for-your-hardware-security-modules-hsm/</loc>
		<lastmod>2018-04-24T23:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/recommendations-for-tls-ssl-cipher-hardening/</loc>
		<lastmod>2018-04-25T01:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/acunetix-included-in-sans-institute-course-sec460/</loc>
		<lastmod>2018-04-25T01:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/shiftleft-wins-2018-gartner-cool-vendor-for-devops/</loc>
		<lastmod>2018-04-25T04:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cyber-scorecarding-services/</loc>
		<lastmod>2018-04-25T07:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gdpr-its-the-final-countdown/</loc>
		<lastmod>2018-04-25T08:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sonification-of-ddos-attacks-netflow-melodies-and-a-tomato-panic-button/</loc>
		<lastmod>2018-04-25T08:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gandcrab-2-1-ransomware-on-the-rise-with-new-spam-campaign/</loc>
		<lastmod>2018-04-25T08:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssd-advisory-trustport-management-unauthenticated-remote-code-execution/</loc>
		<lastmod>2018-04-25T08:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/yahoo-gets-35-million-slap-on-wrist-for-failing-to-disclose-colossal-2014-data-breach/</loc>
		<lastmod>2018-04-25T13:07:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-private-data-can-be-stolen-with-a-css-injection/</loc>
		<lastmod>2018-04-25T13:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-and-why-retailers-should-protect-customer-data/</loc>
		<lastmod>2018-04-25T13:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/reconnaissance-worm/</loc>
		<lastmod>2018-04-25T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/executive-insights-talking-security-and-threat-protection-for-connected-cars/</loc>
		<lastmod>2018-04-25T14:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/researchers-use-machine-learning-cybersecurity-practices-to-secure-us-power-grid/</loc>
		<lastmod>2018-04-25T14:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/maintaining-your-data-centers-agility-and-making-the-most-out-of-your-investment-in-adc-capacity/</loc>
		<lastmod>2018-04-25T14:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/website-down-ddos-for-hire-site-webstresser-shut-by-crime-agencies/</loc>
		<lastmod>2018-04-25T14:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/sorry-for-the-inconvenience/</loc>
		<lastmod>2018-04-25T15:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-comprehensive-guide-to-pci-dss-merchant-levels-2/</loc>
		<lastmod>2018-04-25T16:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/far-cry-5-download-offers-embrace-the-power-of-no/</loc>
		<lastmod>2018-04-25T16:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/privacy-breach-exposes-1200-school-employees-partial-social-security-numbers/</loc>
		<lastmod>2018-04-25T17:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ddos-for-hire-service-webstresser-dismantled/</loc>
		<lastmod>2018-04-25T17:41:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-sigstr-built-customer-trust-with-threat-stack-and-aws-security-webinar-recap/</loc>
		<lastmod>2018-04-25T17:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-survey-should-governments-regulate-social-media-data-collection/</loc>
		<lastmod>2018-04-25T17:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-magen-wus-costs-of-coding-to-compliance/</loc>
		<lastmod>2018-04-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/acs-centers-michael-figueroa-discusses-the-technical-disconnect-in-election-security/</loc>
		<lastmod>2018-04-25T18:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-protect-your-android-device-from-a-ransomware-attack-avast/</loc>
		<lastmod>2018-04-25T18:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-ultimate-guide-to-isaca-certifications/</loc>
		<lastmod>2018-04-25T18:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/who-is-doing-what-on-your-network/</loc>
		<lastmod>2018-04-25T19:55:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/no-ray-ozzie-hasnt-solved-crypto-backdoors/</loc>
		<lastmod>2018-04-25T20:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-misinterpretation/</loc>
		<lastmod>2018-04-25T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/evil-maids-and-apple-debugs/</loc>
		<lastmod>2018-04-25T21:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-technical-financial-solutions-helps-clients-stay-hipaa-compliant-with-securityiq/</loc>
		<lastmod>2018-04-25T21:04:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/browser-security-pwned-and-exposed/</loc>
		<lastmod>2018-04-25T22:05:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/use-of-various-windows-utilities-to-manage-ics-processes/</loc>
		<lastmod>2018-04-25T23:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/certified-information-system-auditor-cisa-domains-overview-exam-material/</loc>
		<lastmod>2018-04-25T23:40:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-buzzword-bingo/</loc>
		<lastmod>2018-04-26T00:16:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/women-in-information-security-evie-andrew/</loc>
		<lastmod>2018-04-26T04:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/medical-device-security-standards/</loc>
		<lastmod>2018-04-26T04:16:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cve-2017-8570-and-cve-2018-0802-exploits-being-used-to-spread-lokibot/</loc>
		<lastmod>2018-04-26T06:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/delta-sears-customer-data-breach-exposes-risks-of-third-party-providers-once-again/</loc>
		<lastmod>2018-04-26T08:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/younger-than-16-no-more-whatsapp-for-you-in-europe/</loc>
		<lastmod>2018-04-26T08:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-secure-and-audit-an-amazon-web-services-three-tier-web-architecture/</loc>
		<lastmod>2018-04-26T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-address-ongoing-gdpr-requirements/</loc>
		<lastmod>2018-04-26T12:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/researchers-reveal-how-hotel-key-cards-can-be-hacked-what-you-need-to-know/</loc>
		<lastmod>2018-04-26T12:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-gmail-confidential-mode-lets-businesses-set-expiration-dates-for-emails/</loc>
		<lastmod>2018-04-26T12:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-critical-security-controls-control-4-controlled-use-of-administrative-privileges/</loc>
		<lastmod>2018-04-26T12:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/dynamic-code-execution/</loc>
		<lastmod>2018-04-26T12:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-round-up-a-busy-week-of-sharing-security-best-practices/</loc>
		<lastmod>2018-04-26T12:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/new-self-destruct-feature-lets-gmail-users-set-expiry-date-on-emails/</loc>
		<lastmod>2018-04-26T12:56:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/icann-still-working-on-interim-compliance-model-for-gdpr/</loc>
		<lastmod>2018-04-26T13:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/provide-customers-with-advanced-threat-defense-against-email-based-attacks/</loc>
		<lastmod>2018-04-26T14:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/pti-2018-the-rising-risk-for-saas/</loc>
		<lastmod>2018-04-26T14:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cissp-exam-changes/</loc>
		<lastmod>2018-04-26T15:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/crowdfence-bug-and-exploit-mercantile/</loc>
		<lastmod>2018-04-26T15:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/smart-homes-of-tomorrow-connect-all-the-things/</loc>
		<lastmod>2018-04-26T16:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qa-part-ii-common-misconceptions-about-threat-hunting-and-the-impact-of-moving-to-the-cloud/</loc>
		<lastmod>2018-04-26T16:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-internet-of-everything-and-digital-privacy-what-you-need-to-know/</loc>
		<lastmod>2018-04-26T16:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/bringing-it-all-together-nys-dfs-swift-sec-and-gdpr/</loc>
		<lastmod>2018-04-26T17:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hr-and-phishing/</loc>
		<lastmod>2018-04-26T17:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-robert-woods-applied-deception-beyond-the-honeypot-moving-past-101/</loc>
		<lastmod>2018-04-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/analysis-of-a-malicious-blackhat-seo-script/</loc>
		<lastmod>2018-04-26T18:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-2018-not-as-messy-as-before/</loc>
		<lastmod>2018-04-26T18:40:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/whats-new-with-prolexic/</loc>
		<lastmod>2018-04-26T18:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/actionable-threat-intelligence-tailored-to-you/</loc>
		<lastmod>2018-04-26T18:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/introducing-web-security-analytics/</loc>
		<lastmod>2018-04-26T18:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/keeping-your-waf-relevant-emergency-feed-pushes-new-mitigations-in-just-hours/</loc>
		<lastmod>2018-04-26T19:01:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/learn-to-secure-network-equipment-against-attacks-and-malware-at-may-16-trusted-computing-group-tcg-webcast-with-cisco-systems-inc-huawei-and-infineon/</loc>
		<lastmod>2018-04-26T19:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/3-security-best-practices-we-used-to-build-a-strong-foundation-at-threat-stack/</loc>
		<lastmod>2018-04-26T19:15:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/tips-for-optimizing-your-mobile-hotspot/</loc>
		<lastmod>2018-04-26T20:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/drupalgeddon3-third-critical-flaw-discovered/</loc>
		<lastmod>2018-04-26T20:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/rsa-app-exposes-user-data-due-to-common-developer-mistake/</loc>
		<lastmod>2018-04-26T20:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-brief-evolution-of-web-apps/</loc>
		<lastmod>2018-04-26T20:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/xkcd-meteorologist/</loc>
		<lastmod>2018-04-26T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/globetrotting-with-a-vpn-avast/</loc>
		<lastmod>2018-04-26T21:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/enterprise-it-solutions-company-ramps-up-managed-services-business-using-managed-workplace/</loc>
		<lastmod>2018-04-27T00:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/why-we-believe-georgias-s-b-315-bill-will-increase-cybersecurity-risk/</loc>
		<lastmod>2018-04-27T04:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/insider-threats-remain-1-security-headache-for-organizations-research-shows/</loc>
		<lastmod>2018-04-27T09:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/critical-drupal-vulnerability-now-being-exploited-in-the-wild-users-urged-to-patch-asap/</loc>
		<lastmod>2018-04-27T09:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/reports-of-tech-support-scams-rocket-earning-handsome-returns-for-fraudsters/</loc>
		<lastmod>2018-04-27T11:20:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/canadian-government-unveils-new-data-breach-regulations/</loc>
		<lastmod>2018-04-27T11:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/quote-of-the-day-mark-twain/</loc>
		<lastmod>2018-04-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/april-vulnerability-of-the-month-password-free-for-all-via-samba-active-directory-domain-controller-vulnerability/</loc>
		<lastmod>2018-04-27T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/is-it-a-phish-friday-april-27-2018/</loc>
		<lastmod>2018-04-27T12:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/detection-only-solutions-arent-enough-for-todays-security-teams/</loc>
		<lastmod>2018-04-27T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/amazon-hacked-for-ethereum-heist-and-new-security-laws-affect-uk-avast/</loc>
		<lastmod>2018-04-27T13:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-grayshift-predicament/</loc>
		<lastmod>2018-04-27T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/flawed-routers-with-hardcoded-passwords-were-manufactured-by-firm-that-posed-national-security-risk-to-uk/</loc>
		<lastmod>2018-04-27T14:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/malwarebytes-crackme-2-try-another-challenge/</loc>
		<lastmod>2018-04-27T15:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gmails-redesign-provides-a-good-reminder-check-your-backup-and-restore-plan/</loc>
		<lastmod>2018-04-27T16:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ios-update-11-3-1-security-details/</loc>
		<lastmod>2018-04-27T16:19:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/closer-look-at-cybersecurity-skills-gap-clarifies-priorities-for-enterprises-in-asia-pacific/</loc>
		<lastmod>2018-04-27T16:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/from-new-insights-and-best-practices-to-networking-and-recruitment-rsa-conference-2018-had-it-all/</loc>
		<lastmod>2018-04-27T16:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/please-dont-buy-this-smart-toys/</loc>
		<lastmod>2018-04-27T16:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-trade-offs-in-the-new-eu-privacy-law/</loc>
		<lastmod>2018-04-27T17:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-brook-schoenfields-lessons-from-the-threat-modeling-trenches/</loc>
		<lastmod>2018-04-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-and-privacy-awareness-in-the-age-of-facebook/</loc>
		<lastmod>2018-04-27T18:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/why-are-you-still-using-ie-double-kill-is-just-the-latest-issue/</loc>
		<lastmod>2018-04-27T19:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-joy-of-tech-what-does-the-internet-smell-like/</loc>
		<lastmod>2018-04-27T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/6-days-lab-1-1-ctf-walkthrough/</loc>
		<lastmod>2018-04-27T21:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/mypublicwifi-a-windows-utility-to-manage-ics/</loc>
		<lastmod>2018-04-27T22:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/configuration-of-anti-virus-and-anti-malware-software-within-an-ics-environment/</loc>
		<lastmod>2018-04-27T23:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qotd-john-boyd/</loc>
		<lastmod>2018-04-28T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/def-con-groups-9723-irena-damsky-omri-moyals-stories-from-the-dark-side-of-managing-a-security-research-department-in-a-start-up/</loc>
		<lastmod>2018-04-28T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-vinayendra-natarajas-repronow-save-time-reproducing-and-triaging-security-bugs/</loc>
		<lastmod>2018-04-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-oatmeal-junk-mail/</loc>
		<lastmod>2018-04-28T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ransomnix-ransomware-variant-encrypts-websites/</loc>
		<lastmod>2018-04-28T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ca-veracode-recognized-for-world-class-channel-program-and-channel-chief-for-second-consecutive-year/</loc>
		<lastmod>2018-04-28T23:55:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qotd-theodore-roosevelt/</loc>
		<lastmod>2018-04-29T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-important-data-privacy-questions-you-should-be-asking-now/</loc>
		<lastmod>2018-04-29T12:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hidden-cobra-the-korean-dance-of-peace/</loc>
		<lastmod>2018-04-29T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-ty-shipmans-security-after-death-not-your-problem-or-is-it/</loc>
		<lastmod>2018-04-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/robert-m-lee-jeff-hasss-little-bobby-security-magic/</loc>
		<lastmod>2018-04-29T23:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-shared-security-weekly-blaze-child-identity-fraud-tech-support-scams-amazon-key-in-car-delivery/</loc>
		<lastmod>2018-04-30T04:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-controls-the-key-to-ensuring-security-in-the-cloud/</loc>
		<lastmod>2018-04-30T04:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/risk-assessment-and-identifying-vulnerabilities-in-your-pki-management/</loc>
		<lastmod>2018-04-30T04:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/most-organizations-lack-systems-and-processes-to-ensure-gdpr-compliance-survey-shows/</loc>
		<lastmod>2018-04-30T08:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/are-you-ready-for-gdpr-compliance-many-organizations-are-not/</loc>
		<lastmod>2018-04-30T08:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/security-vulnerabilities-in-vingcard-electronic-locks/</loc>
		<lastmod>2018-04-30T11:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/lending-website-cites-gdpr-concerns-as-reason-why-it-shut-down/</loc>
		<lastmod>2018-04-30T11:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/qotd-nikki-haley/</loc>
		<lastmod>2018-04-30T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/gdpr-its-not-just-for-europe-protection-of-data-at-the-world-cup-in-russia-tokyo-olympics-and-beyond-2/</loc>
		<lastmod>2018-04-30T13:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/uber-updates-bug-bounty-program-adds-bonus-for-proof-of-concept-poc/</loc>
		<lastmod>2018-04-30T13:20:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ssd-advisory-linux-af_llc-double-free/</loc>
		<lastmod>2018-04-30T13:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-dark-web-goes-social/</loc>
		<lastmod>2018-04-30T13:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ray-ozzie-points-his-magic-wand-at-mobile-encryption/</loc>
		<lastmod>2018-04-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/what-the-ca-veracode-verified-standard-tier-looks-like/</loc>
		<lastmod>2018-04-30T14:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/online-poker-site-bombarded-by-ddos-attacks-pauses-tournaments/</loc>
		<lastmod>2018-04-30T14:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/a-week-in-security-april-23-april-29/</loc>
		<lastmod>2018-04-30T15:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-steal-windows-login-credentials-abusing-the-server-message-block-smb-protocol/</loc>
		<lastmod>2018-04-30T15:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/android-penetration-tools-walkthrough-series-androguard/</loc>
		<lastmod>2018-04-30T15:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/infographic-reining-in-software-component-risk/</loc>
		<lastmod>2018-04-30T16:48:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/business-email-compromise-bec-how-to-avoid-ceo-fraud/</loc>
		<lastmod>2018-04-30T16:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/three-unique-things-about-devopsdays-austin-2018/</loc>
		<lastmod>2018-04-30T17:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/ransomware-attack-a-cautionary-example-from-one-small-business-avast-business/</loc>
		<lastmod>2018-04-30T17:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-the-general-data-protection-regulation-will-specifically-affect-healthcare/</loc>
		<lastmod>2018-04-30T17:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/20-cis-controls-control-3-continuous-vulnerability-management/</loc>
		<lastmod>2018-04-30T17:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-private-is-cryptocurrency-it-depends/</loc>
		<lastmod>2018-04-30T17:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/owasp-appsec-cali-2018-corey-whites-prevention-as-a-business-strategy/</loc>
		<lastmod>2018-04-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cgeit-domain-3-benefits-realization/</loc>
		<lastmod>2018-04-30T18:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/cgeit-domain-2-strategic-management/</loc>
		<lastmod>2018-04-30T18:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/spartacus-ransomware-introduction-to-a-strain-of-unsophisticated-malware/</loc>
		<lastmod>2018-04-30T18:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/phone-the-sender-best-or-worst-new-security-practice/</loc>
		<lastmod>2018-04-30T18:31:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/top-exploit-kit-activity-roundup-spring-2018/</loc>
		<lastmod>2018-04-30T18:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/the-catch-22-of-base64-attacker-dilemma-from-a-defender-point-of-view/</loc>
		<lastmod>2018-04-30T20:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/hackers-have-gone-automated-so-should-your-cybersecurity-defense/</loc>
		<lastmod>2018-04-30T20:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/office-365-admins-how-to-use-powershell-with-spanning-backups-public-rest-api/</loc>
		<lastmod>2018-04-30T22:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/women-in-information-security-jen-fox/</loc>
		<lastmod>2018-05-01T03:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/semafone-announces-recertification-for-internationally-recognized-iso-270012013-standard/</loc>
		<lastmod>2018-05-01T06:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/wannacry-notpetya-ransomware-attacks-one-year-later/</loc>
		<lastmod>2018-05-01T07:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/semafone-announces-recertification-for-internationally-recognised-iso-270012013-standard/</loc>
		<lastmod>2018-05-01T07:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/seven-winning-devsecops-metrics-security-should-track/</loc>
		<lastmod>2018-05-01T07:52:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/swift-cyber-attackers-strike-again-organizations-must-turn-to-the-software-defined-perimeter/</loc>
		<lastmod>2018-05-01T08:04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/sd-wan-and-cloud-wonder-twin-powers-activate/</loc>
		<lastmod>2018-05-01T10:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/20-cis-controls-control-2-inventory-and-control-of-software-assets/</loc>
		<lastmod>2018-05-01T10:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/devcentrals-featured-member-for-may-jai-kumar/</loc>
		<lastmod>2018-05-01T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/iot-inspector-tool-from-princeton/</loc>
		<lastmod>2018-05-01T11:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-bernard-haisch/</loc>
		<lastmod>2018-05-01T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/massachusetts-school-district-pays-10k-to-ransomware-attackers/</loc>
		<lastmod>2018-05-01T12:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fake-telegeram-on-google-play/</loc>
		<lastmod>2018-05-01T12:15:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/credential-phishing-the-shift-to-enterprise/</loc>
		<lastmod>2018-05-01T13:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/three-person-it-company-untaps-secret-to-securing-smbs-using-cloudcare-avast/</loc>
		<lastmod>2018-05-01T13:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-security-risks-presented-by-complex-networks/</loc>
		<lastmod>2018-05-01T13:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-best-strategy-for-cyber-conflict-may-not-be-a-cyber-strategy/</loc>
		<lastmod>2018-05-01T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/mobile-security-enterprise-data-via-mobile-is-the-next-frontier-for-cyber-criminals/</loc>
		<lastmod>2018-05-01T14:15:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-threat-landscape-gives-birth-to-new-way-of-handling-cyber-security/</loc>
		<lastmod>2018-05-01T14:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/building-for-the-next-generation-of-application-security/</loc>
		<lastmod>2018-05-01T15:21:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-increasing-the-amount-of-data-can-help-us-overcome-information-overflow-and-score-fatigue/</loc>
		<lastmod>2018-05-01T16:04:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/critical-oracle-weblogic-server-flaw-still-not-patched/</loc>
		<lastmod>2018-05-01T16:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/451-research-spotlights-ciphers-managed-security-services-portfolio/</loc>
		<lastmod>2018-05-01T16:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cooperation-between-humans-and-artificial-intelligence-in-the-name-of-security/</loc>
		<lastmod>2018-05-01T16:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/exploiting-nfs-share/</loc>
		<lastmod>2018-05-01T16:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-pocs-fail-and-why-you-must-poc-anyway/</loc>
		<lastmod>2018-05-01T16:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/samsam-ransomware-what-you-need-to-know/</loc>
		<lastmod>2018-05-01T17:16:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/wi-fi-iot-and-byod-securing-complex-environments/</loc>
		<lastmod>2018-05-01T17:40:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/owasp-appsec-cali-2018-cory-doctorows-closing-keynote-a-free-fair-and-open-internet-is-a-process-not-a-product/</loc>
		<lastmod>2018-05-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/why-the-rise-of-enterprise-iot-puts-machine-identities-to-the-test/</loc>
		<lastmod>2018-05-01T18:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/new-phishsim-auto-reports-dashboard-cryptocurrency-phishing-templates/</loc>
		<lastmod>2018-05-01T18:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/monthly-blog-round-up-april-2018/</loc>
		<lastmod>2018-05-01T18:11:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/aqua-security-announces-industrys-first-container-runtime-security-solution-for-cri-o/</loc>
		<lastmod>2018-05-07T13:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-facebook-data-breach-scandal-explained/</loc>
		<lastmod>2018-05-01T20:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-python-environment/</loc>
		<lastmod>2018-05-01T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-criminals-can-exploit-ai/</loc>
		<lastmod>2018-05-01T21:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/pci-for-smb-requirement-3-4-secure-cardholder-data/</loc>
		<lastmod>2018-05-01T22:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/london-police-launch-new-cybersecurity-initiative-for-local-businesses/</loc>
		<lastmod>2018-05-01T22:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/integrity-management-what-it-is-and-how-it-can-protect-your-data/</loc>
		<lastmod>2018-05-02T03:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/msps-must-prepare-for-new-cyber-attacks/</loc>
		<lastmod>2018-05-02T08:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tenable-research-advisory-critical-schneider-electric-indusoft-web-studio-and-intouch-machine-edition-vulnerability/</loc>
		<lastmod>2018-05-02T09:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/unspecified-github-bug-internally-exposes-passwords-in-plaintext/</loc>
		<lastmod>2018-05-02T10:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/20-critical-security-controls-control-1-inventory-and-control-of-hardware-assets/</loc>
		<lastmod>2018-05-02T10:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/man-pleads-guilty-to-sicking-army-of-spambots-on-twitch/</loc>
		<lastmod>2018-05-02T11:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-james-mattis-united-states-secretary-of-defense/</loc>
		<lastmod>2018-05-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/after-failing-to-jailbreak-friend-washtenaw-county-hacker-gets-seven-years-in-prison/</loc>
		<lastmod>2018-05-02T12:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/researchers-find-bad-bots-designed-for-account-takeover-on-100-of-websites-with-login-pages/</loc>
		<lastmod>2018-05-02T13:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bgp-management-snafu-culprit-in-amazon-attack/</loc>
		<lastmod>2018-05-02T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-make-your-demo-environment-easy-accessible-and-secure/</loc>
		<lastmod>2018-05-02T14:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/high-performance-visibility-into-ssl-tls-traffic/</loc>
		<lastmod>2018-05-02T14:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/untangle-takes-gold-bronze-stevies-in-2018-american-business-awards/</loc>
		<lastmod>2018-05-02T15:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-tips-for-managing-security-for-apis/</loc>
		<lastmod>2018-05-02T15:15:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/video-top-5-tips-on-application-security-policies/</loc>
		<lastmod>2018-05-02T16:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/join-fortinet-and-other-industry-experts-at-the-2018-internet2-global-summit/</loc>
		<lastmod>2018-05-03T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/blockchain-powered-e-commerce-startup-leaks-personal-information-of-25000-early-investors/</loc>
		<lastmod>2018-05-02T16:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/addressing-the-availability-of-the-acaengine/</loc>
		<lastmod>2018-05-02T16:53:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/configuring-imperva-securesphere-for-gdpr-compliance-part-one/</loc>
		<lastmod>2018-05-02T17:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/owasp-appsec-cali-2018-christian-dameff-m-d-s-closing-keynote-digital-disease-how-healthcare-cybersecurity-challenges/</loc>
		<lastmod>2018-05-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/4-misconceptions-about-pki-that-deserve-to-be-debunked/</loc>
		<lastmod>2018-05-02T18:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/when-your-employees-post-passwords-online/</loc>
		<lastmod>2018-05-02T19:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-the-future-we-expected/</loc>
		<lastmod>2018-05-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cyber-security-roundup-for-april-2018/</loc>
		<lastmod>2018-05-03T00:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tomorrow-is-world-password-day-avast/</loc>
		<lastmod>2018-05-03T01:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/study-devops-servers-in-the-wild-highlight-infrastructure-security-needs/</loc>
		<lastmod>2018-05-03T03:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/dispelling-the-myth-how-to-optimize-your-company-for-both-cyber-security-and-productivity/</loc>
		<lastmod>2018-05-03T03:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-importance-of-innovation-in-network-monitoring/</loc>
		<lastmod>2018-05-03T04:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/database-encryption-key-management/</loc>
		<lastmod>2018-05-03T07:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/yet-another-crypto-mining-botnet/</loc>
		<lastmod>2018-05-03T07:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/think-automation-and-ai-will-help-close-your-cybersecurity-skills-gap/</loc>
		<lastmod>2018-05-03T08:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-you-get-there-matters-middle-mile-visibility-to-drive-cdn-strategy/</loc>
		<lastmod>2018-05-03T09:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/state-machine-testing-with-echidna/</loc>
		<lastmod>2018-05-03T10:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/phishers-leveraging-gdpr-themed-scam-emails-to-steal-users-information/</loc>
		<lastmod>2018-05-03T11:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-fbis-10-most-wanted-black-hat-hackers-7-and-6/</loc>
		<lastmod>2018-05-03T11:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/59-of-people-use-the-same-password-everywhere-poll-finds/</loc>
		<lastmod>2018-05-03T11:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-henry-ward-beecher/</loc>
		<lastmod>2018-05-03T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/secbi-to-support-orange-polska-in-augmenting-its-managed-cyber-services/</loc>
		<lastmod>2018-05-03T12:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cloudpassage-debuts-project-cielo/</loc>
		<lastmod>2018-05-03T12:05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/critical-vulnerability-in-docker-tool-for-windows-allows-rce-patch-available/</loc>
		<lastmod>2018-05-03T12:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/phishing-in-the-wild-a-new-threat-research-paper/</loc>
		<lastmod>2018-05-03T13:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/zero-trust-and-the-identity/</loc>
		<lastmod>2018-05-03T13:23:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/alls-not-quiet-on-the-scada-front/</loc>
		<lastmod>2018-05-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/world-password-day-keeps-coming-and-going-but-password-reuse-sticks-around/</loc>
		<lastmod>2018-05-03T14:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/global-server-load-balancing-gslb-use-cases/</loc>
		<lastmod>2018-05-03T14:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/protonmail-warns-all-users-to-beware-of-phishing-scam/</loc>
		<lastmod>2018-05-03T14:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/6-steps-to-quickly-defang-reported-phishing-emails/</loc>
		<lastmod>2018-05-03T14:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/kitty-malware-gets-its-claws-into-drupal-websites-to-mine-monero/</loc>
		<lastmod>2018-05-03T15:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/follow-5-simple-tips-to-make-the-most-of-world-password-day-avast-business/</loc>
		<lastmod>2018-05-03T15:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/tough-test-for-email-security-services/</loc>
		<lastmod>2018-05-03T15:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/google-chrome-now-requires-ct-logging-for-all-tls-certificates/</loc>
		<lastmod>2018-05-03T16:39:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cross-border-data-flows-in-asia-the-state-of-play/</loc>
		<lastmod>2018-05-03T16:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-trace-an-email-message/</loc>
		<lastmod>2018-05-03T16:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-at-rsa-2018/</loc>
		<lastmod>2018-05-03T16:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/what-happens-when-you-sacrifice-security-for-speed-and-common-ways-security-gets-sacrificed/</loc>
		<lastmod>2018-05-03T17:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-prevent-bec-with-email-security-features/</loc>
		<lastmod>2018-05-03T17:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-prevent-bec-with-vendor-payment-integration/</loc>
		<lastmod>2018-05-03T17:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/4-ways-to-integrate-bec-prevention-strategies-into-your-organization/</loc>
		<lastmod>2018-05-03T17:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/infographic-cryptomining-madness-explained/</loc>
		<lastmod>2018-05-03T17:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-ernest-wongs-to-ai-or-not-to-ai-what-the-us-military-needs-for-fighting-cyber-wars/</loc>
		<lastmod>2018-05-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/a-puzzling-backdoor-upload/</loc>
		<lastmod>2018-05-03T18:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/internet-shortcut-used-in-necurs-malspam-campaign/</loc>
		<lastmod>2018-05-03T18:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/89-of-top-travel-websites-fail-to-protect-your-security/</loc>
		<lastmod>2018-05-03T18:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/every-business-needs-a-vulnerability-disclosure-policy-every-single-business/</loc>
		<lastmod>2018-05-03T20:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/xkcd-containers/</loc>
		<lastmod>2018-05-03T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/hoodwinked-why-our-eyes-wont-protect-us-against-phishing-and-fake-websites/</loc>
		<lastmod>2018-05-03T21:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/social-engineering-why-hack-it-when-people-are-just-giving-away-their-information/</loc>
		<lastmod>2018-05-03T21:39:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/fortinet-federal-holds-first-federal-partner-forum/</loc>
		<lastmod>2018-05-03T21:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/advice-for-new-cisos-how-to-get-a-head-start-on-information-security-governance/</loc>
		<lastmod>2018-05-03T22:10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/twitter-to-all-users-change-your-password-now/</loc>
		<lastmod>2018-05-03T22:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/seventeen-minutes-from-tweet-to-package/</loc>
		<lastmod>2018-05-04T02:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/all-banks-can-leverage-psd2-insights/</loc>
		<lastmod>2018-05-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/gandcrab-v3-accidentally-locks-systems-with-new-change-wallpaper-feature/</loc>
		<lastmod>2018-05-04T08:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/twitter-plain-text-password-bug-prompts-users-for-immediate-password-change/</loc>
		<lastmod>2018-05-04T08:35:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/half-of-cisos-admit-being-breached-business-interruptions-the-main-concern/</loc>
		<lastmod>2018-05-04T09:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/anti-theft-lojack-supposedly-manipulated-by-russian-hackers-to-hijack-computers/</loc>
		<lastmod>2018-05-04T11:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/twitter-asks-users-to-change-passwords-after-finding-internal-log-bug/</loc>
		<lastmod>2018-05-04T11:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/qotd-george-carlin/</loc>
		<lastmod>2018-05-04T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/australias-largest-bank-lost-its-customers-financial-history-and-forgot-to-mention-it/</loc>
		<lastmod>2018-05-04T12:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/is-it-a-phish-may-the-fourth-be-with-you-edition/</loc>
		<lastmod>2018-05-04T12:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cisco-rolls-out-new-wave-of-must-install-webex-patches/</loc>
		<lastmod>2018-05-04T12:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/cambridge-analytica-shuts-down-and-ransomware-victims-pay-up-avast/</loc>
		<lastmod>2018-05-04T13:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/russia-flogging-zero-day-exploits/</loc>
		<lastmod>2018-05-04T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/botception-with-necurs-botnet-distributes-script-with-bot-capabilities-avast-threat-labs/</loc>
		<lastmod>2018-05-04T14:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/5-tips-to-help-manage-enterprise-security-and-compliance/</loc>
		<lastmod>2018-05-04T14:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/shodan-and-iot-the-problem-is-here/</loc>
		<lastmod>2018-05-04T15:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/state-level-cybersecurity-is-hard-to-fix/</loc>
		<lastmod>2018-05-04T16:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/how-to-protect-yourself-from-gdpr-related-phishing-scams/</loc>
		<lastmod>2018-05-04T16:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-security-profession-needs-to-adopt-just-culture/</loc>
		<lastmod>2018-05-04T17:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/engaging-students-in-cybersecurity-a-primer-for-educators/</loc>
		<lastmod>2018-05-04T17:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/bsidescharm-2018-mark-staceys-preparing-for-incident-handling-and-response-within-industrial-control-networks/</loc>
		<lastmod>2018-05-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/twitter-security-snafu-change-your-passwords/</loc>
		<lastmod>2018-05-04T20:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/05/the-joy-of-tech-a-facebook-dating-app/</loc>
		<lastmod>2018-05-04T21:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->