<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2019/12/dont-forget-to-pack-a-usb-condom-when-traveling/</loc>
		<lastmod>2019-12-10T13:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/25-most-dangerous-software-errors-list-shows-sql-injections-dropping-in-frequency/</loc>
		<lastmod>2019-12-10T13:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-best-practices-for-robotic-process-automation-security/</loc>
		<lastmod>2019-12-10T14:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/loose-lips-sink-ships-securing-slack-with-casb/</loc>
		<lastmod>2019-12-10T15:02:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-compliance-carol-a-visit-from-the-ghost-of-compliance-present/</loc>
		<lastmod>2019-12-10T15:26:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/browser-side-security-the-blindspot-you-need-to-prioritize/</loc>
		<lastmod>2019-12-10T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/enzoic-customer-profile-idshield/</loc>
		<lastmod>2019-12-10T16:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ciso-magazine-honors-krebsonsecurity/</loc>
		<lastmod>2019-12-10T16:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/most-breaches-are-financially-motivated-verizon-study-finds/</loc>
		<lastmod>2019-12-10T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/forrester-research-names-bitdefender-a-leader-in-cloud-workload-security/</loc>
		<lastmod>2019-12-10T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/from-security-alerts-to-actionable-insights-how-context-can-save-you-time-and-money/</loc>
		<lastmod>2019-12-10T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-ryan-macdougalls-osint-in-the-real-world-2/</loc>
		<lastmod>2019-12-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/moj-reports-over-400-increase-in-lost-laptops-in-three-years/</loc>
		<lastmod>2019-12-10T17:47:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-ai-hiring-algorithm/</loc>
		<lastmod>2019-12-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/clario-to-disrupt-digital-security-market-with-fusion-of-personalized-features-and-human-intelligence/</loc>
		<lastmod>2019-12-10T18:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-is-an-insider-threat-definition-examples-statistics-to-consider/</loc>
		<lastmod>2019-12-10T18:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-shane-mccombs-why-vigilantism-doesnt-work/</loc>
		<lastmod>2019-12-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/businesses-are-confident-in-their-cybersecurity-efforts-but-weaknesses-prevail/</loc>
		<lastmod>2019-12-10T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cost-of-data-breaches-in-2019-the-4-worst-hits-on-the-corporate-wallet/</loc>
		<lastmod>2019-12-10T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-true-danger-to-north-america-unmanaged-embedded-infrastructural-technical-debt/</loc>
		<lastmod>2019-12-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/kick-off-the-new-year-with-the-industrys-top-cti-experts-at-the-sans-cyber-threat-intelligence-summit/</loc>
		<lastmod>2019-12-10T20:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/3-web-third-party-related-events-from-the-web-you-dont-want-to-miss-december-2019/</loc>
		<lastmod>2019-12-10T21:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/introducing-usql-an-interactive-command-line-tool-for-osquery-and-uptycs/</loc>
		<lastmod>2019-12-10T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/december-2019-patch-tuesday-36-vulns-7-critical-actively-attacked-win32k-vuln-adobe-vulns/</loc>
		<lastmod>2019-12-10T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/this-is-how-rapid-appsec-fills-the-security-gap/</loc>
		<lastmod>2019-12-10T21:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/secure-process-audit/</loc>
		<lastmod>2019-12-10T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ethical-hacking-port-interrogation-tools-and-techniques/</loc>
		<lastmod>2019-12-10T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hypertext-transfer-protocol-http-with-wireshark/</loc>
		<lastmod>2019-12-10T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/vert-threat-alert-december-2019-patch-tuesday-analysis/</loc>
		<lastmod>2019-12-10T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/avast-helps-entrepreneur-launch-her-startup-avast/</loc>
		<lastmod>2019-12-11T01:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/patch-tuesday-december-2019-edition/</loc>
		<lastmod>2019-12-11T01:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-granular-sharepoint-backup-and-recovery-is-important/</loc>
		<lastmod>2019-12-11T04:01:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/field-ciso-qa-joan-ross/</loc>
		<lastmod>2019-12-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-attack-teaches-value-of-prevention-to-east-greenwich-town-government/</loc>
		<lastmod>2019-12-11T08:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/yet-another-cyber-prediction-blog/</loc>
		<lastmod>2019-12-11T11:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/experian-expects-deepfake-content-to-create-geo-political-confusion-in-2020/</loc>
		<lastmod>2019-12-11T12:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/reforming-cda-230/</loc>
		<lastmod>2019-12-11T12:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/11-telecom-gmbh-hit-by-almost-10-million-gdpr-fine-over-poor-security-at-call-centre/</loc>
		<lastmod>2019-12-11T13:22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitglass-api-gateway-encryption/</loc>
		<lastmod>2019-12-11T13:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/multiple-vulnerabilities-in-belkin-wemo-insight-switch/</loc>
		<lastmod>2019-12-11T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-security-incident-disclosed-by-cheyenne-regional-medical-center/</loc>
		<lastmod>2019-12-11T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/niagara-networks-provides-open-visibility-platform-to-flexibly-deploy-advanced-network-security-monitoring-and-performance-management-with-intelligent-traffic-delivery/</loc>
		<lastmod>2019-12-11T15:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/exploring-legacy-unix-security-issues/</loc>
		<lastmod>2019-12-11T15:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mitre-attck-exploiting-a-public-facing-application/</loc>
		<lastmod>2019-12-11T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/internet-relay-chat-irc-protocol-with-wireshark/</loc>
		<lastmod>2019-12-11T16:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-marcus-liottas-leveraging-the-insider-threat/</loc>
		<lastmod>2019-12-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/securelink-is-a-best-place-to-work-in-2020-according-to-our-employees-on-glassdoor/</loc>
		<lastmod>2019-12-11T17:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/behshad-rejai-on-the-past-present-and-future-of-software-development/</loc>
		<lastmod>2019-12-11T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitdefender-selected-as-best-network-security-vendor-of-2019/</loc>
		<lastmod>2019-12-11T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/never-underestimate-the-value-of-employee-cyber-training/</loc>
		<lastmod>2019-12-11T17:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-flu-shot/</loc>
		<lastmod>2019-12-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/five-identity-and-access-management-predictions-for-2020-and-beyond/</loc>
		<lastmod>2019-12-11T18:16:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-badware/</loc>
		<lastmod>2019-12-11T18:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-micah-zenkos-red-teaming-insights-and-examples-from-beyond/</loc>
		<lastmod>2019-12-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-5-cybersecurity-trends-to-prepare-for-in-2020/</loc>
		<lastmod>2019-12-11T19:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/product-update-sucuri-firewall-in-sophia/</loc>
		<lastmod>2019-12-11T19:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nexus-innovator-jasmine-james-of-delta/</loc>
		<lastmod>2019-12-11T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-old-authorized-third-party-payment-processor-gambit-eh/</loc>
		<lastmod>2019-12-11T20:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/plundervolt-a-new-intel-processor-undervolting-vulnerability/</loc>
		<lastmod>2019-12-11T22:24:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-hackers-get-our-cvv-numbers-avast/</loc>
		<lastmod>2019-12-11T22:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-great-50m-african-ip-address-heist/</loc>
		<lastmod>2019-12-11T22:31:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/protection-against-magecart-with-new-instart-web-skimming-protection-for-salesforce-commerce-cloud/</loc>
		<lastmod>2019-12-11T23:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/openbsd-local-privilege-escalation-vulnerability-cve-2019-19726/</loc>
		<lastmod>2019-12-12T01:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/psd2-and-sca-got-questions-we-have-answers/</loc>
		<lastmod>2019-12-12T02:36:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/finding-a-good-vendor-partner-more-than-technology/</loc>
		<lastmod>2019-12-12T05:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/grow-your-managed-security-service-offerings-with-fortinets-soc-lifecycle-strategy/</loc>
		<lastmod>2019-12-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/accelerate-security-operations-leveraging-fortinets-security-fabric-soar/</loc>
		<lastmod>2019-12-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/microsoft-security-essentials-to-die-with-windows-7-in-january/</loc>
		<lastmod>2019-12-12T08:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/scalefusion-ranked-13th-in-g2-coms-2019-best-software-companies-in-india-award/</loc>
		<lastmod>2019-12-12T09:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/land-securely-on-regulatory-compliance-with-thales-luna-hsms/</loc>
		<lastmod>2019-12-12T10:21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/next-gen-firewall-cloud-security-whats-the-difference/</loc>
		<lastmod>2019-12-12T11:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/maze-ransomware-used-in-pensacola-cyber-attack/</loc>
		<lastmod>2019-12-12T14:16:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/javascript-how-npm-maintainer-accounts-amplify-risk-3/</loc>
		<lastmod>2019-12-12T14:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/your-holiday-paranoia-perfect-for-credit-card-and-gmail-security/</loc>
		<lastmod>2019-12-12T14:54:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/maintain-control-of-your-most-sensitive-content-with-a-private-or-on-premises-cloud/</loc>
		<lastmod>2019-12-12T15:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/stay-safe-working-remotely-over-the-holidays-avast/</loc>
		<lastmod>2019-12-12T15:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/strong-woocommerce-passwords-enforcing-policies-without-deterring-customers/</loc>
		<lastmod>2019-12-12T16:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-nibbles/</loc>
		<lastmod>2019-12-12T16:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyber-work-podcast-write-up-how-to-become-a-cybersecurity-analyst/</loc>
		<lastmod>2019-12-12T16:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mitre-attck-external-remote-services/</loc>
		<lastmod>2019-12-12T16:28:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitdefender-2020-cybersecurity-predictions/</loc>
		<lastmod>2019-12-12T16:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-perry-carpenters-the-aspies-guide-to-social-engineering/</loc>
		<lastmod>2019-12-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-cybersecurity-predictions-our-experts-weigh-in/</loc>
		<lastmod>2019-12-12T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/gartner-mitigate-risk-by-hardening-the-software-supply-chain/</loc>
		<lastmod>2019-12-12T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-data-error/</loc>
		<lastmod>2019-12-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-security-keeps-up-when-developers-drive-open-source/</loc>
		<lastmod>2019-12-12T18:52:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/waco-water-bill-attack-just-the-latest-in-a-wave-of-click2gov-breaches/</loc>
		<lastmod>2019-12-12T18:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/three-men-arrested-in-connection-to-722m-cryptomining-scheme/</loc>
		<lastmod>2019-12-12T18:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-rebecca-longs-hacking-your-career-thru-social-engineering/</loc>
		<lastmod>2019-12-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/7-research-insights-to-help-inform-your-approach-to-network-security-2/</loc>
		<lastmod>2019-12-12T19:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/microsoft-highlights-the-risk-of-stolen-passwords/</loc>
		<lastmod>2019-12-12T19:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/exploring-the-critical-components-of-devops/</loc>
		<lastmod>2019-12-12T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hackers-come-for-oil-and-gas/</loc>
		<lastmod>2019-12-12T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/china-finagles-world-bank-to-fund-surveillance-in-xinjiang/</loc>
		<lastmod>2019-12-12T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/idaptives-jeff-newlin-honored-as-a-global-sales-leader-in-the-2020-gsl100/</loc>
		<lastmod>2019-12-12T20:09:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-data-behind-its-not-ifbut-when-by-ryan-dodd/</loc>
		<lastmod>2019-12-12T20:53:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-ai-can-help-you-stay-ccpa-compliant/</loc>
		<lastmod>2019-12-12T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/beware-clown-grade-socs-still-abound/</loc>
		<lastmod>2019-12-12T20:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/digital-privacy-101-best-practices-for-enterprises/</loc>
		<lastmod>2019-12-12T22:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/unmasking-black-hat-seo-for-dating-scams/</loc>
		<lastmod>2019-12-13T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-secure-web-based-applications-with-kali-linux/</loc>
		<lastmod>2019-12-13T02:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/intel-fixes-dangerous-plundervolt-vulnerability/</loc>
		<lastmod>2019-12-13T07:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/insights-about-the-first-five-years-of-right-to-be-forgotten-requests-at-google/</loc>
		<lastmod>2019-12-13T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitdefender-wins-cloud-partner-program-of-the-year-at-channel-partner-insight-channel-innovation-awards/</loc>
		<lastmod>2019-12-13T11:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/for-cloud-native-app-security-few-companies-have-embraced-devsecops/</loc>
		<lastmod>2019-12-13T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/iran-claims-it-foiled-a-state-backed-cyber-attack/</loc>
		<lastmod>2019-12-13T12:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/over-750000-applications-for-us-birth-certificates-left-exposed-online/</loc>
		<lastmod>2019-12-13T14:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/introducing-our-new-website/</loc>
		<lastmod>2019-12-13T15:17:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/government-procurement-services-targeted-in-phishing-campaign/</loc>
		<lastmod>2019-12-13T15:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/is-your-organization-suffering-from-third-party-compliance-drift/</loc>
		<lastmod>2019-12-13T15:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/verified-mark-certificates-the-bimi-standard-show-your-company-logo-in-your-customers-inbox/</loc>
		<lastmod>2019-12-13T15:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ciam-vs-iam-5-steps-to-choosing-the-best-identity-management-solution-for-your-enterprise/</loc>
		<lastmod>2019-12-13T16:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/5-Steps-to-Choosing-IMS-GIF-V01.02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/5-Steps-to-Choosing-IMS-V01.01-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-robin-dreekes-sizing-people-up/</loc>
		<lastmod>2019-12-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/lets-get-real-your-saas-needs-backup/</loc>
		<lastmod>2019-12-13T17:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-the-new-mac-pro-is-cruel/</loc>
		<lastmod>2019-12-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/over-750000-applications-for-copies-of-us-birth-certificates-left-exposed-online/</loc>
		<lastmod>2019-12-13T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/machine-learning-terminology-its-really-not-that-hard/</loc>
		<lastmod>2019-12-13T19:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/litany-of-bad-behavior-at-bezos-ring/</loc>
		<lastmod>2019-12-13T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/improving-and-automating-threat-intelligence-for-better-cybersecurity/</loc>
		<lastmod>2019-12-13T21:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/protecting-the-crown-jewels-with-threat-hunting/</loc>
		<lastmod>2019-12-13T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/your-quick-guide-to-soc-1-2-and-3/</loc>
		<lastmod>2019-12-13T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/this-is-finally-the-year-of-the-arm-server/</loc>
		<lastmod>2019-12-13T21:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pensacola-hit-with-ransomware-attack-avast/</loc>
		<lastmod>2019-12-13T21:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitglass-sase-wins-global-2000-enterprise/</loc>
		<lastmod>2019-12-13T23:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-billy-boatrights-swing-away-conquer-impostor-syndrome/</loc>
		<lastmod>2019-12-14T07:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-insights-from-aws-reinvent-2019/</loc>
		<lastmod>2019-12-14T12:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-chris-hadnagys-sevillage-10-year-anniversary-a-look-back/</loc>
		<lastmod>2019-12-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/idaptive-release-19-6-is-now-available/</loc>
		<lastmod>2019-12-14T17:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-timeline-of-the-universe/</loc>
		<lastmod>2019-12-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-chris-kirschs-psychic-cold-reading-techniques/</loc>
		<lastmod>2019-12-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/scaring-people-into-supporting-backdoors/</loc>
		<lastmod>2019-12-15T01:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-chris-pritchards-the-basics-of-social-engineering/</loc>
		<lastmod>2019-12-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-look-up-in-the-apple-store-its-super-monitor/</loc>
		<lastmod>2019-12-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-daniel-islers-the-voice-told-me-to-do-it/</loc>
		<lastmod>2019-12-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-password-reuse-problem-us-government-iot-recommendations-smart-lock-security-disaster/</loc>
		<lastmod>2019-12-16T05:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/social-engineering-the-silver-screen-home-alone-edition/</loc>
		<lastmod>2019-12-16T07:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/its-all-about-the-baselines-security-edition/</loc>
		<lastmod>2019-12-16T07:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/fortiweb-cloud-waf-as-a-service-for-google-cloud/</loc>
		<lastmod>2019-12-16T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/stay-safe-when-shopping-online-cyber-work-podcast/</loc>
		<lastmod>2019-12-16T08:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-jersey-hospital-pays-ransomware-attackers-to-avoid-jeopardizing-lives/</loc>
		<lastmod>2019-12-16T10:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-trust-your-service-provider/</loc>
		<lastmod>2019-12-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/change-is-inevitable-pondering-the-near-future/</loc>
		<lastmod>2019-12-16T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/revisiting-glupteba-still-relevant-five-years-after-debut/</loc>
		<lastmod>2019-12-16T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-infection-throws-new-orleans-into-state-of-emergency/</loc>
		<lastmod>2019-12-16T13:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/connected-toys-what-are-the-security-privacy-risks/</loc>
		<lastmod>2019-12-16T13:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/sql-server-2019-security-tool-inadvertently-reveals-where-sensitive-data-is-stored/</loc>
		<lastmod>2019-12-16T13:33:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/inside-evil-corp-a-100m-cybercrime-menace/</loc>
		<lastmod>2019-12-16T14:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/glupteba-trojan-makes-a-comeback-taking-aim-at-large-enterprises-whitepaper/</loc>
		<lastmod>2019-12-16T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/medical-care-at-nj-hospital-disrupted-by-ransomware-attack/</loc>
		<lastmod>2019-12-16T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/visa-warns-of-point-of-sale-attacks-from-fin8-hackers/</loc>
		<lastmod>2019-12-16T14:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nist-800-171-change-of-characters-in-passwords/</loc>
		<lastmod>2019-12-16T15:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cloud-data-security-who-should-hold-the-keys/</loc>
		<lastmod>2019-12-16T15:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/google-cloud-and-palo-alto-networks-expand-strategic-partnership/</loc>
		<lastmod>2019-12-16T17:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mcafee-and-google-cloud-announce-partnership-to-integrate-mcafee-security-solutions-with-google-cloud-platform/</loc>
		<lastmod>2019-12-16T17:08:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/successful-cisos-use-this-essential-tool-sparingly/</loc>
		<lastmod>2019-12-16T15:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/devoops-nomad-with-raw_exec-enabled/</loc>
		<lastmod>2019-12-16T16:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/forgerock-google-better-digital-identity-experiences/</loc>
		<lastmod>2019-12-16T16:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-edward-miros-rideshare-osint-car-based-se-for-fun-and-profit/</loc>
		<lastmod>2019-12-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ami-selected-to-join-the-nist-national-cybersecurity-excellence-partnership-at-the-national-cybersecurity-center-of-excellence/</loc>
		<lastmod>2019-12-16T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/robert-m-lees-jeff-haas-little-bobby-comics-insurance/</loc>
		<lastmod>2019-12-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/making-moves-how-to-successfully-transition-to-devsecops/</loc>
		<lastmod>2019-12-16T18:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/abusing-email-rules/</loc>
		<lastmod>2019-12-16T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-haystack/</loc>
		<lastmod>2019-12-16T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/simple-mail-transfer-protocol-smtp-with-wireshark/</loc>
		<lastmod>2019-12-16T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/election-security-is-too-important-to-ignore/</loc>
		<lastmod>2019-12-16T18:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/report-cyber-threats-growing-but-security-responses-arent-keeping-pace/</loc>
		<lastmod>2019-12-16T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-jayson-streets-i-pwn-thee-i-pwn-thee-not/</loc>
		<lastmod>2019-12-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-exploding-enterprise-attack-surface/</loc>
		<lastmod>2019-12-16T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/prc-tradecraft-the-spy-down-under/</loc>
		<lastmod>2019-12-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-financial-matrix-bitglass-2019-financial-breach-report/</loc>
		<lastmod>2019-12-16T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/security-analytics-and-big-data-4-keys-to-an-effective-approach/</loc>
		<lastmod>2019-12-16T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-malware-virus-scanning-tools-you-need-to-check-out/</loc>
		<lastmod>2019-12-16T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-application-flow-maps-are-the-coolest-feature-in-application-security/</loc>
		<lastmod>2019-12-16T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/november-2019-appsec-intelligence-report/</loc>
		<lastmod>2019-12-16T22:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/sonatype-nexus-is-rising-above-the-swamp/</loc>
		<lastmod>2019-12-16T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/you-should-be-concerned-about-insider-risk/</loc>
		<lastmod>2019-12-17T01:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-gangs-now-outing-victim-businesses-that-dont-pay-up/</loc>
		<lastmod>2019-12-17T02:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-cybersecurity-budget-should-focus-on-data-centric-security/</loc>
		<lastmod>2019-12-17T06:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-does-integrity-monitoring-have-to-do-with-security-anyway/</loc>
		<lastmod>2019-12-17T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/companies-that-request-pii-from-vendors-must-protect-it/</loc>
		<lastmod>2019-12-17T06:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/enabling-security-driven-networking-across-industries-with-secure-sd-wan/</loc>
		<lastmod>2019-12-17T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/seven-critical-vulnerabilities-discovered-in-portainer/</loc>
		<lastmod>2019-12-17T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/policy-and-procedures-security-compliance/</loc>
		<lastmod>2019-12-17T09:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/first-significant-gdpr-fines/</loc>
		<lastmod>2019-12-17T09:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cloud-adoption-cited-as-top-initiative-in-workforce-transformation/</loc>
		<lastmod>2019-12-17T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/iranian-attacks-on-industrial-control-systems/</loc>
		<lastmod>2019-12-17T12:05:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-cybersecurity-trends-ongoing-digital-transformation-leads-to-increased-security-vigilance-by-tracey-moon/</loc>
		<lastmod>2019-12-17T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/financial-services-get-hooked-experience-147-increase-in-phishing-clicks/</loc>
		<lastmod>2019-12-17T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-satisfy-hipaa-awareness-and-training-requirements/</loc>
		<lastmod>2019-12-17T14:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/urgent-11-vulnerability/</loc>
		<lastmod>2019-12-17T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-five-cybersecurity-architect-certifications/</loc>
		<lastmod>2019-12-17T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/seven-in-10-breaches-are-caused-by-insiders-new-study-shows/</loc>
		<lastmod>2019-12-17T15:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/want-to-learn-network-threat-hunting-get-started-with-this-free-intro-course/</loc>
		<lastmod>2019-12-17T15:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/poison-frog-malware-samples-reveal-oilrigs-sloppiness/</loc>
		<lastmod>2019-12-17T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-consequences-of-a-data-breach-why-fines-are-just-the-tip-of-the-iceberg/</loc>
		<lastmod>2019-12-17T16:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/appsec-themes-to-watch-in-2020/</loc>
		<lastmod>2019-12-17T16:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/phishing-attacks-on-the-rise/</loc>
		<lastmod>2019-12-17T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-social-engineering-village-andrew-nicholsons-hacking-hollywood/</loc>
		<lastmod>2019-12-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/loginradius-gets-into-the-christmas-spirit-of-giving/</loc>
		<lastmod>2019-12-17T17:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/inspecting-tls-web-traffic-part-1/</loc>
		<lastmod>2019-12-17T17:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/no-one-is-pulling-the-plug-on-firewalls-anytime-soon/</loc>
		<lastmod>2019-12-17T17:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2h2019-identity-management-funding-analysis/</loc>
		<lastmod>2019-12-17T17:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nearly-two-thirds-of-holiday-e-commerce-traffic-was-bad-bots/</loc>
		<lastmod>2019-12-17T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-brussels-sprouts-mandela-effect/</loc>
		<lastmod>2019-12-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/are-passwords-really-the-best-we-can-do/</loc>
		<lastmod>2019-12-17T18:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cloud-transformation-2020-trend-1/</loc>
		<lastmod>2019-12-17T18:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-apttus-found-a-partner-in-idaptive-that-was-just-as-nimble-innovative-and-flexible-as-they-were/</loc>
		<lastmod>2019-12-17T18:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-small-businesses-approach-digital-transformation-avast/</loc>
		<lastmod>2019-12-17T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/usb-flash-drive-malware-how-it-works-how-to-protect-against-it/</loc>
		<lastmod>2019-12-17T18:57:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-the-ricks-wctf-gear-talk/</loc>
		<lastmod>2019-12-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nuclear-bot-author-arrested-in-sextortion-case/</loc>
		<lastmod>2019-12-17T19:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mackey-security-isnt-front-of-mind-in-the-iot/</loc>
		<lastmod>2019-12-17T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/divvycloud-launches-on-aws-marketplace/</loc>
		<lastmod>2019-12-17T19:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-evolution-of-next-generation-manufacturing-and-the-need-for-network-security/</loc>
		<lastmod>2019-12-17T19:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ring-casted-and-nulled/</loc>
		<lastmod>2019-12-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/certificates-vs-credentials/</loc>
		<lastmod>2019-12-17T22:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-top-5-vdi-benefits-hint-security-isnt-one-of-them/</loc>
		<lastmod>2019-12-17T22:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hsts-for-forensics-you-can-run-but-you-cant-use-http/</loc>
		<lastmod>2019-12-17T23:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/investigate-alerts-in-microsoft-azure/</loc>
		<lastmod>2019-12-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-investigate-alerts-in-microsoft-azure-with-soar/</loc>
		<lastmod>2019-12-18T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dean-wells-on-whats-new-in-windows-server-2019-security/</loc>
		<lastmod>2019-12-18T01:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ring-hack-shows-need-for-iot-security-avast/</loc>
		<lastmod>2019-12-18T04:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/eight-tips-for-defending-against-cyber-theft-while-traveling/</loc>
		<lastmod>2019-12-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ba-data-centric-approach-to-defend/</loc>
		<lastmod>2019-12-18T08:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-troubling-and-costly-trend-for-private-equity/</loc>
		<lastmod>2019-12-18T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/navigating-ics-security-the-threat-landscape/</loc>
		<lastmod>2019-12-18T13:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitglass-security-spotlight-cancer-centers-halted-due-to-cyberattack/</loc>
		<lastmod>2019-12-18T13:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/santa-sports-a-white-hat-this-modern-christmas/</loc>
		<lastmod>2019-12-18T14:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/akamai-improves-global-delivery-performance/</loc>
		<lastmod>2019-12-19T13:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/lifelabs-identified-digital-attack-that-possibly-exposed-15m-customers-data/</loc>
		<lastmod>2019-12-18T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/quickly-create-mostly-responsive-html-columns-with-htmltools/</loc>
		<lastmod>2019-12-18T15:38:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-four-best-cybersecurity-resolutions-for-small-businesses-in-2020/</loc>
		<lastmod>2019-12-18T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-perfect-av-comparatives-detection-score-what-does-it-mean/</loc>
		<lastmod>2019-12-18T15:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/connectwise-control-abused-again-to-deliver-zeppelin-ransomware/</loc>
		<lastmod>2019-12-18T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-is-ios-12-a-top-choice-for-app-developers-when-it-comes-to-security/</loc>
		<lastmod>2019-12-18T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nist-csf-the-nist-csf-components/</loc>
		<lastmod>2019-12-18T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-national-institute-of-standards-and-technology-cybersecurity-framework-nist-nsf-overview/</loc>
		<lastmod>2019-12-18T16:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-what-is-babayaga/</loc>
		<lastmod>2019-12-18T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/security-pros-pick-their-favorite-superheroes-supervillains-by-brian-contos/</loc>
		<lastmod>2019-12-18T16:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-final-instalment-a-view-from-the-ghost-of-compliance-future/</loc>
		<lastmod>2019-12-18T16:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-woodys-the-ford-hack-raptor-captor-video/</loc>
		<lastmod>2019-12-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rdp-abuse-and-swiss-army-knife-tool-used-to-pillage-encrypt-and-manipulate-data/</loc>
		<lastmod>2019-12-18T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-ground-vs-air/</loc>
		<lastmod>2019-12-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/saas-data-encryption-data-at-rest-vs-data-in-transit/</loc>
		<lastmod>2019-12-18T18:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/consumers-the-security-of-connected-toys-is-pretty-much-up-to-you/</loc>
		<lastmod>2019-12-18T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-teds-are-you-interested-in-kismet/</loc>
		<lastmod>2019-12-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/privacy-takeaways-from-2019/</loc>
		<lastmod>2019-12-18T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2019-hackathon-challenges-imperva-to-solve-problems-together/</loc>
		<lastmod>2019-12-18T19:59:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/23andme-flogs-your-dna/</loc>
		<lastmod>2019-12-18T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/get-more-done-with-automations/</loc>
		<lastmod>2019-12-18T20:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/trusted-computing-group-honors-kioxias-hiroshi-isozaki-for-contributions-to-standards-development/</loc>
		<lastmod>2019-12-18T20:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-websites-are-used-to-spread-emotet-malware/</loc>
		<lastmod>2019-12-18T20:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/holiday-season-cybersecurity-scams-and-how-to-avoid-them/</loc>
		<lastmod>2019-12-18T21:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/privileged-access-abuse-at-the-heart-of-latest-malicious-insider-incidents/</loc>
		<lastmod>2019-12-18T22:48:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/major-metro-cuts-firewall-spend/</loc>
		<lastmod>2019-12-19T00:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/attacker-causes-epileptic-seizure-over-the-internet/</loc>
		<lastmod>2019-12-19T06:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/eidas-establishing-trust-in-digital-signatures/</loc>
		<lastmod>2019-12-19T08:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/looking-to-drive-down-the-cost-of-doing-business-use-managed-services/</loc>
		<lastmod>2019-12-19T09:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/plights-of-the-round-table-a-tale-of-weighing-risk/</loc>
		<lastmod>2019-12-19T09:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/seven-toxic-information-security-personalities/</loc>
		<lastmod>2019-12-19T09:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2019-k-12-cybersecurity-the-year-in-review/</loc>
		<lastmod>2019-12-19T11:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-predictions-quantum-knows-what-you-did-last-summer/</loc>
		<lastmod>2019-12-19T11:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/265-fake-websites-set-up-to-promote-anti-pakistan-news-influence-eu-officials/</loc>
		<lastmod>2019-12-19T12:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/lousy-iot-security/</loc>
		<lastmod>2019-12-19T12:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-is-new-in-cmmc-v0-7/</loc>
		<lastmod>2019-12-19T13:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/global-cyber-alliance-launches-craig-newmark-trustworthy-internet-and-democracy-and-craig-newmark-scholars-programs/</loc>
		<lastmod>2019-12-19T13:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ccpa-ring-in-the-new-year-with-better-vulnerability-management-for-all/</loc>
		<lastmod>2019-12-19T13:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nation-state-attacks-motivations-consequences/</loc>
		<lastmod>2019-12-19T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-prediction-ransomware-to-become-more-dangerous-than-ever/</loc>
		<lastmod>2019-12-19T14:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-handle-brand-impersonation-on-social-media/</loc>
		<lastmod>2019-12-19T15:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/google-to-offer-advance-payments-in-patch-rewards-program/</loc>
		<lastmod>2019-12-19T15:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/multi-factor-authentication-is-an-underutilized-tool-in-protecting-against-privileged-credentials-breaches/</loc>
		<lastmod>2019-12-19T16:10:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/worst-passwords-list-reveals-123456-to-still-be-top-offender/</loc>
		<lastmod>2019-12-19T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/osquery-vs-ossec-which-is-best-for-linux-security-in-2020/</loc>
		<lastmod>2019-12-19T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/privilege-cloud-alero-updates-bolster-cyberark-saas/</loc>
		<lastmod>2019-12-19T16:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-sophisticated-bots-are-outsmarting-your-traditional-bot-management-solution/</loc>
		<lastmod>2019-12-19T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-s0lst1c3s-war-never-changes-attacks-against-wpa3s-enhanced-open/</loc>
		<lastmod>2019-12-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/getting-women-into-the-tech-industry/</loc>
		<lastmod>2019-12-19T17:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/twas-the-night-of-the-go-live/</loc>
		<lastmod>2019-12-19T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-trends-will-shape-the-cybersecurity-industry-in-2020/</loc>
		<lastmod>2019-12-19T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/prevent-sodinokibi-ransomware-from-infecting-your-enterprise/</loc>
		<lastmod>2019-12-19T17:50:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-why-are-you-still-using-facebook/</loc>
		<lastmod>2019-12-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-the-cyber-grinch-stole-christmas-managing-retailer-supply-chain-cyber-risk/</loc>
		<lastmod>2019-12-19T18:29:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-nishant-sharmas-developing-wifi-access-point-rootkits/</loc>
		<lastmod>2019-12-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nist-csf-risk-management-framework/</loc>
		<lastmod>2019-12-19T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nist-csf-nist-csf-core-functions/</loc>
		<lastmod>2019-12-19T19:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hack-the-box-htb-machines-walkthrough-series-jarvis/</loc>
		<lastmod>2019-12-19T19:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/our-top-software-security-stories-from-2019/</loc>
		<lastmod>2019-12-19T19:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/poor-cloud-security-practices-put-data-at-risk-a-detailed-look-at-how-hackers-target-employees/</loc>
		<lastmod>2019-12-19T20:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-zero-trust-approach-to-data-security-2020-trend-2/</loc>
		<lastmod>2019-12-19T20:31:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/inspecting-tls-web-traffic-part-2/</loc>
		<lastmod>2019-12-19T20:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-great-emulsifier/</loc>
		<lastmod>2019-12-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/trickbot-returns-in-a-new-ecommerce-shopping-campaign/</loc>
		<lastmod>2019-12-19T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/maximizing-return-on-infosec-efforts/</loc>
		<lastmod>2019-12-19T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/security-correlation-then-and-now-a-sad-truth-about-siem/</loc>
		<lastmod>2019-12-19T21:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/venafi-study-organizations-fail-to-protect-keys-and-certificates-as-effectively-as-usernames-and-passwords/</loc>
		<lastmod>2019-12-20T00:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-in-nexus-repository-3-20-r-format-support-more/</loc>
		<lastmod>2019-12-20T01:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-year-anniversary-of-the-soaksoak-malware-tsunami/</loc>
		<lastmod>2019-12-20T02:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-cloud-security-resources-certifications-events-and-social-media/</loc>
		<lastmod>2019-12-20T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/12-days-of-christmas-security-predictions-what-lies-ahead-in-2020/</loc>
		<lastmod>2019-12-20T07:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/have-yourself-a-secure-little-christmas/</loc>
		<lastmod>2019-12-20T08:10:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/scalefusion-named-as-high-performer-in-g2s-winter-2020-mdm-and-emm-report/</loc>
		<lastmod>2019-12-20T09:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/all-wawa-convenience-stores-infected-with-credit-card-stealing-malware/</loc>
		<lastmod>2019-12-20T10:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/healthcare-security-how-to-deploy-iot-securely/</loc>
		<lastmod>2019-12-20T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-2019-was-a-standout-year-and-why-2020-will-be-even-more-interesting/</loc>
		<lastmod>2019-12-20T11:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/arctic-wolf-enhances-managed-detection-and-response-service-with-managed-containment/</loc>
		<lastmod>2019-12-20T14:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-potentially-exposed-wawa-customers-payment-card-details/</loc>
		<lastmod>2019-12-20T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pos-malware-exploits-weakness-in-gas-station-networks/</loc>
		<lastmod>2019-12-20T16:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/5-emerging-trends-in-cybersecurity/</loc>
		<lastmod>2019-12-20T16:41:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-m1n1s-t0ddpar0dys-hunting-mobile-rogue-access-points-with-wireless-mesh-implants/</loc>
		<lastmod>2019-12-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-star-wars-spoiler-generator/</loc>
		<lastmod>2019-12-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/idaptive-brings-next-gen-access-to-government-agencies-with-gsa-designation/</loc>
		<lastmod>2019-12-20T18:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/gartner-iam-2019-geeking-out-with-iam-nerds-in-vegas/</loc>
		<lastmod>2019-12-20T18:31:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-lennart-koopmanns-nzyme-a-new-wifi-defense-system/</loc>
		<lastmod>2019-12-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-attacks-hit-4-u-s-cities-in-december-avast/</loc>
		<lastmod>2019-12-20T19:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cisos-want-measurable-results-survey-shows/</loc>
		<lastmod>2019-12-20T19:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/from-politics-to-penetration-testing/</loc>
		<lastmod>2019-12-20T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/preventing-server-side-request-forgery-ssrf/</loc>
		<lastmod>2019-12-20T21:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-central-repository-is-moving-to-https/</loc>
		<lastmod>2019-12-21T01:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/an-unexpected-insider-threat-senior-executives-who-ignore-cybersecurity-rules/</loc>
		<lastmod>2019-12-21T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hushmesh-finally-someone-has-figured-out-how-to-eliminate-passwords/</loc>
		<lastmod>2019-12-21T15:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-hak5crews-introducing-new-hak5-gear/</loc>
		<lastmod>2019-12-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-santas-got-ransomware-locked-out-at-the-north-pole/</loc>
		<lastmod>2019-12-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-kent-britains-wa5vjb-antennas-for-surveillance/</loc>
		<lastmod>2019-12-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/as-we-enter-another-cyber-year-of-living-dangerously/</loc>
		<lastmod>2019-12-21T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/twitter-warns-android-users-about-potential-account-takeovers-patch-available/</loc>
		<lastmod>2019-12-22T08:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/its-time-to-replace-smb-with-something-smarter/</loc>
		<lastmod>2019-12-22T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-andres-blancos-love-is-in-the-air/</loc>
		<lastmod>2019-12-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/robert-m-lees-jeff-haas-little-bobby-comics-the-highway/</loc>
		<lastmod>2019-12-22T18:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-babak-javadis-basics-of-hacking-physical-access-control-systems/</loc>
		<lastmod>2019-12-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-year-in-review-and-2020-predictions-with-kevin-johnson/</loc>
		<lastmod>2019-12-23T05:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/60-of-canadians-fear-falling-victim-to-fraud-this-holiday-season-scotiabank-survey-reveals/</loc>
		<lastmod>2019-12-23T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/is-your-company-suffering-from-supplier-stockholm-syndrome/</loc>
		<lastmod>2019-12-23T05:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/in-2019-the-year-of-rising-ransomware-ryuk-wields-its-own-unique-nastiness/</loc>
		<lastmod>2019-12-23T07:04:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/staying-cyber-safe-this-holiday-season/</loc>
		<lastmod>2019-12-23T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/indias-digital-future-is-bright/</loc>
		<lastmod>2019-12-23T08:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/anatomy-of-a-firmware-attack/</loc>
		<lastmod>2019-12-23T08:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/enterprise-it-are-you-aware-of-these-ios-enterprise-security-vulnerabilities/</loc>
		<lastmod>2019-12-23T10:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/pipka-a-new-breed-of-anti-forensic-malicious-javascript/</loc>
		<lastmod>2019-12-23T10:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-cyber-tipping-point-are-we-there-yet/</loc>
		<lastmod>2019-12-23T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dridex-malware-of-the-month-december-2019/</loc>
		<lastmod>2019-12-23T14:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mitre-attck-vulnerability-spotlight-exploitation-for-credential-access/</loc>
		<lastmod>2019-12-23T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-what-are-emotets/</loc>
		<lastmod>2019-12-23T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nist-csf-the-seven-step-cybersecurity-framework-process/</loc>
		<lastmod>2019-12-23T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybered-magazine-session-with-enzoic-ceo-michael-greene/</loc>
		<lastmod>2019-12-23T14:42:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-things-every-business-needs-to-know-about-pci-dss-compliance/</loc>
		<lastmod>2019-12-23T14:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/goznym-cyberattackers-sentenced-in-pittsburgh-and-tbilisi-georgia/</loc>
		<lastmod>2019-12-23T15:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/managing-mac-for-enterprises-8-ways-to-optimize-mac-operations-for-business/</loc>
		<lastmod>2019-12-23T15:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/inspecting-tls-web-traffic-part-3/</loc>
		<lastmod>2019-12-23T15:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/endpoints-and-network-segmentation-best-practices/</loc>
		<lastmod>2019-12-23T16:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-besim-altinoks-legendary-nacars-edu-driving/</loc>
		<lastmod>2019-12-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/can-experience-be-a-hindrance-in-making-security-decisions/</loc>
		<lastmod>2019-12-23T17:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/paypal-phishing-scam-tries-to-steal-much-more-than-login-credentials/</loc>
		<lastmod>2019-12-23T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/using-rstats-to-help-santa-deliver-presents-this-christmas/</loc>
		<lastmod>2019-12-23T17:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-thumbtacks-and-string/</loc>
		<lastmod>2019-12-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2019-the-year-ransomware-targeted-state-local-governments/</loc>
		<lastmod>2019-12-23T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-eric-johnsons-wifi-6-802-11ax-deep-dive/</loc>
		<lastmod>2019-12-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-worst-passwords-of-2019/</loc>
		<lastmod>2019-12-23T19:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/andreessen-horowitzcrypto-regulatory-summit-neha-narulas-the-architecture-of-crypto-innovation/</loc>
		<lastmod>2019-12-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cisos-are-skeptical-about-cybersecurity-vendor-claims-study-shows/</loc>
		<lastmod>2019-12-23T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/farewell-mr-robot/</loc>
		<lastmod>2019-12-23T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/hollywood-hacks-hackers-3/</loc>
		<lastmod>2019-12-23T21:11:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/gartner-the-crucial-role-of-oss-license-compliance/</loc>
		<lastmod>2019-12-23T21:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/12-days-of-cyber-awareness/</loc>
		<lastmod>2019-12-23T22:51:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dfir-summit-2020-sneak-preview/</loc>
		<lastmod>2019-12-24T01:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/signs-of-phishing-protecting-yourself-during-the-holidays/</loc>
		<lastmod>2019-12-24T04:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/is-your-online-store-ready-for-the-holidays/</loc>
		<lastmod>2019-12-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/conducting-an-asset-based-risk-assessment-in-iso-270012013/</loc>
		<lastmod>2019-12-24T08:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/do-you-hear-what-i-hear/</loc>
		<lastmod>2019-12-24T08:49:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/60-of-records-leaked-in-past-year-exposed-by-financial-services-firms/</loc>
		<lastmod>2019-12-24T09:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-attack-forces-arkansas-ceo-to-fire-300-employees-days-before-christmas/</loc>
		<lastmod>2019-12-24T10:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/monthly-cyber-security-review-december-2019/</loc>
		<lastmod>2019-12-24T10:46:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-room-how-to-use-it-pertaining-to-the-good-of-your-company/</loc>
		<lastmod>2019-12-24T10:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-e-commerce-sites-can-counter-authbots/</loc>
		<lastmod>2019-12-24T11:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-salaries-emerging-threat-vectors-and-security-integration-the-10-most-read-posts-by-bricata-on-cybersecurity-in-2019/</loc>
		<lastmod>2019-12-24T12:00:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cloud-template-tool-the-only-way-for-imperva-on-premises-deployment-on-aws/</loc>
		<lastmod>2019-12-24T14:17:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/continuous-delivery-for-all/</loc>
		<lastmod>2019-12-24T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/privileged-access-workstation-adoption-infographic-survey-data/</loc>
		<lastmod>2019-12-24T15:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-eric-reuters-reversing-wireless-model-railroad-control-system/</loc>
		<lastmod>2019-12-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-deep-fakes/</loc>
		<lastmod>2019-12-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-wireless-village-guillemo-pilleuxs-hacking-wi-fi/</loc>
		<lastmod>2019-12-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/seasons-greetings-from-morphisec/</loc>
		<lastmod>2019-12-24T19:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/this-is-a-test-and-only-a-test-russia-shuts-down-external-internet-routing/</loc>
		<lastmod>2019-12-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/marketing-agency-temporarily-halts-operations-after-ransomware-attack/</loc>
		<lastmod>2019-12-24T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/offermans-yule/</loc>
		<lastmod>2019-12-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/happy-hanukkah/</loc>
		<lastmod>2019-12-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/serverless-etls-easy-data-lake-transformations-using-aws-athena/</loc>
		<lastmod>2019-12-25T13:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/leveraging-identity-as-a-service-idaas-for-business-success/</loc>
		<lastmod>2019-12-25T21:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-10-podcast-episodes-from-2019/</loc>
		<lastmod>2019-12-26T05:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/check-your-hiring-approach-the-dos-and-donts-of-recruitment/</loc>
		<lastmod>2019-12-26T06:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/addressing-top-sd-wan-security-concerns/</loc>
		<lastmod>2019-12-26T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/introducing-bioload-fin7-boostwrites-lost-twin/</loc>
		<lastmod>2019-12-26T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/gaining-an-accredited-training-can-help-one-to-become-successful-in-your-occupation/</loc>
		<lastmod>2019-12-26T09:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-security-privacy-are-big-hurdles-in-front-of-successful-digital-transformation/</loc>
		<lastmod>2019-12-26T09:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/chinese-hackers-bypassing-two-factor-authentication/</loc>
		<lastmod>2019-12-26T12:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/moreover-theyre-allowed-to-produce-interest-free-monthly-payments-so-they-really-can-distribute-their-tuitions-price-out-over-several-weeks/</loc>
		<lastmod>2019-12-26T12:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nshield-solo-xc-achieves-common-criteria-eal4-ava_van-5-and-alc_flr-2/</loc>
		<lastmod>2019-12-26T12:53:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/dont-disable-device-guard-just-yet-heres-why/</loc>
		<lastmod>2019-12-26T14:25:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyber-work-with-infosec-how-to-become-an-incident-responder/</loc>
		<lastmod>2019-12-26T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-what-is-click-fraud/</loc>
		<lastmod>2019-12-26T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mitre-attck-vulnerability-spotlight-forced-authentication/</loc>
		<lastmod>2019-12-26T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/mom-tells-how-she-addressed-inappropriate-content-avast/</loc>
		<lastmod>2019-12-26T15:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-shawn-thomas-an-introduction-to-malware-analysis/</loc>
		<lastmod>2019-12-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-edible-arrangements/</loc>
		<lastmod>2019-12-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-siyu-zhus-evaded-microsoft-ata/</loc>
		<lastmod>2019-12-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nexus-intelligence-insights-cve-2018-5382-bouncycastle-information-exposure/</loc>
		<lastmod>2019-12-26T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-you-need-both-a-waf-and-rasp-to-protect-your-web-applications/</loc>
		<lastmod>2019-12-26T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2019-checkmarx-research-roundup/</loc>
		<lastmod>2019-12-26T19:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-counter-russian-interference-apparently-informing-the-enemy-in-advance-is-now-a-thing/</loc>
		<lastmod>2019-12-26T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-passwords-get-hacked/</loc>
		<lastmod>2019-12-26T21:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/start-the-year-right-with-a-security-and-privacy-check-up/</loc>
		<lastmod>2019-12-27T05:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/tiktok-lawsuits-show-the-need-for-increased-scrutiny-of-apps/</loc>
		<lastmod>2019-12-27T09:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/video-burp-less-hacking-learning-web-application-pentesting-on-a-budget/</loc>
		<lastmod>2019-12-27T12:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/new-mexico-hospital-tells-patients-to-monitor-bank-statements-after-malware-infection/</loc>
		<lastmod>2019-12-27T12:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-is-a-website-security-certificate-and-what-does-it-do-for-your-business/</loc>
		<lastmod>2019-12-27T15:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/short-attention-span-theatre-reproducing-axios-1-big-thing-google-trends-2019-news-in-review-with-ggplot2/</loc>
		<lastmod>2019-12-27T16:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/security-pros-dont-protect-keys-and-certificates-as-effectively-as-usernames-and-passwords/</loc>
		<lastmod>2019-12-27T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/over-100-android-apps-used-soraka-package-to-perform-ad-fraud/</loc>
		<lastmod>2019-12-27T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-claushoumans-infosystirs-jnitterauers-litmooses-sm0kems-security-strategy-for-small-medium-business/</loc>
		<lastmod>2019-12-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/beyond-marketing-getting-ahead-of-brand-issues/</loc>
		<lastmod>2019-12-27T17:19:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-christmas-presents/</loc>
		<lastmod>2019-12-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-lacie-fans-killsuit-how-the-equation-group-remained-out-of-sight/</loc>
		<lastmod>2019-12-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/automation-cloud-visibility-and-firewall-management-emerge-as-leading-topics-in-network-security/</loc>
		<lastmod>2019-12-27T19:07:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/easing-the-pain-of-data-center-modernization/</loc>
		<lastmod>2019-12-27T19:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/us-navy-bans-tiktok-from-military-devices-avast/</loc>
		<lastmod>2019-12-27T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/rebecca-herold-the-privacy-professor/</loc>
		<lastmod>2019-12-27T22:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-at-it-services-provider-synoptek/</loc>
		<lastmod>2019-12-28T01:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-lak5hmi5udheers-dhivus-narayangowrajs-who-dis-who-dis-the-right-way-to-authenticate/</loc>
		<lastmod>2019-12-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/xkcd-weird-hill/</loc>
		<lastmod>2019-12-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-scoubimtls-bloodhound-from-red-to-blue-1-point-5/</loc>
		<lastmod>2019-12-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-new-years-resolutions-from-the-information-security-forum/</loc>
		<lastmod>2019-12-28T20:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-norman-lundts-extending-zeek-for-ics-defense/</loc>
		<lastmod>2019-12-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/robert-m-lees-jeff-haas-little-bobby-comics-endstate/</loc>
		<lastmod>2019-12-29T18:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-mark-orlandos-when-a-plan-comes-together-building-a-soc-a-team/</loc>
		<lastmod>2019-12-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/so-that-tweet-was-misunderstood/</loc>
		<lastmod>2019-12-30T00:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/happy-10th-birthday-krebsonsecurity-com/</loc>
		<lastmod>2019-12-30T00:49:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-round-up-of-data-breaches-in-december-2019/</loc>
		<lastmod>2019-12-30T04:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/honeypots-a-guide-to-increasing-security/</loc>
		<lastmod>2019-12-30T04:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/aws-vs-azure-vs-google-whats-the-difference-from-a-cloud-security-standpoint/</loc>
		<lastmod>2019-12-30T04:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-10-cybersecurity-and-privacy-resolutions/</loc>
		<lastmod>2019-12-30T05:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-partners-can-leverage-threat-intelligence-to-better-protect-customers/</loc>
		<lastmod>2019-12-30T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/join-fortinet-at-nrf-2020-in-new-york/</loc>
		<lastmod>2019-12-30T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/california-it-service-provider-pays-ransom-to-escape-sodinokibis-stronghold/</loc>
		<lastmod>2019-12-30T12:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/half-of-cisos-might-quit-their-jobs-in-2020-if-budgets-cybersecurity-staff-remain-tight-bitdefender-study/</loc>
		<lastmod>2019-12-30T13:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-top-telco-conferences-and-trends-shaping-our-future/</loc>
		<lastmod>2019-12-30T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/bitglass-deck-the-cloud/</loc>
		<lastmod>2019-12-30T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-top-15-worst-passwords-of-2019/</loc>
		<lastmod>2019-12-30T15:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/only-focused-on-patching-youre-not-doing-vulnerability-management/</loc>
		<lastmod>2019-12-30T15:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/wyze-resets-all-users-tokens-after-learning-of-alleged-data-leak/</loc>
		<lastmod>2019-12-30T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/taking-zero-trust-network-access-to-the-next-level/</loc>
		<lastmod>2019-12-30T16:11:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/nexus-platform-2019-year-in-review/</loc>
		<lastmod>2019-12-30T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/our-top-5-cybersecurity-insights-from-2019/</loc>
		<lastmod>2019-12-30T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-to-add-to-your-2020-infosec-budget/</loc>
		<lastmod>2019-12-30T16:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-christine-les-blue-team-guide-for-fresh-eyes/</loc>
		<lastmod>2019-12-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/luke-kingmas-lou-patrick-mackays-futurism-cartoons-dodger/</loc>
		<lastmod>2019-12-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-decade-challenge-email/</loc>
		<lastmod>2019-12-30T18:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/embracing-the-human-element-of-security/</loc>
		<lastmod>2019-12-30T18:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2019-a-year-in-review-and-a-look-ahead-to-seczettas-future/</loc>
		<lastmod>2019-12-30T18:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/qa-with-top-secret-exhibit-curator-avast/</loc>
		<lastmod>2019-12-30T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-dumbys-uncl3dumby-anatomy-of-a-megabreach-equifax-report/</loc>
		<lastmod>2019-12-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ransomware-round-up-for-2019/</loc>
		<lastmod>2019-12-30T19:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/december-threat-report/</loc>
		<lastmod>2019-12-30T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cybersecurity-new-years-resolution-for-2020/</loc>
		<lastmod>2019-12-30T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-anatomy-of-website-malware-part-2-credit-card-stealers/</loc>
		<lastmod>2019-12-30T21:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/malware-spotlight-fileless-malware/</loc>
		<lastmod>2019-12-30T21:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/top-cybersecurity-predictions-for-2020/</loc>
		<lastmod>2019-12-30T21:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/cyber-work-podcast-how-to-become-a-security-architect/</loc>
		<lastmod>2019-12-30T21:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/online-course-in-cloud-security-basics/</loc>
		<lastmod>2019-12-30T22:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/isocs-pir-attempts-succeeded-to-sell-itself-org-tld-to-equity-firm-ethos-capital/</loc>
		<lastmod>2019-12-30T22:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/my-10-year-youtube-anniversary/</loc>
		<lastmod>2019-12-31T00:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/protecting-customers-from-prevalent-threats-within-the-cyber-landscape/</loc>
		<lastmod>2019-12-31T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/7-cyber-regulations-your-business-dont-prepare-for-but-should-be/</loc>
		<lastmod>2019-12-31T09:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-top-10-state-of-security-blog-posts-from-2019/</loc>
		<lastmod>2019-12-31T09:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/use-cases-of-the-bricata-platform-for-better-network-security/</loc>
		<lastmod>2019-12-31T12:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/it-security-expert-blog-2019-12-31-023000/</loc>
		<lastmod>2019-12-31T12:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/spannings-best-of-2019/</loc>
		<lastmod>2019-12-31T13:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/special-olympics-nys-email-server-abused-to-send-phishing-emails/</loc>
		<lastmod>2019-12-31T13:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/what-to-expect-in-2020-cybersecurity-edition/</loc>
		<lastmod>2019-12-31T15:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/10-most-popular-blogs-of-2019/</loc>
		<lastmod>2019-12-31T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-georgios-kapoglis-serverless-log-analysis-on-aws/</loc>
		<lastmod>2019-12-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/guest-essay-as-cyber-risks-rise-in-2020-as-they-surely-will-dont-overlook-physical-security/</loc>
		<lastmod>2019-12-31T17:35:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-joy-of-tech-the-time-travellers-objective/</loc>
		<lastmod>2019-12-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/def-con-27-blue-team-village-carlos-garays-memhunter-automated-hunting-of-memory-resident-malware/</loc>
		<lastmod>2019-12-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-latest-paypal-phishing-email-goes-beyond-your-login-credentials/</loc>
		<lastmod>2019-12-31T19:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ipvm-reports-wyze-ceo-blames-employee-for-data-loss-not-companys-security-posture/</loc>
		<lastmod>2019-12-31T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/certifications-compared-cissp-vs-gsec/</loc>
		<lastmod>2019-12-31T20:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/essential-though-it-may-be-cyber-insurance-is-a-cold-hearted-friend/</loc>
		<lastmod>2020-01-01T01:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/happy-new-year-2020/</loc>
		<lastmod>2020-01-01T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/using-ai-to-level-the-cyber-playing-field/</loc>
		<lastmod>2020-01-01T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/writing-frictionless-r-package-wrappers-introduction/</loc>
		<lastmod>2020-01-01T12:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/yeast-raised-apple-cider-doughnuts/</loc>
		<lastmod>2020-01-01T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-vs-antivirus-the-never-ending-story-part-ii/</loc>
		<lastmod>2020-01-01T22:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/deathransom-part-ii-attribution/</loc>
		<lastmod>2020-01-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-curious-case-of-deathransom-part-i/</loc>
		<lastmod>2020-01-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-student-data-privacy-is-important-beyond-compliance/</loc>
		<lastmod>2020-01-02T11:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/landrys-notifies-customers-of-payment-card-incident/</loc>
		<lastmod>2020-01-02T13:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/backdoored-phishing-kits-are-still-popular/</loc>
		<lastmod>2020-01-02T16:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-ham-radio-village-jasons-the-rf-dark-arts-how-i-went-from-total-ignorance-to-receiving-1000-mile-contacts-in-6-months/</loc>
		<lastmod>2020-01-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nist-csf-core-functions-protect/</loc>
		<lastmod>2020-01-02T17:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nist-csf-core-functions-identify/</loc>
		<lastmod>2020-01-02T17:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-new-years-eve/</loc>
		<lastmod>2020-01-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-10-cybersecurity-blog-posts-of-2019/</loc>
		<lastmod>2020-01-02T18:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-the-ransomware-economy-has-grown/</loc>
		<lastmod>2020-01-02T18:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-security-roundup-for-january-2020/</loc>
		<lastmod>2020-01-02T18:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-ham-radio-village-mark-kr6zy-smiths-hunting-tape-measure-yagis-and-offset-attenuators/</loc>
		<lastmod>2020-01-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hacks-and-breaches-of-2019-a-year-in-review/</loc>
		<lastmod>2020-01-02T19:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/reflections-on-an-amazing-2019-at-balbix/</loc>
		<lastmod>2020-01-02T21:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ccpa-sucuris-commitment-to-protecting-your-data/</loc>
		<lastmod>2020-01-02T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shifting-security-left-the-innovation-of-devsecops/</loc>
		<lastmod>2020-01-02T23:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/boredom-and-security/</loc>
		<lastmod>2020-01-03T00:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-begins-with-three-exciting-events-all-across-the-globe/</loc>
		<lastmod>2020-01-03T07:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-achieve-compliance-with-nis-directive/</loc>
		<lastmod>2020-01-03T08:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tripwire-enterprise-and-zero-trust/</loc>
		<lastmod>2020-01-03T08:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ryuk-ransomware-hits-u-s-coast-guard-facility/</loc>
		<lastmod>2020-01-03T10:17:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pair-of-data-breaches-top-off-the-year-in-healthcare-security/</loc>
		<lastmod>2020-01-03T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/travelex-temporarily-disabled-all-its-systems-following-a-malware-attack/</loc>
		<lastmod>2020-01-03T13:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-compliance-whats-here-whats-next/</loc>
		<lastmod>2020-01-03T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sc-media-inducts-veracode-into-its-2019-innovator-hall-of-fame/</loc>
		<lastmod>2020-01-03T15:12:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/writing-frictionless-r-package-wrappers-building-a-basic-r-package/</loc>
		<lastmod>2020-01-03T16:22:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-attackers-offer-holiday-discounts-avast/</loc>
		<lastmod>2020-01-03T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/stronger-multi-factor-authentication-with-certificates/</loc>
		<lastmod>2020-01-03T16:37:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-eric-d-perakslis-employ-cybersecurity-techniques/</loc>
		<lastmod>2020-01-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2019-in-review-and-whats-next-for-infocyte/</loc>
		<lastmod>2020-01-03T17:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-i-love-the-20s/</loc>
		<lastmod>2020-01-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-training-evaluation-conundrum/</loc>
		<lastmod>2020-01-03T18:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/life-after-g-suite-postini/</loc>
		<lastmod>2020-01-03T19:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/take-your-career-to-the-next-level-with-comptia-and-infosec-skills-cyber-work-podcast-2/</loc>
		<lastmod>2020-01-03T20:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/webinar-mobile-application-hardening-for-business-critical-apps/</loc>
		<lastmod>2020-01-03T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/packet-clearing-house-a-letter-and-one-more-thing/</loc>
		<lastmod>2020-01-03T20:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/my-take-why-we-should-all-now-focus-on-restoring-stability-to-us-iran-relations/</loc>
		<lastmod>2020-01-03T20:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/the-top-20-security-predictions-for-2020/</loc>
		<lastmod>2020-01-03T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/understanding-cybersecurity-maturity-model-certification-cmmc/</loc>
		<lastmod>2020-01-04T01:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-jay-lagarios-hacking-wetware-with-open-source-software-and-hardware/</loc>
		<lastmod>2020-01-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-resolution-broken/</loc>
		<lastmod>2020-01-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-andrea-downings-a-previvors-story-of-uncovering-massive-zero-day/</loc>
		<lastmod>2020-01-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-dr-avi-rubins-beyond-the-firmware-the-attack-surface-of-a-networked-medical-device/</loc>
		<lastmod>2020-01-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/robert-m-lees-jeff-haas-little-bobby-comics-low-wages-open-jobs/</loc>
		<lastmod>2020-01-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-dr-goldman-dr-schwartz-david-guffrey-impanelled-medical-simulations-discussion/</loc>
		<lastmod>2020-01-05T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wah-wah-over-wawas-recent-data-security-incident/</loc>
		<lastmod>2020-01-05T19:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/3-perspectives-on-app-sandboxing/</loc>
		<lastmod>2020-01-05T19:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vdi-challenges-the-problem-with-vdi/</loc>
		<lastmod>2020-01-05T20:05:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vdi-security-best-practices-breaking-the-myth/</loc>
		<lastmod>2020-01-05T21:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-california-data-privacy-law-wyze-data-leak-totok-spy-app/</loc>
		<lastmod>2020-01-06T05:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-and-mef-establishing-critical-secure-sd-wan-standards/</loc>
		<lastmod>2020-01-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/predator-the-thief-analysis-of-recent-versions/</loc>
		<lastmod>2020-01-06T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-third-of-infosec-pros-believe-theyre-under-cyber-attack-but-dont-know-yet/</loc>
		<lastmod>2020-01-06T08:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-5-soft-skills-and-the-federal-cybersecurity-reskilling-academy-cyber-work-podcast/</loc>
		<lastmod>2020-01-06T09:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/insight-partners-to-acquire-armis-for-1-1-billion-valuation/</loc>
		<lastmod>2020-01-06T09:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/climbing-the-vulnerability-management-mountain-reaching-maturity-level-3-base-camp/</loc>
		<lastmod>2020-01-06T10:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cip-003-7-transient-cyber-assets-and-removable-media-in-2020/</loc>
		<lastmod>2020-01-06T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-fs-isac-at-twenty/</loc>
		<lastmod>2020-01-06T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ccpa-introduction-applicability-and-recommendations/</loc>
		<lastmod>2020-01-06T11:14:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/menlo-security-transcends-the-almost-secure-cybersecurity-paradigm/</loc>
		<lastmod>2020-01-06T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/company-told-employees-to-seek-other-work-after-ransomware-attack/</loc>
		<lastmod>2020-01-06T15:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-stricken-firm-tells-laid-off-employees-to-seek-new-jobs-amid-stymied-recovery-efforts/</loc>
		<lastmod>2020-01-06T15:52:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-big-is-the-skills-gap-really/</loc>
		<lastmod>2020-01-06T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/benefits-of-automation-make-the-most-of-your-people/</loc>
		<lastmod>2020-01-06T16:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/breaking-down-the-owasp-api-security-top-10-part-2/</loc>
		<lastmod>2020-01-06T16:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tips-to-protect-your-small-business-from-cyberattacks-in-2020/</loc>
		<lastmod>2020-01-06T16:39:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/4-data-lifecycle-management-mistakes-businesses-should-avoid/</loc>
		<lastmod>2020-01-06T16:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-jean-rintouls-spectra-open-biomedical-imaging/</loc>
		<lastmod>2020-01-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-difference-between-soar-and-a-security-operations-platform/</loc>
		<lastmod>2020-01-06T17:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ask-the-experts-what-will-be-the-biggest-cyber-security-story-in-2020/</loc>
		<lastmod>2020-01-06T17:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-ok-okay-ok/</loc>
		<lastmod>2020-01-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-hidden-cost-of-ransomware-wholesale-password-theft/</loc>
		<lastmod>2020-01-06T18:17:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tech-lessons-from-star-wars-movies-2/</loc>
		<lastmod>2020-01-06T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-nick-titus-building-a-new-decentralized-internet-with-the-nodes/</loc>
		<lastmod>2020-01-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/introducing-the-new-idaptive-windows-cloud-agent/</loc>
		<lastmod>2020-01-06T19:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/artificial-intelligence-the-true-beginning-occurred-in-1912/</loc>
		<lastmod>2020-01-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/thrilled-to-join-imperva/</loc>
		<lastmod>2020-01-06T20:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/raising-awareness-siteground-spotlight/</loc>
		<lastmod>2020-01-06T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-power-of-remediating-vulnerabilities-in-real-time/</loc>
		<lastmod>2020-01-06T21:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020s-top-cybersecurity-threats-explained-avast/</loc>
		<lastmod>2020-01-06T21:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iranian-cyber-threats-practical-advice-for-security-professionals/</loc>
		<lastmod>2020-01-06T22:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/industrial-operators-on-alert-in-wake-of-u-s-cyberattack-warning-2/</loc>
		<lastmod>2020-01-06T22:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/navigating-ics-security-the-value-of-frameworks/</loc>
		<lastmod>2020-01-07T04:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ncipher-security-cso-pali-surdhar-on-what-to-expect-in-2020/</loc>
		<lastmod>2020-01-07T06:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/austria-repels-foreign-state-sponsored-attempt-to-hack-foreign-ministry/</loc>
		<lastmod>2020-01-07T07:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/field-ciso-qa-joe-robertson/</loc>
		<lastmod>2020-01-07T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-bitdefenders-cybersecurity-predictions-for-2020-can-keep-companies-safe/</loc>
		<lastmod>2020-01-07T08:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-cryptocurrency-could-benefit-you/</loc>
		<lastmod>2020-01-07T09:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/business-chief-feature-pci-pal-providing-data-safety-and-security-for-its-customers/</loc>
		<lastmod>2020-01-07T09:48:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zeek-is-like-a-box-of-lego-bricks-for-network-security-qa-with-dr-ali-hadi/</loc>
		<lastmod>2020-01-07T12:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/configuring-wordpress-automatic-updates/</loc>
		<lastmod>2020-01-07T13:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisos-weigh-in-on-managing-digital-transformation-risk/</loc>
		<lastmod>2020-01-07T14:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/u-s-federal-website-defaced-with-anti-trump-message/</loc>
		<lastmod>2020-01-07T14:18:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-ways-it-service-providers-can-boost-sales-avast/</loc>
		<lastmod>2020-01-07T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/collaboration-under-pdgm/</loc>
		<lastmod>2020-01-07T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/facebook-declares-war-on-deepfakes/</loc>
		<lastmod>2020-01-07T14:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-at-devops-speed-how-veracode-reduces-false-positives/</loc>
		<lastmod>2020-01-07T14:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/veracode-ceo-sam-king-recognized-in-womeninc-magazines-2019-top-influential-corporate-directors/</loc>
		<lastmod>2020-01-07T15:14:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/scammer-easily-defrauds-town-of-erie-of-1-1-million/</loc>
		<lastmod>2020-01-07T15:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/secure-enclaves-a-new-approach-to-cybersecurity/</loc>
		<lastmod>2020-01-08T08:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Risk-Vulnerability-Management.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/glass-class-cloud-security-priorities-2020/</loc>
		<lastmod>2020-01-07T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-perfect-phishing-email/</loc>
		<lastmod>2020-01-07T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/6-things-every-big-data-security-solution-needs/</loc>
		<lastmod>2020-01-07T16:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/privileged-account-compromise-and-insider-threat-detection/</loc>
		<lastmod>2020-01-07T16:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hold-my-beer-mirai-spinoff-named-liquorbot-incorporates-cryptomining/</loc>
		<lastmod>2020-01-07T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ethical-hacking-top-6-techniques-for-attacking-two-factor-authentication/</loc>
		<lastmod>2020-01-07T16:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nist-csf-self-assessments/</loc>
		<lastmod>2020-01-07T16:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-jc-vegas-how-to-level-up-experiential-learning/</loc>
		<lastmod>2020-01-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-yelp-took-the-fast-track-to-spoof-proof-email/</loc>
		<lastmod>2020-01-07T17:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hacking-the-hackers-adversarial-ai-and-how-to-fight-it/</loc>
		<lastmod>2020-01-07T17:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/start-the-new-year-with-visibility-and-control-of-vendor-access/</loc>
		<lastmod>2020-01-07T17:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/canyon-bicycles-revealed-that-digital-attackers-accessed-its-it-systems/</loc>
		<lastmod>2020-01-07T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-social-media-its-worse-than-we-thought/</loc>
		<lastmod>2020-01-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/lock-down-your-sensitive-data-with-powerful-data-encryption/</loc>
		<lastmod>2020-01-07T18:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/did-you-avoid-the-black-friday-madness-hackers-didnt/</loc>
		<lastmod>2020-01-07T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-alex-pearlmans-diy-medicine-the-ethics-of-hacking-pharma/</loc>
		<lastmod>2020-01-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/email-spoofing-101-how-to-avoid-becoming-a-victim/</loc>
		<lastmod>2020-01-07T19:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/spoilsports-the-att-gambit/</loc>
		<lastmod>2020-01-07T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/winning-at-cybersecurity-whac-a-mole/</loc>
		<lastmod>2020-01-07T20:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-2fa-sms-is-a-bad-idea/</loc>
		<lastmod>2020-01-07T20:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/automated-attacks-call-for-automated-protection-2020-trend-3/</loc>
		<lastmod>2020-01-07T21:05:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tricky-phish-angles-for-persistence-not-passwords/</loc>
		<lastmod>2020-01-07T21:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/managedmethods-earns-microsoft-education-specialist-certification/</loc>
		<lastmod>2020-01-07T21:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-journey-to-better-medical-device-security-still-slow-still-bumpy/</loc>
		<lastmod>2020-01-07T22:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/gartner-report-on-remote-browser-isolation-menlo-securitys-continued-validation/</loc>
		<lastmod>2020-01-07T23:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vert-threat-alert-citrix-netscaler-adc-critical-flaw-cve-2019-19781/</loc>
		<lastmod>2020-01-07T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/understanding-how-mssps-can-add-value-to-sd-wan/</loc>
		<lastmod>2020-01-08T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-year-ahead-for-kubernetes-and-container-security/</loc>
		<lastmod>2020-01-08T09:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ciphercloud-and-cloudflare-solve-for-the-cloud-mobile-environment/</loc>
		<lastmod>2020-01-08T11:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/snake-ransomware-targeting-entire-corporate-networks/</loc>
		<lastmod>2020-01-08T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-in-the-cloud-protecting-yourself-based-on-your-cloud-environment/</loc>
		<lastmod>2020-01-08T11:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/from-good-to-great-building-on-ics-security-basics/</loc>
		<lastmod>2020-01-08T11:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pulse-secure-vpn-server-exploit-opens-the-way-for-sodinokibi-ransomware-travelex-falls-victim/</loc>
		<lastmod>2020-01-08T13:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/icmp-protocol-with-wireshark/</loc>
		<lastmod>2020-01-08T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-sha-1-attack/</loc>
		<lastmod>2020-01-08T15:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/divvycloud-achieves-record-2019-results-and-bolsters-leadership-team-with-two-new-hires/</loc>
		<lastmod>2020-01-08T16:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vpns-better-off-with-em-or-without-em/</loc>
		<lastmod>2020-01-08T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-next-decade-in-policy-management-is-automated/</loc>
		<lastmod>2020-01-08T16:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-dr-harish-manyam-doctor-hacker-panel/</loc>
		<lastmod>2020-01-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/are-hotel-guests-safe-from-a-data-breach/</loc>
		<lastmod>2020-01-08T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-your-favorite-osint-tool/</loc>
		<lastmod>2020-01-08T17:53:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-alignment-chart-alignment-chart/</loc>
		<lastmod>2020-01-08T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-fail-at-know-your-enemy/</loc>
		<lastmod>2020-01-08T18:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-rachel-smiths-liven-up-augmenting-materials/</loc>
		<lastmod>2020-01-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/accomplishing-soc-2-type-ii-in-the-cloud-native-kubernetes-era/</loc>
		<lastmod>2020-01-08T19:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tshark-7-tips-on-wiresharks-command-line-packet-capture-tool/</loc>
		<lastmod>2020-01-08T19:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/open-source-for-lawyers-ongoing-implications-of-open-source-use/</loc>
		<lastmod>2020-01-08T19:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-mirai/</loc>
		<lastmod>2020-01-08T19:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/corporate-twisting-of-privacy-laws/</loc>
		<lastmod>2020-01-08T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fastmed-improves-urgent-care-and-patient-privacy-with-idaptive/</loc>
		<lastmod>2020-01-08T20:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/work-in-healthcare-this-is-why-you-should-give-your-security-a-checkup/</loc>
		<lastmod>2020-01-08T20:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iot-security-how-far-weve-come-how-far-we-have-to-go/</loc>
		<lastmod>2020-01-08T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/citrix-netscaler-cve-2019-19781-what-you-need-to-know/</loc>
		<lastmod>2020-01-08T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-past-present-and-future-of-soar-current-state-of-the-soc/</loc>
		<lastmod>2020-01-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/state-of-the-soc-and-using-siem/</loc>
		<lastmod>2020-01-09T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-use-mitre-attck-for-endpoint-security/</loc>
		<lastmod>2020-01-09T00:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pentesting-with-a-raspberry-pi/</loc>
		<lastmod>2020-01-09T00:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/citrix-adc-and-gateway-remote-code-execution-vulnerability-cve-2019-19781/</loc>
		<lastmod>2020-01-09T00:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-reputation-is-everything-when-perpetrating-account-takeover-attacks/</loc>
		<lastmod>2020-01-09T01:01:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-warning-is-out-prepare-for-cyber-attacks-from-iran-especially-wiper-attacks/</loc>
		<lastmod>2020-01-09T03:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-year-of-encryption-is-upon-us/</loc>
		<lastmod>2020-01-09T06:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microservices-todays-data-science-gold-rush/</loc>
		<lastmod>2020-01-09T08:00:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/yesterdays-siem-solutions-cant-combat-todays-cyberthreats/</loc>
		<lastmod>2020-01-09T08:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/api-security-a-top-concern-for-cybersecurity-in-2020/</loc>
		<lastmod>2020-01-09T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/kick-off-2020-securely-with-gravityzone/</loc>
		<lastmod>2020-01-09T08:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-payments-in-2019-a-year-in-review/</loc>
		<lastmod>2020-01-09T10:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-security-standards-council-talks-security-awareness-and-training-cyber-work-podcast/</loc>
		<lastmod>2020-01-09T10:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-vs-antivirus-the-never-ending-story-part-iii/</loc>
		<lastmod>2020-01-09T11:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-trouble-with-student-data-privacy-laws/</loc>
		<lastmod>2020-01-09T11:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tripwire-patch-priority-index-for-december-2019/</loc>
		<lastmod>2020-01-09T11:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/10-considerations-before-buying-an-endpoint-detection-and-response-edr-security-solution-part-1/</loc>
		<lastmod>2020-01-09T14:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/a-case-study-in-cyber-governance-pitney-bowes-by-ryan-dodd/</loc>
		<lastmod>2020-01-09T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/us-cybersecurity-agency-warns-of-possible-iranian-backed-cyberattacks/</loc>
		<lastmod>2020-01-09T14:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-use-sonatype-oss-index-to-identify-security-vulnerabilities/</loc>
		<lastmod>2020-01-09T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/man-jailed-for-using-webcam-rat-to-spy-on-women-in-their-bedrooms/</loc>
		<lastmod>2020-01-09T14:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/alomere-health-notifies-patients-of-employee-email-compromise/</loc>
		<lastmod>2020-01-09T14:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/did-you-read-our-most-popular-2019-blog-posts/</loc>
		<lastmod>2020-01-09T15:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/threat-actor-abuses-mobile-sensor-to-evade-detection/</loc>
		<lastmod>2020-01-09T15:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/resource-smart-yara-scans-saving-cpu-and-time-with-osquery/</loc>
		<lastmod>2020-01-09T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-attacks-against-state-and-local-governments-surge/</loc>
		<lastmod>2020-01-09T16:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-rise-of-insider-threats-in-verizons-dbir/</loc>
		<lastmod>2020-01-09T16:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-wayne-penns-amputees-and-prosthetics-challenges/</loc>
		<lastmod>2020-01-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/less-than-10-of-enterprise-email-domains-are-protected-from-spoofing-is-yours/</loc>
		<lastmod>2020-01-09T17:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-parenthetical-names/</loc>
		<lastmod>2020-01-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hmi-machine-infected-with-wannacry/</loc>
		<lastmod>2020-01-09T17:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-najla-lindsays-forensic-science-and-information-security-lifetime/</loc>
		<lastmod>2020-01-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/lawmakers-prod-fcc-to-act-on-sim-swapping/</loc>
		<lastmod>2020-01-09T19:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/peter-thomas-kirstein-cbe-freng-dfbcs-1933-2020/</loc>
		<lastmod>2020-01-09T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/geopolitical-cyberstress-doublecheck-your-basics/</loc>
		<lastmod>2020-01-09T20:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2019-the-year-of-fake-security-4/</loc>
		<lastmod>2020-01-09T20:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/managedmethods-named-a-winner-of-the-2019-cloud-computing-security-excellence-awards/</loc>
		<lastmod>2020-01-09T20:55:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/this-is-why-keeping-products-secure-is-everyones-problem/</loc>
		<lastmod>2020-01-09T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/train-or-entertain-do-both-with-this-security-awareness-program-plan/</loc>
		<lastmod>2020-01-09T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-port-knocking/</loc>
		<lastmod>2020-01-09T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-hybrid-malware/</loc>
		<lastmod>2020-01-09T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/predator-the-thief/</loc>
		<lastmod>2020-01-09T21:55:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-cross-site-contamination/</loc>
		<lastmod>2020-01-09T21:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/making-compliance-and-risk-part-of-devops-2020-trend-4/</loc>
		<lastmod>2020-01-09T22:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/best-practices-for-ad-cs-configuration-2/</loc>
		<lastmod>2020-01-09T23:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/synopsys-acquires-tinfoil-security-dast-and-api-testing-solutions-provider-2/</loc>
		<lastmod>2020-01-09T23:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/six-essentials-for-defending-against-looming-cyber-threats/</loc>
		<lastmod>2020-01-10T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iranian-apt-group-overview/</loc>
		<lastmod>2020-01-10T10:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/researchers-find-rdp-abuse-exposes-new-fileless-type-tactic/</loc>
		<lastmod>2020-01-10T11:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/unsecured-database-with-personal-info-on-56-million-u-s-citizens-found-online/</loc>
		<lastmod>2020-01-10T12:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iran-sponsored-hackers-might-be-probing-u-s-electric-sector/</loc>
		<lastmod>2020-01-10T13:12:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/bipartisan-bill-in-u-s-congress-seeks-to-help-parents-control-data-collected-on-kids/</loc>
		<lastmod>2020-01-10T13:25:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-5-attck-techniques-used-by-threat-actors-tied-to-iran/</loc>
		<lastmod>2020-01-10T13:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dhs-warns-of-potential-iranian-cyberattack-avast/</loc>
		<lastmod>2020-01-10T14:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/police-surveillance-tools-from-special-services-group/</loc>
		<lastmod>2020-01-10T14:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/british-retailer-fined-half-a-million-pounds-for-poor-cybersecurity-hygiene/</loc>
		<lastmod>2020-01-10T14:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-2020-cybersecurity-resolutions-for-smbs-2/</loc>
		<lastmod>2020-01-10T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-a-rootkit-and-how-does-it-work/</loc>
		<lastmod>2020-01-10T16:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-consequences-of-security-breaches-are-becoming-more-severe/</loc>
		<lastmod>2020-01-10T16:49:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-bio-hacking-village-turtle-snaps-malware-and-biology/</loc>
		<lastmod>2020-01-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/encryption-will-take-center-stage-in-2020/</loc>
		<lastmod>2020-01-10T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-spaceship-streaming/</loc>
		<lastmod>2020-01-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-alvaro-folgados-siestatime-automation-for-long-term-implants/</loc>
		<lastmod>2020-01-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/webinars-devsecops-best-practices-appsec-tools-and-the-year-in-open-source/</loc>
		<lastmod>2020-01-10T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dsg-retail-limited-fined-500k-by-ico-following-malware-attack/</loc>
		<lastmod>2020-01-10T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/federally-funded-android-phones-contain-non-removable-malware-the-government-cheese-of-mobile-devices/</loc>
		<lastmod>2020-01-10T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/four-steps-to-get-started-with-nexus-repository-using-new-rest-apis/</loc>
		<lastmod>2020-01-10T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/open-access-government-a-european-commission-perspective-on-digital-transformation-in-healthcare/</loc>
		<lastmod>2020-01-10T22:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/privacy-self-encrypting-drives-are-the-answer-to-data-protection-concerns-now-and-in-the-future/</loc>
		<lastmod>2020-01-10T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-maturity-model-certification-cmmc-levels/</loc>
		<lastmod>2020-01-10T23:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/checking-my-2010-security-predictions-in-2020/</loc>
		<lastmod>2020-01-11T00:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/alleged-member-of-neo-nazi-swatting-group-charged/</loc>
		<lastmod>2020-01-11T03:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-marriage-of-data-exfiltration-and-ransomware/</loc>
		<lastmod>2020-01-11T04:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-adrian-sanabrias-red-team-framework-rtf/</loc>
		<lastmod>2020-01-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-star-wars-voyager-1/</loc>
		<lastmod>2020-01-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-charles-herrings-breaking-nbad-and-ueba-detection/</loc>
		<lastmod>2020-01-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-chris-mccoys-through-the-looking-glass-own-the-data-center/</loc>
		<lastmod>2020-01-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/robert-m-lees-jeff-haas-little-bobby-comics-data-classification-fail/</loc>
		<lastmod>2020-01-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-nathan-sweaneys-casting-with-the-pros-tips-and-tricks/</loc>
		<lastmod>2020-01-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iranian-cyber-attacks-ring-class-action-lawsuit-preventing-calendar-spam/</loc>
		<lastmod>2020-01-13T05:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisa-on-irans-cyber-threat-its-time-to-review-your-cyber-security-posture/</loc>
		<lastmod>2020-01-13T07:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/introducing-the-new-mitre-attck-framework-for-industrial-control-systems/</loc>
		<lastmod>2020-01-13T07:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/prevent-security-misconfigurations-in-a-multi-cloud-environment/</loc>
		<lastmod>2020-01-13T07:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/adding-some-salt-to-our-network-part-2/</loc>
		<lastmod>2020-01-13T07:51:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-inevitable-integration-of-sd-wan-and-security-in-2020/</loc>
		<lastmod>2020-01-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/email-attack-trend-predictions-for-2020-cyber-work-podcast/</loc>
		<lastmod>2020-01-13T09:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/give-your-customers-the-best-deal-on-data-security/</loc>
		<lastmod>2020-01-13T10:05:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/take-a-quick-look-at-the-scalefusion-feature-list-of-2019/</loc>
		<lastmod>2020-01-13T11:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/u-s-lawmakers-call-on-fcc-to-step-up-fight-on-sim-swapping/</loc>
		<lastmod>2020-01-13T11:14:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/u-s-healthcare-data-breach-cost-4-billion-in-2019-2020-wont-be-any-better/</loc>
		<lastmod>2020-01-13T11:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-dangers-of-iot-and-ai/</loc>
		<lastmod>2020-01-13T11:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sharing-a-pcap-with-decrypted-https/</loc>
		<lastmod>2020-01-13T12:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/travelex-still-down-two-weeks-after-sodinokibi-ransomware-infection/</loc>
		<lastmod>2020-01-13T13:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/vulnerability-scanning-vs-penetration-testing/</loc>
		<lastmod>2020-01-13T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/texas-school-district-lost-2-3m-to-phishing-email-scam/</loc>
		<lastmod>2020-01-13T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sodinokibi-hackers-now-use-stolen-data-for-blackmail/</loc>
		<lastmod>2020-01-13T13:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-i-joined-imperva/</loc>
		<lastmod>2020-01-13T14:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/working-for-a-winning-company/</loc>
		<lastmod>2020-01-13T14:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cable-haunt-vulnerability-affects-millions-of-broadcom-cable-modems/</loc>
		<lastmod>2020-01-13T14:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/man-who-hacked-national-lottery-for-just-5-is-jailed-for-nine-months/</loc>
		<lastmod>2020-01-13T14:12:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/convert-apple-card-pdf-statements-to-tidy-data-i-e-for-csv-excel-database-export/</loc>
		<lastmod>2020-01-13T14:20:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/state-of-software-security-v10-5-key-takeaways-for-developers/</loc>
		<lastmod>2020-01-13T14:38:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/testing-deeper-wider-and-better/</loc>
		<lastmod>2020-01-13T14:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/bitglass-security-spotlight-vulnerability-found-on-tiktok-platform/</loc>
		<lastmod>2020-01-13T14:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/endpoint-security-for-mac-what-you-need-to-know-in-2020/</loc>
		<lastmod>2020-01-13T14:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/artificial-personas-and-public-discourse/</loc>
		<lastmod>2020-01-13T15:06:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-whitelist-or-blacklist-apps-on-android-ios/</loc>
		<lastmod>2020-01-13T15:41:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/six-reasons-why-forgerock-sdks-make-sense/</loc>
		<lastmod>2020-01-13T15:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-traffic-analysis-for-incident-response-internet-protocol-with-wireshark/</loc>
		<lastmod>2020-01-13T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/response-to-it-industry-trends-analysis-2020/</loc>
		<lastmod>2020-01-13T15:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/phishing-for-apples-bobbing-for-links/</loc>
		<lastmod>2020-01-13T16:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-red-team-offensive-village-casey-3ndg4me-erdmanns-badsalt-adversarial-devops/</loc>
		<lastmod>2020-01-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/luke-kingmas-lou-patrick-mackays-futurism-cartoons-wandering-cpu/</loc>
		<lastmod>2020-01-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/securelink-is-a-best-place-to-work-in-2020-according-to-built-in-austin/</loc>
		<lastmod>2020-01-13T18:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-yanyan-wangs-automate-pen-testing-in-dockerized-ci-cd-environment/</loc>
		<lastmod>2020-01-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/avast-team-prepares-for-hack-cambridge-avast/</loc>
		<lastmod>2020-01-13T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/weirdest-cybersecurity-stories-of-2019-avast/</loc>
		<lastmod>2020-01-13T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/do-midsized-companies-need-a-ciso-3/</loc>
		<lastmod>2020-01-13T20:35:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/employee-password-security-for-healthcare-providers/</loc>
		<lastmod>2020-01-13T20:40:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-detailed-guide-to-achieving-iso-27001-certification/</loc>
		<lastmod>2020-01-13T20:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/spraying-the-iranian-password-gambit/</loc>
		<lastmod>2020-01-13T21:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-cyber-security-a-journey-of-a-thousand-miles/</loc>
		<lastmod>2020-01-13T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/securing-interactive-kiosks-iots-with-the-paradox-os/</loc>
		<lastmod>2020-01-13T22:13:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/</loc>
		<lastmod>2020-01-13T22:17:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/intel-active-management-technology-multiple-vulnerabilities-intel-sa-00241/</loc>
		<lastmod>2020-01-13T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/developing-a-data-protection-compliance-program-verizons-9-5-4-model/</loc>
		<lastmod>2020-01-14T04:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-to-kick-off-accelerate-2020-in-barcelona/</loc>
		<lastmod>2020-01-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-predictions-new-challenges-for-data-privacy-and-the-5g-hackathon/</loc>
		<lastmod>2020-01-14T08:41:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-ways-cloud-solutions-lead-to-more-business-growth/</loc>
		<lastmod>2020-01-14T09:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/you-dont-have-windows-7-in-your-environment-do-you/</loc>
		<lastmod>2020-01-14T09:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malicious-npm-package-exfiltrating-data-from-unix-systems/</loc>
		<lastmod>2020-01-14T10:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-whitelist-applications-on-windows-10-devices/</loc>
		<lastmod>2020-01-14T10:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/peap-mschapv2-vulnerability-allows-for-credential-theft/</loc>
		<lastmod>2020-01-14T11:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/infographic-mobile-point-of-sale-mpos-apprehending-the-future-market-growth-and-enterprise-benefits/</loc>
		<lastmod>2020-01-14T11:59:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/usb-cable-kill-switch-for-laptops/</loc>
		<lastmod>2020-01-14T12:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vax-transforms-telephone-payment-transaction-process-with-pci-pal/</loc>
		<lastmod>2020-01-14T13:37:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/busting-top-myths-about-privileged-access-management/</loc>
		<lastmod>2020-01-14T14:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/albany-airport-pays-ransom-after-sodinokibi-ransomware-attack/</loc>
		<lastmod>2020-01-14T14:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/gchq-urges-people-to-no-longer-use-windows-7-pcs-for-banking-email/</loc>
		<lastmod>2020-01-14T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/authentic8-completes-fedramp-in-process-authorization-milestone-4/</loc>
		<lastmod>2020-01-14T14:46:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2-3-million-texas-phishing-incident-underscores-importance-of-employee-cyber-training/</loc>
		<lastmod>2020-01-14T14:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/patch-tuesday-could-form-perfect-storm-for-large-companies/</loc>
		<lastmod>2020-01-14T15:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-traffic-analysis-for-ir-tcp-protocol-with-wireshark/</loc>
		<lastmod>2020-01-14T16:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ethical-hacking-how-to-hack-a-web-server/</loc>
		<lastmod>2020-01-14T16:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-can-you-protect-what-you-cant-see/</loc>
		<lastmod>2020-01-14T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-dss-compliance-lower-than-ever/</loc>
		<lastmod>2020-01-14T16:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-rafael-santos-huskyci-finding-flaws-in-ci-before-deploying-them/</loc>
		<lastmod>2020-01-14T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/thirty-four-years-addressing-application-security-part-7/</loc>
		<lastmod>2020-01-14T17:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-keep-your-it-team-motivated-avast/</loc>
		<lastmod>2020-01-14T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-brain-game-games/</loc>
		<lastmod>2020-01-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/10-cybersecurity-trends-in-2020-you-need-to-keep-an-eye-on/</loc>
		<lastmod>2020-01-14T18:10:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fugue-open-sources-regula-to-help-engineers-validate-terraform-for-policy-compliance/</loc>
		<lastmod>2020-01-16T14:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-predictions-for-tech-ma-in-2020/</loc>
		<lastmod>2020-01-14T18:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/identifying-remaining-windows-7-machines-in-30-seconds/</loc>
		<lastmod>2020-01-14T18:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wire-data-what-is-it-good-for/</loc>
		<lastmod>2020-01-14T18:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-joe-schottmans-purple-team-strategies-for-application-security/</loc>
		<lastmod>2020-01-14T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/05/pitfalls-of-eap-ttls-pap/</loc>
		<lastmod>2020-01-14T20:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/seventeen-android-nasties-spotted-in-google-play-total-over-550k-downloads/</loc>
		<lastmod>2020-01-14T20:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/10-considerations-before-buying-an-endpoint-detection-and-response-edr-security-solution-part-2/</loc>
		<lastmod>2020-01-14T21:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/state-and-local-governments-face-iranian-hacking-threats/</loc>
		<lastmod>2020-01-14T21:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-get-started-with-nexus-repository-manager-oss/</loc>
		<lastmod>2020-01-14T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vert-threat-alert-january-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-01-14T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-windows-cryptoapi-spoofing-vulnerability-cve-2020-0601-how-to-detect-and-remediate/</loc>
		<lastmod>2020-01-14T22:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/january-2020-patch-tuesday-50-vulns-8-critical-adobe-vulns/</loc>
		<lastmod>2020-01-14T22:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-the-november-2019-monero-supply-chain-hack-was-discoveredand-what-it-takes-to-block-these-kinds-of-attacks/</loc>
		<lastmod>2020-01-14T22:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/businesses-will-buy-down-risk-with-defense-in-depth-2020-trend-5/</loc>
		<lastmod>2020-01-14T23:25:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-10-sucuri-research-articles-in-2019/</loc>
		<lastmod>2020-01-15T00:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-obfuscation-encoding-and-encryption/</loc>
		<lastmod>2020-01-15T01:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/patch-tuesday-january-2020-edition/</loc>
		<lastmod>2020-01-15T02:31:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/android-banking-trojans-history-types-modus-operandi/</loc>
		<lastmod>2020-01-15T07:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/windows-7-reaches-end-of-life/</loc>
		<lastmod>2020-01-15T07:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/addressing-microsofts-january-2020-security-update-for-cve-2020-0601/</loc>
		<lastmod>2020-01-15T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/deep-analysis-of-new-metamorfo-variant-targeting-customers-of-brazilian-financial-organizations/</loc>
		<lastmod>2020-01-15T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-iot-of-life-when-digital-transformation-becomes-personal/</loc>
		<lastmod>2020-01-15T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/checkmarx-research-solidity-and-smart-contracts-from-a-security-standpoint/</loc>
		<lastmod>2020-01-15T12:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/is-5g-the-security-silver-bullet-for-system-integrators-in-the-west/</loc>
		<lastmod>2020-01-15T13:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/partners-in-cloud-bitglass-zscaler/</loc>
		<lastmod>2020-01-15T13:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/organizations-moving-to-cloud-environments-dont-feel-more-secure/</loc>
		<lastmod>2020-01-15T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/peekaboo-moments-app-left-baby-videos-photos-and-800000-users-email-addresses-exposed-on-the-internet/</loc>
		<lastmod>2020-01-15T15:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/five-key-things-to-know-about-nsa-microsoft-issue-avast/</loc>
		<lastmod>2020-01-15T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-jim-manicos-keynote-the-unabridged-history-of-application-security/</loc>
		<lastmod>2020-01-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-cryptoapi-cve-2020-0601-nsa-warns-of-critical-vulnerability/</loc>
		<lastmod>2020-01-15T16:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/from-video-games-to-government-how-to-steer-clear-of-social-engineering-scams/</loc>
		<lastmod>2020-01-15T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ensure-hipaa-compliance-with-securelink-for-healthcare/</loc>
		<lastmod>2020-01-15T17:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-jpeg2000/</loc>
		<lastmod>2020-01-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-external-remote-service/</loc>
		<lastmod>2020-01-15T18:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/emotet-used-phishing-emails-to-target-the-united-nations/</loc>
		<lastmod>2020-01-15T18:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-find-and-fix-mixed-content-warnings-on-https-sites/</loc>
		<lastmod>2020-01-15T18:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dont-let-ccpa-data-protection-requirements-get-the-best-of-you-instart-will-help/</loc>
		<lastmod>2020-01-15T18:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-jillian-ratliffs-vulnerabilities-that-hide-from-your-tools/</loc>
		<lastmod>2020-01-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/webinar-shellcode-for-the-masses/</loc>
		<lastmod>2020-01-15T19:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-insights-into-privileged-access-management-pam-best-practices/</loc>
		<lastmod>2020-01-15T19:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/proof-the-end-is-near-critical-crypto-vulnerability-in-microsoft-products/</loc>
		<lastmod>2020-01-15T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-protected-is-your-health-information/</loc>
		<lastmod>2020-01-15T20:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-traffic-analysis-for-ir-udp-with-wireshark/</loc>
		<lastmod>2020-01-15T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-10-blog-lists/</loc>
		<lastmod>2020-01-15T21:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nsa-vulnerability-disclosure-pros-and-cons/</loc>
		<lastmod>2020-01-15T21:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/tcg-appoints-distinguished-2020-contributor-advisors/</loc>
		<lastmod>2020-01-15T21:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nexus-intelligence-insights-sonatype-2020-0003-npm-malicious-package-1337qq-js/</loc>
		<lastmod>2020-01-16T01:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-patch-tuesday-busts-nsacrypt-vulnerability-in-windows-os/</loc>
		<lastmod>2020-01-16T07:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/key-cloud-security-challenges-and-strategies-to-overcome-them/</loc>
		<lastmod>2020-01-16T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/isa-global-cybersecurity-alliance-your-expertise-is-needed/</loc>
		<lastmod>2020-01-16T07:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ncipher-2020-is-the-year-of-encryption/</loc>
		<lastmod>2020-01-16T07:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-partners-and-mssps-can-select-the-right-cybersecurity-vendor-for-their-business/</loc>
		<lastmod>2020-01-16T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-achieve-compliance-with-indias-personal-data-protection-bill/</loc>
		<lastmod>2020-01-16T08:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/3-third-party-application-security-insights-of-the-last-years/</loc>
		<lastmod>2020-01-16T09:08:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/critical-windows-vulnerability-discovered-by-nsa/</loc>
		<lastmod>2020-01-16T09:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/emotet-strikes-again-targeting-600-united-nations-personnel/</loc>
		<lastmod>2020-01-16T10:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-secure-student-data-in-g-suite-office-365/</loc>
		<lastmod>2020-01-16T11:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iphones-now-work-as-physical-security-keys-for-google-services/</loc>
		<lastmod>2020-01-16T12:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyberark-launches-new-just-in-time-capabilities-and-more-in-v11-2/</loc>
		<lastmod>2020-01-16T13:15:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5g-security/</loc>
		<lastmod>2020-01-16T13:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zero-trust-trends-to-watch-out-for-in-2020/</loc>
		<lastmod>2020-01-16T13:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/google-plans-to-end-support-for-third-party-cookies-and-website-tracking-in-two-years/</loc>
		<lastmod>2020-01-16T13:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/facebook-gives-users-more-control-over-their-security-and-privacy-with-new-login-feature/</loc>
		<lastmod>2020-01-16T14:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/five-major-us-wireless-carriers-are-vulnerable-to-sim-swapping/</loc>
		<lastmod>2020-01-16T14:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/planetdrugsdirect-reveals-security-breach-warns-customers-their-data-may-have-been-exposed/</loc>
		<lastmod>2020-01-16T14:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ako-ransomware-using-spam-attachments-to-target-networks/</loc>
		<lastmod>2020-01-16T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/leveraging-machine-learning-for-cross-channel-fraud-detection/</loc>
		<lastmod>2020-01-16T15:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-trends-to-watch-in-2020/</loc>
		<lastmod>2020-01-16T15:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-rastalabs-experience/</loc>
		<lastmod>2020-01-16T15:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/paradise-ransomware-decryption-tool/</loc>
		<lastmod>2020-01-16T15:28:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/endpoint-detection-and-response-is-not-the-next-step/</loc>
		<lastmod>2020-01-16T15:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hysolate-workstations-not-impacted-by-new-windows-cryptoapi-spoofing-vulnerability/</loc>
		<lastmod>2020-01-16T16:26:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-work-how-to-become-a-chief-information-security-officer/</loc>
		<lastmod>2020-01-16T16:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-shortcut-modification/</loc>
		<lastmod>2020-01-16T16:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/exploiting-the-windows-cryptoapi-vulnerability/</loc>
		<lastmod>2020-01-16T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/vulnerable-industrial-control-devices-exposed-to-the-internet/</loc>
		<lastmod>2020-01-16T15:45:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-guy-barnhart-magens-crypto-failures-and-how-to-avoid-them/</loc>
		<lastmod>2020-01-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/brief-analysis-of-cve-2020-0601/</loc>
		<lastmod>2020-01-16T17:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-secure-is-rsa-in-an-increasingly-connected-world/</loc>
		<lastmod>2020-01-16T17:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-tattoo-ideas/</loc>
		<lastmod>2020-01-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2019-in-review-data-breach-statistics-and-trends-4/</loc>
		<lastmod>2020-01-16T18:26:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-incidents-now-pose-top-peril-for-companies-globally-allianz-says/</loc>
		<lastmod>2020-01-16T18:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sim-swap-attacks-are-making-sms-two-factor-authentication-obsolete/</loc>
		<lastmod>2020-01-16T18:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-eliminate-false-positives-in-file-integrity-monitoring-on-wordpress/</loc>
		<lastmod>2020-01-16T18:45:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-cybersecurity-threats-that-will-dominate-2020/</loc>
		<lastmod>2020-01-16T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-appsec-village-anthony-karver-kavas-how-bad-could-it-be-inside-law-enforcement-and-local-gov-appsec/</loc>
		<lastmod>2020-01-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/forbrukerrdet-new-studys-conclusion-the-advertising-industry-are-law-breakers-on-a-massive-scale/</loc>
		<lastmod>2020-01-16T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/survey-findings-most-organizations-are-still-not-ready-for-the-ccpa/</loc>
		<lastmod>2020-01-16T21:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nexus-innovator-david-radford-grant-of-achievers/</loc>
		<lastmod>2020-01-16T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/looking-into-the-seeds-of-time-part-x/</loc>
		<lastmod>2020-01-16T21:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/authentication-bypass-vulnerability-in-infinitewp-client/</loc>
		<lastmod>2020-01-16T22:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-next-gen-waf-empowers-the-devops-lifecycle/</loc>
		<lastmod>2020-01-17T00:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iranian-retaliatory-cyber-threats-are-a-reminder-of-the-importance-of-sound-incident-response/</loc>
		<lastmod>2020-01-17T00:21:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-brief-history-of-scanning/</loc>
		<lastmod>2020-01-17T02:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-trend-alert-consumer-privacy/</loc>
		<lastmod>2020-01-17T05:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-at-mobile-world-congress-2020/</loc>
		<lastmod>2020-01-17T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-website-owners-should-know-about-terms-and-conditions/</loc>
		<lastmod>2020-01-17T08:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fleeceware-25-play-store-apps-that-empty-your-pockets/</loc>
		<lastmod>2020-01-17T11:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/equifax-ordered-to-spend-1-billion-on-data-security/</loc>
		<lastmod>2020-01-17T13:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fbi-seizes-weleakinfo-com-website-for-allegedly-selling-sensitive-data-breach-info/</loc>
		<lastmod>2020-01-17T13:55:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/get-process-list-with-command-line-arguments/</loc>
		<lastmod>2020-01-17T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/trial-involving-israeli-spyware-maker-nso-group-to-move-forward-in-open-court/</loc>
		<lastmod>2020-01-17T14:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-news-new-phishing-tactics-emerge-avast/</loc>
		<lastmod>2020-01-17T15:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-patrick-kileys-can-bus-in-aviation-investigating-can-bus-in-avionics/</loc>
		<lastmod>2020-01-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zen-cart-paypal-skimmer/</loc>
		<lastmod>2020-01-17T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-trump-step-up-apple/</loc>
		<lastmod>2020-01-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-panel-the-long-haul-the-state-of-aviation-policy/</loc>
		<lastmod>2020-01-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shell-game/</loc>
		<lastmod>2020-01-17T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/were-going-to-rsa-2020-want-to-join-us/</loc>
		<lastmod>2020-01-17T20:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/bbp-my-path-to-the-ciso-chair/</loc>
		<lastmod>2020-01-17T20:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/domain-name-of-weleakinfo-com-seized-by-fbi-and-doj/</loc>
		<lastmod>2020-01-17T21:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/maintain-your-streaming-posture-during-failures-with-origin-failover/</loc>
		<lastmod>2020-01-17T21:44:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nsa-microsoft-releases-patch-to-fix-latest-windows-10-vulnerability/</loc>
		<lastmod>2020-01-17T21:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/imperva-launches-new-data-center-in-argentina/</loc>
		<lastmod>2020-01-17T22:04:04+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->