<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/01/day-1-detection-cve-2020-0601-a-community-and-40-lines-of-code/</loc>
		<lastmod>2020-01-17T22:10:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/out-of-band-real-time-api-security/</loc>
		<lastmod>2020-01-17T23:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-kens-and-alexs-a-hackers-first-solo-airplane-avionics-security-101/</loc>
		<lastmod>2020-01-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-bad-map-projection-south-america/</loc>
		<lastmod>2020-01-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-karl-koschers-an-introduction-to-the-arinc-standards/</loc>
		<lastmod>2020-01-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/patch-or-mitigate-dangerous-microsoft-windows-cryptoapi-spoofing-vulnerability-asap/</loc>
		<lastmod>2020-01-19T06:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/imperva-mitigates-exploits-of-citrix-vulnerability-right-out-of-the-box/</loc>
		<lastmod>2020-01-19T15:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-harshad-sathayes-wireless-attacks-on-aircraft-ils/</loc>
		<lastmod>2020-01-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nmap-for-beginners-part-1/</loc>
		<lastmod>2020-01-19T17:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/robert-m-lees-jeff-haas-little-bobby-comics-exclusively/</loc>
		<lastmod>2020-01-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-dr-will-ropers-and-jack-cables-hacking-the-air-force-and-beyond/</loc>
		<lastmod>2020-01-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/critical-windows-vulnerability-dating-app-security-risk-apple-ios-privacy-features/</loc>
		<lastmod>2020-01-20T05:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/youve-bought-security-software-now-what/</loc>
		<lastmod>2020-01-20T07:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nis-directive-who-are-the-operators-of-essential-services-oes/</loc>
		<lastmod>2020-01-20T07:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sd-wan-needs-to-integrate-network-and-security-functionality/</loc>
		<lastmod>2020-01-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/guest-essay-cyber-insurance-101-for-any-business-operating-in-todays-digital-environment/</loc>
		<lastmod>2020-01-20T08:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sniffing-decrypted-tls-traffic-with-security-onion/</loc>
		<lastmod>2020-01-20T09:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/some-companies-never-know-they-are-under-attack/</loc>
		<lastmod>2020-01-20T10:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-reports-zero-day-internet-explorer-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2020-01-20T10:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/y2k-two-decades-later/</loc>
		<lastmod>2020-01-20T11:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/december-cyber-attack-costs-new-orleans-7-million-so-far/</loc>
		<lastmod>2020-01-20T11:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-twelfth-annual-disaster-recovery-breakfast-immaturity/</loc>
		<lastmod>2020-01-20T12:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/01/the-top-20-information-security-conferences-of-2019/</loc>
		<lastmod>2020-01-20T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/gdpr-regulators-have-imposed-126m-in-fines-thus-far-finds-survey/</loc>
		<lastmod>2020-01-20T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sextortion-scam-leverages-nest-video-footage-to-fool-victims-into-believing-they-are-being-spied-upon-everywhere/</loc>
		<lastmod>2020-01-20T15:18:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nist-csf-core-functions-detect/</loc>
		<lastmod>2020-01-20T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-supply-chain-compromise/</loc>
		<lastmod>2020-01-20T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-womens-society-of-cyberjutsu-is-diversifying-security-cyber-work-podcast/</loc>
		<lastmod>2020-01-20T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-exploding-lemurs-in-the-air-and-on-the-air-aviation-radio-systems/</loc>
		<lastmod>2020-01-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-unsubscribe-message/</loc>
		<lastmod>2020-01-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-art-manions-ideas-whose-time-has-come-cvd-sbom-and-sota/</loc>
		<lastmod>2020-01-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/synopsys-adds-github-action-for-sast-and-sca/</loc>
		<lastmod>2020-01-20T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/state-of-georgia-election-server-may-have-been-compromised-during-2016-2018-elections/</loc>
		<lastmod>2020-01-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-and-beyond-idaptives-predictions-and-expectations-for-the-new-decade/</loc>
		<lastmod>2020-01-20T20:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/assessing-enterprise-firmware-security-risk-in-2020/</loc>
		<lastmod>2020-01-20T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ddos-mitigation-firm-founder-admits-to-ddos/</loc>
		<lastmod>2020-01-20T23:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/taking-a-more-strategic-approach-to-e-rate-resources/</loc>
		<lastmod>2020-01-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/update-curveball-exploit-cve-2020-0601-starts-making-the-rounds/</loc>
		<lastmod>2020-01-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-to-expect-from-stage-1-and-stage-2-iso-27001-audits/</loc>
		<lastmod>2020-01-21T08:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cloud-a-year-in-review-and-looking-forward/</loc>
		<lastmod>2020-01-21T09:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/securing-data-and-maintaining-compliance-in-servicenow/</loc>
		<lastmod>2020-01-21T09:09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-pal-advances-to-a-cisco-preferred-solution-partner/</loc>
		<lastmod>2020-01-21T09:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-incidents-increasingly-erode-brand-value/</loc>
		<lastmod>2020-01-21T10:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sim-hijacking/</loc>
		<lastmod>2020-01-21T12:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-infects-main-server-of-large-insurance-company-in-oman/</loc>
		<lastmod>2020-01-21T13:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/health-quest-begins-notifying-patients-affected-by-phishing-incident/</loc>
		<lastmod>2020-01-21T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes/</loc>
		<lastmod>2020-01-21T14:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/benefits-of-teaching-employees-to-hack/</loc>
		<lastmod>2020-01-21T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-wabbit/</loc>
		<lastmod>2020-01-21T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hitrust-passwords-7-important-password-policies-for-hitrust/</loc>
		<lastmod>2020-01-21T15:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cdatareport-a-cyberattack-could-severely-disrupt-the-us-financial-system/</loc>
		<lastmod>2020-01-21T15:25:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/trusted-computing-group-welcomes-globalplatforms-iotopia-in-the-development-of-iot-ecosystem-security/</loc>
		<lastmod>2020-01-21T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/implementing-privileged-access-workstations-for-zero-trust-architecture/</loc>
		<lastmod>2020-01-21T16:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/improved-team-collaboration-with-g-suite-powered-by-bitglass-okta/</loc>
		<lastmod>2020-01-21T16:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/spotlight-on-security-and-sunshine-at-appsec-california/</loc>
		<lastmod>2020-01-21T16:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-tarah-wheelers-common-online-security-fails-in-pilot-training/</loc>
		<lastmod>2020-01-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/staying-ccpa-compliant-with-mixmodes-unsupervised-ai/</loc>
		<lastmod>2020-01-21T17:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/when-cisos-lose-their-jobs/</loc>
		<lastmod>2020-01-21T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-happy-to-see-you/</loc>
		<lastmod>2020-01-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zero-trust-for-the-federal-government/</loc>
		<lastmod>2020-01-21T18:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-is-u-s-infrastructure-vulnerable-its-software-is-vulnerable/</loc>
		<lastmod>2020-01-21T18:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-aviation-village-zoltan-madarassys-behind-the-scenes-of-hacking-airplanes/</loc>
		<lastmod>2020-01-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-risks-of-business-associates-and-hipaa-compliance/</loc>
		<lastmod>2020-01-21T19:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/should-we-sell-our-data/</loc>
		<lastmod>2020-01-21T19:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/more-on-isocs-org-sale/</loc>
		<lastmod>2020-01-21T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/satan-ransomware-rebrands-as-5ss5c-ransomware/</loc>
		<lastmod>2020-01-21T21:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/brazil-charges-glenn-greenwald-with-cybercrimes/</loc>
		<lastmod>2020-01-21T21:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/morphisec-protects-customers-against-internet-explorer-scripting-zero-day/</loc>
		<lastmod>2020-01-21T21:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/qa-on-big-telnet-iot-data-leak-avast/</loc>
		<lastmod>2020-01-21T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/6-steps-to-prevent-ciso-burnout/</loc>
		<lastmod>2020-01-21T21:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/thirty-four-years-in-it-swimming-with-the-itanic-part-8/</loc>
		<lastmod>2020-01-21T22:53:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malicious-javascript-used-in-wp-site-home-url-redirects/</loc>
		<lastmod>2020-01-22T00:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ccpa-is-here-but-is-your-business-ready/</loc>
		<lastmod>2020-01-22T00:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-more-is-better-for-attackers-perpetrating-account-takeover-attacks/</loc>
		<lastmod>2020-01-22T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-role-pci-dss-plays-in-security/</loc>
		<lastmod>2020-01-22T05:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-extends-commitment-to-digital-innovation-by-partnering-with-formula-es-bmw-i-andretti-motorsport-team/</loc>
		<lastmod>2020-01-22T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hsms-facilitating-key-management-in-a-hybrid-cloud-environment/</loc>
		<lastmod>2020-01-22T08:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/navigating-ics-security-best-practices-for-ics-decision-makers/</loc>
		<lastmod>2020-01-22T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-vendor-security-assessment-vsa-what-you-need-to-know/</loc>
		<lastmod>2020-01-22T09:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/maryland-bill-would-make-owning-ransomware-a-criminal-offense/</loc>
		<lastmod>2020-01-22T09:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ubisoft-sues-alleged-ddos-for-hire-service/</loc>
		<lastmod>2020-01-22T12:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ups-says-phishing-incident-might-have-exposed-some-customers-data/</loc>
		<lastmod>2020-01-22T12:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/frost-radar-declares-nozomi-networks-cybersecurity-leader-2/</loc>
		<lastmod>2020-01-22T12:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/teenager-charged-over-50-million-sim-swap-cryptocurrency-theft/</loc>
		<lastmod>2020-01-22T13:55:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/managing-risks-according-to-clause-6-of-iso-27001/</loc>
		<lastmod>2020-01-22T13:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/entire-u-s-banking-sector-would-suffer-greatly-if-even-just-one-major-bank-is-compromised/</loc>
		<lastmod>2020-01-22T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/intelligo-acquired-by-actzero/</loc>
		<lastmod>2020-01-22T14:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-mitre-attck-for-ics/</loc>
		<lastmod>2020-01-22T15:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-a-package-dependency-manager/</loc>
		<lastmod>2020-01-22T16:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-tod-beardsleys-securing-voting-systems-beyond-paper-ballots/</loc>
		<lastmod>2020-01-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/does-my-scala-value-class-really-not-get-allocated/</loc>
		<lastmod>2020-01-22T17:21:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/software-architecture-with-shortest-time-to-market-consideration/</loc>
		<lastmod>2020-01-22T17:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/luke-kingmas-lou-patrick-mackays-futurism-cartoons-salaryman/</loc>
		<lastmod>2020-01-22T18:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/using-digital-certificates-on-yubikey/</loc>
		<lastmod>2020-01-22T18:41:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/internal-controls-and-data-security-how-to-develop-controls-that-meet-your-needs/</loc>
		<lastmod>2020-01-22T18:47:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-sherri-ramsays-2020-ready-or-not/</loc>
		<lastmod>2020-01-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-user-experience-of-security/</loc>
		<lastmod>2020-01-22T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-disk-structure-wipe/</loc>
		<lastmod>2020-01-22T19:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/coverity-black-duck-together-better-faster-stronger/</loc>
		<lastmod>2020-01-22T19:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dns-poisoning-attacks-a-guide-for-website-admins/</loc>
		<lastmod>2020-01-22T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/risks-of-a-public-certificate-authority/</loc>
		<lastmod>2020-01-22T20:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-playbook-lifecycle-management-is-the-new-feature-your-soar-technology-needs/</loc>
		<lastmod>2020-01-22T22:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/facebookery-new-year-same-missteps/</loc>
		<lastmod>2020-01-22T22:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/apple-addresses-iphone-11-location-privacy-concern/</loc>
		<lastmod>2020-01-22T23:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/recognizing-and-dealing-with-insider-risk/</loc>
		<lastmod>2020-01-22T23:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-simplify-the-complicated-iot-avast/</loc>
		<lastmod>2020-01-22T23:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-and-the-advantages-of-the-sharing-economy/</loc>
		<lastmod>2020-01-23T01:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-embedded-talents-gather-in-nuremberg/</loc>
		<lastmod>2020-01-23T03:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/unmistaken-identity-empowering-trusted-digital-signatures/</loc>
		<lastmod>2020-01-23T07:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/guest-blog-secure-and-user-friendly-digital-transactions/</loc>
		<lastmod>2020-01-23T07:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/aligning-objectives-and-strategies-to-secure-it-ot-convergence-in-manufacturing/</loc>
		<lastmod>2020-01-23T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/clearview-ai-and-facial-recognition/</loc>
		<lastmod>2020-01-23T08:33:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-state-of-vulnerabilities-in-2019/</loc>
		<lastmod>2020-01-23T08:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/swimlane-soar-platform-gets-big-performance-boost-reducing-mttd-and-mttr/</loc>
		<lastmod>2020-01-23T09:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/amd-patches-critical-vulnerabilities-in-its-radeon-graphics-cards/</loc>
		<lastmod>2020-01-23T11:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-costs-double-in-q4-as-ryuk-sodinokibi-proliferate/</loc>
		<lastmod>2020-01-23T11:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/themes-from-real-world-crypto-2020/</loc>
		<lastmod>2020-01-23T12:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/glass-class-finding-shadow-it/</loc>
		<lastmod>2020-01-23T13:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/success-of-cyber-attacks-on-u-s-govts-may-stem-from-innovation-paralysis/</loc>
		<lastmod>2020-01-23T13:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/five-microsoft-elasticsearch-servers-with-private-data-for-250-million-people-found-unsecured-online/</loc>
		<lastmod>2020-01-23T14:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shlayer-trojan-accounted-for-30-percent-of-detections-for-macos-in-2019/</loc>
		<lastmod>2020-01-23T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/untangle-survey-channel-partners-say-smb-budget-constraints-and-an-expected-increase-of-cyberattacks-in-2020-among-top-cybersecurity-concerns-2/</loc>
		<lastmod>2020-01-23T15:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-survive-a-cybersecurity-audit/</loc>
		<lastmod>2020-01-23T15:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/7-cybersecurity-predictions-for-2020/</loc>
		<lastmod>2020-01-23T15:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-importance-of-training-your-sales-team-avast/</loc>
		<lastmod>2020-01-23T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/introducing-slashnext-mobile-and-browser-phishing-protection/</loc>
		<lastmod>2020-01-23T16:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-pal-wins-pci-excellence-award-in-recognition-of-customer-success/</loc>
		<lastmod>2020-01-23T16:06:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evolving-threat-series%e2%80%8a-%e2%80%8ainfiltrating-pythons-software-supply-chain/</loc>
		<lastmod>2020-01-23T16:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evolving-threat-series%e2%80%8a-%e2%80%8abug-bounties-and-the-cobra-effect/</loc>
		<lastmod>2020-01-23T16:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evolving-threat-series-understanding-insider-attacks-part-1/</loc>
		<lastmod>2020-01-23T16:56:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evolving-threat-series%e2%80%8a-%e2%80%8ainsider-attacks-case-studies-part-2/</loc>
		<lastmod>2020-01-23T16:56:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evolving-threat-series%e2%80%8a-%e2%80%8amining-patterns-to-assess-insider-attacks-part-3/</loc>
		<lastmod>2020-01-23T16:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/december-2019-appsec-intelligence-report/</loc>
		<lastmod>2020-01-23T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-senator-ron-wydens-keynote-address-to-def-con-27/</loc>
		<lastmod>2020-01-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cookies-single-sign-on-and-you/</loc>
		<lastmod>2020-01-23T17:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-indicators-of-cyber-security-market-failure/</loc>
		<lastmod>2020-01-23T17:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mitre-attck-disk-content-wipe/</loc>
		<lastmod>2020-01-23T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-nodersok/</loc>
		<lastmod>2020-01-23T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-protect-your-business-from-ransomware/</loc>
		<lastmod>2020-01-23T17:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zero-trust-access-santa-claus-wasnt-the-only-one-working-christmas-eve/</loc>
		<lastmod>2020-01-23T17:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-the-fine-print-on-apples-privacy/</loc>
		<lastmod>2020-01-23T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-the-average-ransom-payment-doubled-in-just-three-months/</loc>
		<lastmod>2020-01-23T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-safety-and-student-data-privacy-in-k-12-schools/</loc>
		<lastmod>2020-01-23T18:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-rahul-patels-incident-lifecycle-incident-response-management-planning/</loc>
		<lastmod>2020-01-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-do-application-level-package-managers-work/</loc>
		<lastmod>2020-01-23T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mozilla-foundation-icann-directors-should-scrutinize-org-tld-sale/</loc>
		<lastmod>2020-01-23T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/online-holiday-shopping-followed-the-hot-topics-of-2019-mobile-security/</loc>
		<lastmod>2020-01-23T21:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/misconfigurations-can-happen-to-anyone-even-microsoft/</loc>
		<lastmod>2020-01-23T22:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-dormakaba-maintains-email-security-through-acquisition-after-acquisition/</loc>
		<lastmod>2020-01-23T22:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fake-americommerce-shopping-cart/</loc>
		<lastmod>2020-01-23T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/update-your-browser-to-support-tls-1-2-and-wpa2-enterprise-2/</loc>
		<lastmod>2020-01-24T00:50:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-view-of-cybersecurity-shows-clear-present-ransomware-danger/</loc>
		<lastmod>2020-01-24T04:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/steps-to-protect-your-organization-from-ransomware/</loc>
		<lastmod>2020-01-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/menlo-security-protects-organizations-from-iranian-retaliation/</loc>
		<lastmod>2020-01-24T08:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/examining-risk-in-the-corporate-environment/</loc>
		<lastmod>2020-01-24T11:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/living-off-the-land-efs-ransomware/</loc>
		<lastmod>2020-01-24T12:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/deploying-the-right-threat-intelligence-at-the-right-level/</loc>
		<lastmod>2020-01-24T14:08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-you-should-take-social-media-account-takeover-as-seriously-as-a-bec-attack/</loc>
		<lastmod>2020-01-24T14:24:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shape-officially-joins-f5-to-defend-every-app-from-fraud-and-abuse/</loc>
		<lastmod>2020-01-24T14:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/technical-report-of-the-bezos-phone-hack/</loc>
		<lastmod>2020-01-24T14:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-cybersecurity-is-like-fixing-a-leaking-pipe/</loc>
		<lastmod>2020-01-24T14:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cdataforrester-analysis-on-the-state-of-government-application-security-government-must-make-significant-advances/</loc>
		<lastmod>2020-01-24T15:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/forrester-analysis-on-the-state-of-government-application-security-government-must-make-significant-advances/</loc>
		<lastmod>2020-01-24T15:56:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/avast-still-supports-windows-7-avast/</loc>
		<lastmod>2020-01-24T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/jeff-bezos-allegedly-hacked-by-saudi-crown-prince-avast/</loc>
		<lastmod>2020-01-24T15:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/cloud-vs-on-site-radius-the-authentication-confrontation/</loc>
		<lastmod>2020-01-24T16:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/forrester-study-on-the-benefits-of-cloud-vs-on-premises-appsec/</loc>
		<lastmod>2020-01-24T16:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/russian-national-pleads-guilty-to-having-run-cardplanet-marketplace/</loc>
		<lastmod>2020-01-24T16:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-marian-schneiders-voting-systems-are-insecure-lets-just-vote-on-phones/</loc>
		<lastmod>2020-01-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-solar-system-changes/</loc>
		<lastmod>2020-01-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-kimberly-young-mclear-phd-organizational-cybernetics-a-key-to-resilience/</loc>
		<lastmod>2020-01-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/embracing-data-privacy-day/</loc>
		<lastmod>2020-01-24T19:42:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ryuk-ransomware-malware-of-the-month-january-2020/</loc>
		<lastmod>2020-01-24T20:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-lessons-from-a-division-1-football-coach/</loc>
		<lastmod>2020-01-24T20:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/synopsys-adds-world-class-security-to-finastras-banking-app-ecosystem-fusionfabric-cloud/</loc>
		<lastmod>2020-01-24T23:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/personal-online-security-account-management/</loc>
		<lastmod>2020-01-25T00:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-kate-trimbles-ideas-whose-time-has-come-cvd-sbom-and-sota/</loc>
		<lastmod>2020-01-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/daniel-storis-to-save-the-devops-world/</loc>
		<lastmod>2020-01-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-panel-discussion-with-kevin-collier-kim-zetter-eric-geller-and-moderator-maggie-macalpine-what-role-can-journalists-play-in-securing-elections/</loc>
		<lastmod>2020-01-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ohio-chief-information-officer-shares-2020-it-strategies/</loc>
		<lastmod>2020-01-26T03:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/looking-at-the-figures-of-third-party-application-security-on-websites-part-1/</loc>
		<lastmod>2020-01-26T10:10:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-step-by-step-guide-to-ss7-attacks/</loc>
		<lastmod>2020-01-26T15:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-joseph-marks-panel-discussion/</loc>
		<lastmod>2020-01-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-networking-problems/</loc>
		<lastmod>2020-01-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-kartikeya-kandulas-unclear-ballot-automated-ballot-image-manipulation/</loc>
		<lastmod>2020-01-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dark-web-fraud-and-cybercrime-with-emily-wilson/</loc>
		<lastmod>2020-01-27T05:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/who-are-the-digital-service-providers-dsp-under-the-nis-directive/</loc>
		<lastmod>2020-01-27T06:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/using-a-security-driven-network-to-address-persistent-iot-botnets/</loc>
		<lastmod>2020-01-27T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-rise-of-insider-cybersecurity-threats-cyber-work-podcast/</loc>
		<lastmod>2020-01-27T08:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/smaller-companies-need-to-step-up-their-cyber-security-efforts/</loc>
		<lastmod>2020-01-27T09:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fbi-warns-of-spoofed-websites-and-hiring-scams-that-target-your-wallet/</loc>
		<lastmod>2020-01-27T10:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/smartphone-election-in-washington-state/</loc>
		<lastmod>2020-01-27T12:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/north-carolina-water-supplier-targeted-in-international-cyberattack/</loc>
		<lastmod>2020-01-27T13:08:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/americans-want-stronger-privacy-over-easier-access-to-health-data/</loc>
		<lastmod>2020-01-27T13:16:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/bitglass-security-spotlight-mega-breach-exposes-more-than-250-million/</loc>
		<lastmod>2020-01-27T13:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ny-bills-would-ban-municipalities-from-meeting-ransomware-demands/</loc>
		<lastmod>2020-01-27T13:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/head-of-cardplanet-stolen-credit-card-marketplace-pleads-guilty-in-the-us/</loc>
		<lastmod>2020-01-27T14:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/look-out-for-these-phishy-tax-scams/</loc>
		<lastmod>2020-01-27T14:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-juice-jackers/</loc>
		<lastmod>2020-01-27T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/protecting-websites-from-magecart-and-other-in-browser-threats/</loc>
		<lastmod>2020-01-27T14:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mozilla-is-cleaning-out-its-closet-by-removing-almost-200-dodgy-firefox-add-ons/</loc>
		<lastmod>2020-01-27T14:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/costar-group-customer-case-study/</loc>
		<lastmod>2020-01-27T15:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cdataforrester-study-on-the-benefits-of-cloud-vs-on-premises-appsec/</loc>
		<lastmod>2020-01-27T16:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-5-cybersecurity-threats-to-the-uk-healthcare-sector/</loc>
		<lastmod>2020-01-27T16:12:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ciphercloud-and-cloudflare-provide-the-building-blocks-for-sase/</loc>
		<lastmod>2020-01-27T16:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-jake-brauns-lessons-learned-def-con-voting-village/</loc>
		<lastmod>2020-01-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/robert-m-lees-jeff-haas-little-bobby-comics-week-261/</loc>
		<lastmod>2020-01-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/modern-mass-surveillance-identify-correlate-discriminate/</loc>
		<lastmod>2020-01-27T18:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/russian-cybercrime-boss-burkov-pleads-guilty/</loc>
		<lastmod>2020-01-27T18:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-jason-hills-asssessing-election-infrastructure/</loc>
		<lastmod>2020-01-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/microsoft-quality-control-problems-the-litany/</loc>
		<lastmod>2020-01-27T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/improving-customer-experience-in-the-gaming-industry/</loc>
		<lastmod>2020-01-27T20:20:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/three-cybersecurity-lessons-businesses-can-learn-from-2020-presidential-campaigns/</loc>
		<lastmod>2020-01-27T20:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/whats-new-in-ethical-hacking-latest-careers-skills-and-certifications/</loc>
		<lastmod>2020-01-27T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/stopping-data-loss-is-getting-harder-as-magecart-attackers-employ-new-techniques/</loc>
		<lastmod>2020-01-27T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ie-and-firefox-patching-nightmare-begins-in-2020/</loc>
		<lastmod>2020-01-27T21:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/aws-data-exposed-on-github/</loc>
		<lastmod>2020-01-27T22:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/most-popular-cybersecurity-blog-posts-from-2019/</loc>
		<lastmod>2020-01-27T23:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/avast-explains-cybersecurity-ai-at-enigma-conference-avast/</loc>
		<lastmod>2020-01-28T01:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/taking-the-next-step-in-your-application-security-program/</loc>
		<lastmod>2020-01-28T01:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ncipher-security-executives-comment-on-data-privacy-day/</loc>
		<lastmod>2020-01-28T07:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-named-a-2020-gartner-peer-insights-customers-choice-for-network-firewalls/</loc>
		<lastmod>2020-01-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-keep-your-information-safe-for-data-privacy-day-2020/</loc>
		<lastmod>2020-01-28T08:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/third-ciso-roundtable-overview-building-a-defendable-enterprise-with-continuous-monitoring/</loc>
		<lastmod>2020-01-28T09:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-you-should-work-with-your-rivals-to-tackle-cyber-threats/</loc>
		<lastmod>2020-01-28T09:35:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/corelight-ecs-mapping-unified-zeek-data-for-more-efficient-analytics/</loc>
		<lastmod>2020-01-28T09:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-tips-for-data-privacy-day/</loc>
		<lastmod>2020-01-28T11:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-security-trends-and-predictions-to-watch-in-2020/</loc>
		<lastmod>2020-01-28T12:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-ways-your-organization-can-ensure-improved-data-security/</loc>
		<lastmod>2020-01-28T12:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/navigating-ics-security-having-your-action-plan-ready/</loc>
		<lastmod>2020-01-28T12:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/plights-of-the-round-table-strategic-lessons-from-the-casino/</loc>
		<lastmod>2020-01-28T12:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-pal-launches-pci-pal-digital-for-omnichannel-payment-security/</loc>
		<lastmod>2020-01-28T13:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/computer-science-researchers-in-texas-expose-security-risks-of-micromobility-vehicles/</loc>
		<lastmod>2020-01-28T13:07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-day-data-protection-lessons-from-the-2010s/</loc>
		<lastmod>2020-01-28T14:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-does-a-government-censor-the-internet-a-rare-peek-from-jammu-and-kashmir/</loc>
		<lastmod>2020-01-28T14:57:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-day-should-come-365-times-a-year/</loc>
		<lastmod>2020-01-28T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/automating-api-security-in-the-cloud/</loc>
		<lastmod>2020-01-28T15:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/who-do-you-trust/</loc>
		<lastmod>2020-01-28T15:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-john-odums-election-security-threats-posed-by-very-small-jurisdictions/</loc>
		<lastmod>2020-01-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zoom-bug-potentially-allowed-attackers-to-find-and-join-active-meetings/</loc>
		<lastmod>2020-01-28T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-deep-exhale-before-mobile-world-congress/</loc>
		<lastmod>2020-01-28T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/change-your-password/</loc>
		<lastmod>2020-01-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/persistent-vs-non-persistent-vm-the-pros-and-cons-to-each/</loc>
		<lastmod>2020-01-28T18:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mission-possible-cybersecurity-posture-transformation/</loc>
		<lastmod>2020-01-28T18:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-evilgnome/</loc>
		<lastmod>2020-01-28T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wireshark-for-incident-response-101/</loc>
		<lastmod>2020-01-28T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/huawei-set-for-limited-uk-5g-role-but-can-we-trust-huawei/</loc>
		<lastmod>2020-01-28T18:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-ion-sanchos-the-factors-preventing-fair-effective-and-secure-elections/</loc>
		<lastmod>2020-01-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/armis-check-point-team-up-to-deliver-unmatched-security-for-iot-devices/</loc>
		<lastmod>2020-01-28T18:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-decrypt-whatsapp-end-to-end-media-files/</loc>
		<lastmod>2020-01-28T19:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sans-cyber-threat-intelligence-summit-2020-a-recap/</loc>
		<lastmod>2020-01-28T19:54:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/privacy-still-eroding-on-national-data-privacy-day/</loc>
		<lastmod>2020-01-28T20:00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/uncovering-vulnerabilities-in-open-source-libraries/</loc>
		<lastmod>2020-01-28T20:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-amazons-ring-is-not-a-security-hardware-company/</loc>
		<lastmod>2020-01-28T20:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wawa-breach-may-have-compromised-more-than-30-million-payment-cards/</loc>
		<lastmod>2020-01-28T20:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fake-jobs-cybercriminals-prey-on-job-seekers-via-fake-job-postings/</loc>
		<lastmod>2020-01-28T20:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/your-device-is-the-weakest-link/</loc>
		<lastmod>2020-01-28T20:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-in-the-us/</loc>
		<lastmod>2020-01-28T20:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/research-more-worries-with-wasm-3/</loc>
		<lastmod>2020-01-28T20:49:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/theres-no-evidence-the-saudis-hacked-jeff-bezoss-iphone/</loc>
		<lastmod>2020-01-28T21:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/its-data-privacy-and-protection-day/</loc>
		<lastmod>2020-01-28T23:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/hacked-website-threat-report-2019/</loc>
		<lastmod>2020-01-28T23:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/appsec-ca-2020-is-in-the-books-and-it-was-terrific/</loc>
		<lastmod>2020-01-29T04:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-privacy-day-you-get-out-of-data-privacy-what-you-put-in/</loc>
		<lastmod>2020-01-29T05:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/its-data-privacy-day-how-to-make-your-business-more-secure/</loc>
		<lastmod>2020-01-29T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-practical-ethical-and-compliance-challenges-of-data-privacy/</loc>
		<lastmod>2020-01-29T05:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-to-attend-himss-2020-as-a-veteran-exhibitor/</loc>
		<lastmod>2020-01-29T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/customer-tracking-at-ralphs-grocery-store/</loc>
		<lastmod>2020-01-29T12:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/six-signs-you-have-a-great-cybersecurity-culture/</loc>
		<lastmod>2020-01-29T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-future-of-endpoint-security-and-other-cyber-controls/</loc>
		<lastmod>2020-01-29T12:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/mdr-is-integral-to-the-future-of-cybersecurity/</loc>
		<lastmod>2020-01-29T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/monitoring-website-ssl-tls-certificate-expiration-times-with-r-openssl-pushoverr-and-dt/</loc>
		<lastmod>2020-01-29T12:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rethinking-your-digital-identity-in-2020/</loc>
		<lastmod>2020-01-29T13:58:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/bricata-names-john-becker-executive-chair-of-its-board-of-directors/</loc>
		<lastmod>2020-01-29T14:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/podcast-episode-01-what-attack-surface-means-in-2020/</loc>
		<lastmod>2020-01-29T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/payment-cards-exposed-in-wawa-breach-offered-for-sale-on-dark-web/</loc>
		<lastmod>2020-01-29T14:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-software-composition-analysis-and-your-dentist-have-in-common/</loc>
		<lastmod>2020-01-29T14:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-traffic-analysis-for-ir-analyzing-ddos-attacks/</loc>
		<lastmod>2020-01-29T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybercrime-investigator-resume-tips/</loc>
		<lastmod>2020-01-29T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/americans-would-pay-up-front-to-keep-their-online-identity-and-data-private/</loc>
		<lastmod>2020-01-29T15:36:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-must-reads-for-cmmc-insight-2/</loc>
		<lastmod>2020-01-29T15:37:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/zero-trust-network-access-with-bitglass/</loc>
		<lastmod>2020-01-29T15:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/correlating-and-remediating-security-risks-at-scale-is-vital-to-devops/</loc>
		<lastmod>2020-01-29T16:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/creating-broader-understanding-and-more-widespread-adoption-of-encryption-is-a-journey/</loc>
		<lastmod>2020-01-29T16:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/securelink-for-healthcare-targets-vendor-access-management/</loc>
		<lastmod>2020-01-29T16:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-jack-cables-bootstrapping-vulnerability-disclosure-for-election-systems/</loc>
		<lastmod>2020-01-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/xkcd-reaction-maps/</loc>
		<lastmod>2020-01-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/from-my-gartner-blog-updated-paper-on-penetration-testing-and-red-teams/</loc>
		<lastmod>2020-01-29T18:36:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-dr-philip-starks-trustworthy-elections-evidence-and-dispute-resolution/</loc>
		<lastmod>2020-01-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sprint-exposed-customer-support-site-to-web/</loc>
		<lastmod>2020-01-29T19:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pci-dss-compliance-isnt-security-but-security-can-boost-compliance/</loc>
		<lastmod>2020-01-29T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/three-devsecops-lessons-drawn-from-conversations-with-45-cisos/</loc>
		<lastmod>2020-01-29T20:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/openbsd-opensmtpd-remote-code-execution-vulnerability-cve-2020-7247/</loc>
		<lastmod>2020-01-29T21:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/managedmethods-recognized-in-built-in-colorados-2020-best-places-to-work/</loc>
		<lastmod>2020-01-29T22:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/guest-essay-strategic-tactics-are-key-to-a-robust-cloud-security-posture-management-regime/</loc>
		<lastmod>2020-01-29T23:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/crikey-it-be-creepy/</loc>
		<lastmod>2020-01-29T23:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/on-authorization-and-implementation-of-access-control-models/</loc>
		<lastmod>2020-01-30T05:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/3-cyberthreats-facing-federal-and-state-governments-in-2020/</loc>
		<lastmod>2020-01-30T06:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ncipher-security-more-americans-trust-encryption-than-know-what-it-is/</loc>
		<lastmod>2020-01-30T09:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/state-of-soar/</loc>
		<lastmod>2020-01-30T09:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/is-cyber-insurance-a-substitute-for-cybersecurity/</loc>
		<lastmod>2020-01-30T11:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/3-home-security-tips-and-guidelines-you-never-thought-of/</loc>
		<lastmod>2020-01-30T12:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/protect-your-passwords-upgrade-your-cybersecurity/</loc>
		<lastmod>2020-01-30T12:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-push-for-washingtons-privacy-bill-in-2020/</loc>
		<lastmod>2020-01-30T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rawcap-redux/</loc>
		<lastmod>2020-01-30T14:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/protonmail-and-startmail-blocked-as-russia-hunts-for-bomb-threat-spammers/</loc>
		<lastmod>2020-01-30T14:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/collating-hacked-data-sets/</loc>
		<lastmod>2020-01-30T14:39:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/introducing-the-art-of-recognizing-and-surviving-soc-burnout-a-complete-manual-for-security-operations-professionals-interactive-e-book/</loc>
		<lastmod>2020-01-30T15:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-nhs-has-suffered-only-six-ransomware-attacks-since-the-wannacry-worm-investigation-reveals/</loc>
		<lastmod>2020-01-30T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ryuk-reportedly-behind-ransomware-infection-at-dod-contractor/</loc>
		<lastmod>2020-01-30T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-one-company-rebuffed-its-ransomware-aggressors-and-froze-their-1m-bitcoin-wallet/</loc>
		<lastmod>2020-01-30T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/run-up-to-the-tokyo-olympics-teleworking-threats-in-the-security-spotlight/</loc>
		<lastmod>2020-01-30T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/direct-memory-access-attacks-a-walk-down-memory-lane/</loc>
		<lastmod>2020-01-30T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-iframes-alone-wont-stop-web-skimming-attacks-from-stealing-customer-data/</loc>
		<lastmod>2020-01-30T16:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-alex-stanevs-machine-voting-the-bulgarian-experience/</loc>
		<lastmod>2020-01-30T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/commitstrip-when-i-get-the-results-from-the-security-audit/</loc>
		<lastmod>2020-01-30T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/is-vdi-cost-effective-vs-win10-laptops/</loc>
		<lastmod>2020-01-30T18:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-cybersecurity-marketer-of-the-year-nominees-and-judges-announced/</loc>
		<lastmod>2020-01-30T18:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/will-iran-launch-cyberattack-on-us-avast/</loc>
		<lastmod>2020-01-30T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-message-from-ceo-ondrej-vlcek-avast/</loc>
		<lastmod>2020-01-30T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/our-commitment-to-responsible-data-use-avast/</loc>
		<lastmod>2020-01-30T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-amber-mcreynolds-putting-voters-first-expanding-options-to-vote/</loc>
		<lastmod>2020-01-30T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sleep-as-a-service-redefining-saas/</loc>
		<lastmod>2020-01-30T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/malware-spotlight-droppers/</loc>
		<lastmod>2020-01-30T19:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/network-traffic-analysis-for-ir-ssh-protocol-with-wireshark/</loc>
		<lastmod>2020-01-30T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-do-i-need-a-binary-repository-manager/</loc>
		<lastmod>2020-01-30T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/certificate-security-for-iot-devices/</loc>
		<lastmod>2020-01-30T20:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/nsa-offers-guidance-for-improving-cloud-security/</loc>
		<lastmod>2020-01-30T21:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/digicert-leads-initiative-to-enhance-ev-ssl-certificates/</loc>
		<lastmod>2020-01-30T21:23:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-continuing-story-of-bad-corporate-behavior-avast-antivirus-subsidiary-now-shuttering/</loc>
		<lastmod>2020-01-30T22:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/trickbot-trojan-leveraging-a-new-windows-10-uac-bypass/</loc>
		<lastmod>2020-01-30T23:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-phishing-has-evolved-and-three-ways-to-prevent-attacks/</loc>
		<lastmod>2020-01-31T00:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-zeppelin-ransomware-steps-to-prepare-respond-and-prevent-infection/</loc>
		<lastmod>2020-01-31T00:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-basics-of-iga-roi-how-to-show-value-in-identity-governance/</loc>
		<lastmod>2020-01-31T00:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/exploiting-citrix-application-delivery-controller-adc-and-gateway-cve-2019-19781-with-core-impact/</loc>
		<lastmod>2020-01-31T00:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-the-cmmc-and-how-can-you-prepare-for-it/</loc>
		<lastmod>2020-01-31T00:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/reversing-and-exploiting-with-free-tools-part-2/</loc>
		<lastmod>2020-01-31T00:21:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cloud-watching-ensuring-security-in-every-cloud-environment/</loc>
		<lastmod>2020-01-31T00:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cloud-misconfiguration-and-the-curse-of-the-inadvertent-employee/</loc>
		<lastmod>2020-01-31T00:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/when-security-becomes-a-devops-blind-spot/</loc>
		<lastmod>2020-01-31T00:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-is-multi-tenancy-important-in-a-siem-solution/</loc>
		<lastmod>2020-01-31T00:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/understanding-and-executing-compliance-audits/</loc>
		<lastmod>2020-01-31T02:25:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/virsec-2020-cybersecurity-predictions/</loc>
		<lastmod>2020-01-31T03:20:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/voting-by-smartphone-jeff-bezos-hacked-microsoft-security-breach/</loc>
		<lastmod>2020-01-31T05:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-prevent-cookie-stealing-and-hijacking-sessions-easiest-guide/</loc>
		<lastmod>2020-01-31T05:39:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-steps-to-fix-adminer-vulnerability-exploits-adminer-php-hack/</loc>
		<lastmod>2020-01-31T05:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-add-google-adsense-to-your-wordpress-site-complete-guide/</loc>
		<lastmod>2020-01-31T05:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-whitelist-an-ip-address-step-by-step-guide/</loc>
		<lastmod>2020-01-31T05:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/fortinet-at-rsa-2020-building-the-secure-network-of-tomorrow/</loc>
		<lastmod>2020-01-31T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/android-malware-targets-diabetic-patients/</loc>
		<lastmod>2020-01-31T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iot-denial-of-service-and-the-mno-opportunity/</loc>
		<lastmod>2020-01-31T08:37:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-7-imsi-catcher-detection-solutions-for-2020/</loc>
		<lastmod>2020-01-31T09:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/change-is-inevitable-tripwire-file-analyzer/</loc>
		<lastmod>2020-01-31T12:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/windows-7-gets-new-final-update-to-fix-the-previous-final-update/</loc>
		<lastmod>2020-01-31T13:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/it-auditors-in-the-spotlight/</loc>
		<lastmod>2020-01-31T13:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/symbolically-executing-webassembly-in-manticore/</loc>
		<lastmod>2020-01-31T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/alphabay-dark-web-market-moderator-faces-up-to-20-years-in-prison/</loc>
		<lastmod>2020-01-31T14:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/best-practices-and-practical-steps-to-guide-your-appsec-journey/</loc>
		<lastmod>2020-01-31T15:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/20000-up-for-grabs-in-xbox-live-security-hole-hunt/</loc>
		<lastmod>2020-01-31T15:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/social-media-phishing-beyond-credential-theft/</loc>
		<lastmod>2020-01-31T15:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-evanna-hus-while-the-bots-distracted-you-overt-russian-information-ops/</loc>
		<lastmod>2020-01-31T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-joy-of-tech-keep-calm-about-coronavirus/</loc>
		<lastmod>2020-01-31T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/uk-high-court-approves-freezing-injunction-on-1m-ransomware-payment/</loc>
		<lastmod>2020-01-31T18:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/eap-tls-vs-peap-mschapv2-which-authentication-protocol-is-superior/</loc>
		<lastmod>2020-01-31T17:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/gleaning-lessons-from-las-vegas-thwarted-cyberattack/</loc>
		<lastmod>2020-01-31T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/def-con-27-voting-village-secretary-alex-padillas-noah-praetz-barb-byrums-amber-mcreynolds-eric-gellers-state-and-local-preparations-on-election-security/</loc>
		<lastmod>2020-01-31T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/webinars-open-source-management-and-secure-development/</loc>
		<lastmod>2020-01-31T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/exculpated-the-iowa-confusion/</loc>
		<lastmod>2020-01-31T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/if-youre-in-cybersecurity-you-need-to-be-at-rsa-2020/</loc>
		<lastmod>2020-01-31T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/imperva-received-top-scores-in-gartners-critical-capabilities-for-cloud-web-application-firewalls/</loc>
		<lastmod>2020-01-31T20:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/iowa-prosecutors-drop-charges-against-men-hired-to-test-their-security/</loc>
		<lastmod>2020-01-31T21:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/password-attacks-101/</loc>
		<lastmod>2020-01-31T21:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ccpa-salesforce-administrators-must-rethink-backup/</loc>
		<lastmod>2020-01-31T21:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-deal-with-orphaned-accounts-in-your-business/</loc>
		<lastmod>2020-01-31T23:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rethinking-endpoint-and-mobile-security-for-remote-workers/</loc>
		<lastmod>2020-02-01T00:22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-voting-village-christopher-krebs-director-of-dhs-cisa/</loc>
		<lastmod>2020-02-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-worst-thing-that-could-happen/</loc>
		<lastmod>2020-02-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-voting-village-dr-linton-salmons-the-darpa-ssith-program/</loc>
		<lastmod>2020-02-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/everyones-creating-fake-social-media-accounts-including-homeland-security/</loc>
		<lastmod>2020-02-02T07:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-voting-village-brian-varners-beyond-the-voting-machine-other-high-value-targets/</loc>
		<lastmod>2020-02-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-facebook-the-game/</loc>
		<lastmod>2020-02-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-william-suthers-pie-hw-based-prebellico-intel-exfiltration-botnet/</loc>
		<lastmod>2020-02-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-security-roundup-for-february-2020/</loc>
		<lastmod>2020-02-02T20:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/coronavirus-scams-prepare-for-phishing-emails-fake-alerts-and-cyberthreats/</loc>
		<lastmod>2020-02-02T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/off-facebook-activity-tool-ring-app-third-party-trackers-wawa-credit-card-breach/</loc>
		<lastmod>2020-02-03T05:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-asset-visibility-is-essential-to-the-security-of-your-industrial-environment/</loc>
		<lastmod>2020-02-03T06:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/assessment-frameworks-for-nis-directive-compliance/</loc>
		<lastmod>2020-02-03T06:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/secure-sd-wan-is-essential-to-accelerate-the-on-ramping-of-branch-offices/</loc>
		<lastmod>2020-02-03T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-named-a-2020-gartner-peer-insights-customers-choice-for-wired-and-wireless-lan-access-infrastructure-solutions/</loc>
		<lastmod>2020-02-03T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/my-take-irans-cyber-retaliation-for-soleimani-assassination-continues-to-ramp-up/</loc>
		<lastmod>2020-02-03T09:20:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-round-up-of-data-breaches-in-january-2020/</loc>
		<lastmod>2020-02-03T09:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/emotet-operators-are-using-wuhan-virus-info-to-spread-malware/</loc>
		<lastmod>2020-02-03T10:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/another-boeing-software-glitch/</loc>
		<lastmod>2020-02-03T11:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/january-threat-report/</loc>
		<lastmod>2020-02-03T11:41:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/hitrust-and-tripwire-partner-to-help-healthcare-organizations-mature-their-cybersecurity-practices/</loc>
		<lastmod>2020-02-03T11:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/attacking-driverless-cars-with-projected-images/</loc>
		<lastmod>2020-02-03T12:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/email-attackers-abusing-coronavirus-outbreak-to-spread-emotet/</loc>
		<lastmod>2020-02-03T14:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-administrative-overhead-in-your-it-compliance-program-is-a-hidden-threat-to-your-security/</loc>
		<lastmod>2020-02-03T15:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-your-front-door-secure/</loc>
		<lastmod>2020-02-03T15:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2013/06/RSACE-Earlybird-915x90.jpg</image:loc>
			<image:caption><![CDATA[is your front door secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-cybersecurity-lessons-for-e-commerce-website-administrators/</loc>
		<lastmod>2020-02-03T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ethical-hacking-wireless-hacking-with-kismet/</loc>
		<lastmod>2020-02-03T16:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-wicked-clown-s-finding-the-needle-in-the-twitter-haystack/</loc>
		<lastmod>2020-02-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ensuring-security-in-an-ever-increasing-data-hungry-world/</loc>
		<lastmod>2020-02-03T17:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-parker-solar-probe/</loc>
		<lastmod>2020-02-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/public-wifi-is-actually-still-pretty-dangerous/</loc>
		<lastmod>2020-02-03T18:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-utku-sens-generating-personalized-wordlists-by-analyzing-targets-tweets/</loc>
		<lastmod>2020-02-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/sec-releases-infosec-roadmap-for-glba-entities/</loc>
		<lastmod>2020-02-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ask-the-experts-whats-most-rewarding-about-your-career-in-cyber-security/</loc>
		<lastmod>2020-02-03T20:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/geolocation-and-dns-traffic-management/</loc>
		<lastmod>2020-02-03T21:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/securing-windows-10-with-local-group-policy/</loc>
		<lastmod>2020-02-03T21:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/reverse-engineering-and-malware-analysis-tools/</loc>
		<lastmod>2020-02-03T21:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-mitigate-the-most-common-cloud-vulnerabilities/</loc>
		<lastmod>2020-02-03T21:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/untangle-expands-global-reach-with-sint-technology-distribution-partnership-3/</loc>
		<lastmod>2020-02-03T22:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-shellcode-for-the-masses/</loc>
		<lastmod>2020-02-03T22:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fixing-uncommon-download-warnings-in-google-search-console/</loc>
		<lastmod>2020-02-04T02:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/coronavirus-scams-phishing-fake-alerts-and-cyberthreats/</loc>
		<lastmod>2020-02-04T03:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/using-the-mixmode-query-language-to-integrate-with-splunk/</loc>
		<lastmod>2020-02-04T07:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/another-metamorfo-variant-targeting-customers-of-financial-institutions-in-more-countries/</loc>
		<lastmod>2020-02-04T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-changing-face-of-data-security-in-australia-and-new-zealand/</loc>
		<lastmod>2020-02-04T08:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-ncipher-security-nshield-container-option-pack/</loc>
		<lastmod>2020-02-04T08:16:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/endpoint-detection-and-response-securing-your-borders/</loc>
		<lastmod>2020-02-04T09:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/channel-partners-conference-expo/</loc>
		<lastmod>2020-02-04T10:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-protocol-thats-putting-enterprise-iot-at-extreme-risk/</loc>
		<lastmod>2020-02-04T10:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/man-admits-hacking-nintendo-leaking-details-of-switch-games-console/</loc>
		<lastmod>2020-02-04T11:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-accidentally-sent-users-private-videos-to-strangers-in-stunning-takeout-mix-up/</loc>
		<lastmod>2020-02-04T11:51:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tripwire-patch-priority-index-for-january-2020/</loc>
		<lastmod>2020-02-04T11:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nice-incontact-interactions-2020-customer-conference/</loc>
		<lastmod>2020-02-04T12:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-research-on-the-adtech-industry/</loc>
		<lastmod>2020-02-04T12:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/industrial-cybersecurity-needs-broad-deep-ot-iot-threat-visibility-2/</loc>
		<lastmod>2020-02-04T13:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pci-compliance-for-the-public-sector/</loc>
		<lastmod>2020-02-04T13:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-high-cost-of-password-expiration-policies/</loc>
		<lastmod>2020-02-04T13:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/akamai-attends-the-massachusetts-clean-energy-preview-with-governor-baker/</loc>
		<lastmod>2020-02-04T14:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/iranian-backed-apt34-tries-to-compromise-company-linked-to-u-s-government/</loc>
		<lastmod>2020-02-04T14:45:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/spam-campaign-leveraged-rtf-documents-to-spread-infostealers/</loc>
		<lastmod>2020-02-04T15:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-series-ready-for-a-cloud-centric-approach-to-digital-identity/</loc>
		<lastmod>2020-02-04T16:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/marketers-have-you-talked-to-your-it-team-about-your-email-deliverability-and-open-rates-hint-you-should/</loc>
		<lastmod>2020-02-04T16:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/accidental-breaches-a-top-concern-for-it-security-professionals/</loc>
		<lastmod>2020-02-04T16:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-susans-social-media-the-new-court-of-public-opinion/</loc>
		<lastmod>2020-02-04T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/preventing-interceptions-in-the-cybersecurity-super-bowl/</loc>
		<lastmod>2020-02-04T17:27:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/its-okay-were-all-on-the-samesite/</loc>
		<lastmod>2020-02-04T18:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-desktop-as-a-service-daas-security-risks/</loc>
		<lastmod>2020-02-04T17:45:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-it-security-conferences-you-should-attend-in-2020/</loc>
		<lastmod>2020-02-04T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/4-predictions-for-2020-looking-into-the-regulatory-crystal-ball/</loc>
		<lastmod>2020-02-04T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-progress/</loc>
		<lastmod>2020-02-04T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-ncipher-security-web-services-option-pack-reasons-to-be-cheerful123/</loc>
		<lastmod>2020-02-04T18:02:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/genesys-xperience-2020/</loc>
		<lastmod>2020-02-04T18:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-seyfullah-kilis-osint-approach-in-big-data/</loc>
		<lastmod>2020-02-04T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-life-that-is-well-worth-honoring/</loc>
		<lastmod>2020-02-04T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-infocyte-is-helping-prevent-election-hacking-in-texas-with-election-security-assessments/</loc>
		<lastmod>2020-02-04T20:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-nsa-says/</loc>
		<lastmod>2020-02-04T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/todays-weather-and-the-evolution-of-cybersecurity/</loc>
		<lastmod>2020-02-04T20:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/growing-medical-device-sophistication-opens-security-issues/</loc>
		<lastmod>2020-02-04T20:33:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-your-personal-healthcare-data-in-danger/</loc>
		<lastmod>2020-02-04T21:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/booter-boss-busted-by-bacon-pizza-buy/</loc>
		<lastmod>2020-02-04T23:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/anatomy-of-a-continuous-delivery-pipeline/</loc>
		<lastmod>2020-02-04T23:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-3-biggest-mistakes-universities-make-with-wpa2-enterprise/</loc>
		<lastmod>2020-02-05T00:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/which-application-security-tools-should-you-choose/</loc>
		<lastmod>2020-02-05T04:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-log-management-and-why-is-it-important/</loc>
		<lastmod>2020-02-05T04:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/debugging-basics/</loc>
		<lastmod>2020-02-05T04:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/application-management-in-windows-10/</loc>
		<lastmod>2020-02-05T04:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/2019-global-ddos-threat-landscape-report/</loc>
		<lastmod>2020-02-05T07:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/wordpress-malvertising-campaign-how-to-protect-your-website-against-it/</loc>
		<lastmod>2020-02-05T09:18:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-set-up-x-xss-http-security-headers-in-wordpress/</loc>
		<lastmod>2020-02-05T09:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/revslider-exploit-how-to-fix-revslider-vulnerability-protect-your-website/</loc>
		<lastmod>2020-02-05T09:19:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/twitter-discovers-attackers-trying-to-match-usernames-and-phone-numbers/</loc>
		<lastmod>2020-02-05T10:49:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-does-a-business-become-a-champion-in-cyber-resilience/</loc>
		<lastmod>2020-02-05T11:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nmap-for-beginners-part-2/</loc>
		<lastmod>2020-02-05T13:37:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/risky-science-of-risk-assessment/</loc>
		<lastmod>2020-02-05T13:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/us-wireless-carriers-shared-customer-location-data-with-third-parties/</loc>
		<lastmod>2020-02-05T14:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ethical-hacking-byod-vulnerabilities/</loc>
		<lastmod>2020-02-05T14:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mitre-attck-endpoint-denial-of-service/</loc>
		<lastmod>2020-02-05T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/youtube-takes-new-measures-to-combat-disinformation-ahead-of-us-elections/</loc>
		<lastmod>2020-02-05T14:37:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/strengthen-data-security-and-governance-with-metadata/</loc>
		<lastmod>2020-02-05T15:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/healthcare-data-the-new-prize-for-hackers/</loc>
		<lastmod>2020-02-05T15:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/companies-need-cybersecurity-that-just-works/</loc>
		<lastmod>2020-02-05T15:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/understanding-data-privacy-and-why-it-needs-to-be-a-priority-for-your-business/</loc>
		<lastmod>2020-02-05T15:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/sitdown-with-a-soc-star-11-questions-with-chris-elliot-of-hulu/</loc>
		<lastmod>2020-02-05T16:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ddos-attack-potentially-targeted-state-voter-registration-site-says-fbi/</loc>
		<lastmod>2020-02-05T16:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-robert-sells-hack-the-planet-hackers-influencing-positive-change/</loc>
		<lastmod>2020-02-05T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-cicadas/</loc>
		<lastmod>2020-02-05T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/extending-black-ducks-capability-with-red-hat-openshift-to-scan-red-hat-quay-images/</loc>
		<lastmod>2020-02-05T18:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/checkmarx-research-a-race-condition-in-kubernetes/</loc>
		<lastmod>2020-02-05T18:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pots-protective-optimization-technologies-may-the-algorithm-be-with-you/</loc>
		<lastmod>2020-02-05T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/10-ways-url-analysis-enrichment-can-help-ease-your-socs-challenges-in-2020/</loc>
		<lastmod>2020-02-05T20:53:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-11-best-cyber-security-books-recommendations-from-the-experts/</loc>
		<lastmod>2020-02-05T21:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ics-components/</loc>
		<lastmod>2020-02-05T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-malware-obfuscation/</loc>
		<lastmod>2020-02-05T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-i-made-600-in-bug-bounty-in-15-minutes-with-contrast-ce-cve-2019-8442/</loc>
		<lastmod>2020-02-05T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/6-simple-steps-for-hardening-your-wordpress-security/</loc>
		<lastmod>2020-02-05T22:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-report-on-nerc-cip-standards/</loc>
		<lastmod>2020-02-05T23:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-joe-grays-decepticon-deceptive-techniques-to-derail-osint-attempts/</loc>
		<lastmod>2020-02-05T23:45:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/when-your-used-car-is-a-little-too-mobile/</loc>
		<lastmod>2020-02-06T00:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/salesforce-com-and-hanna-andersson-data-breach-lawsuit-among-the-first-to-cite-the-ccpa/</loc>
		<lastmod>2020-02-06T01:02:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-challenge-of-bias-in-ai-creating-ethical-guidelines/</loc>
		<lastmod>2020-02-06T08:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-future-of-soar/</loc>
		<lastmod>2020-02-06T09:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/privacy-laws-achieving-and-maintaining-compliance/</loc>
		<lastmod>2020-02-06T10:19:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/dutch-university-pays-220000-ransom-to-infamous-russian-cybercrime-ring/</loc>
		<lastmod>2020-02-06T10:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-apply-the-nist-cybersecurity-framework-in-k-12-school-districts/</loc>
		<lastmod>2020-02-06T11:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-your-network-could-be-hacked-through-a-philips-hue-smart-bulb/</loc>
		<lastmod>2020-02-06T13:39:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/coordinating-efforts-for-more-effective-security-and-compliance/</loc>
		<lastmod>2020-02-06T14:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/sandboxing-in-cyber-security-how-does-it-fit-in-your-stack/</loc>
		<lastmod>2020-02-06T15:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/emotet-attacks-a-spike-to-start-the-year/</loc>
		<lastmod>2020-02-06T15:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-remove-timthumb-hack-from-wordpress-website/</loc>
		<lastmod>2020-02-06T16:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-your-screens-brightness-could-be-leaking-data-from-your-air-gapped-computer/</loc>
		<lastmod>2020-02-06T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/university-of-maastricht-paid-30-bitcoins-to-ransomware-attackers/</loc>
		<lastmod>2020-02-06T16:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-grass-is-greener-syndrome-of-modern-socs/</loc>
		<lastmod>2020-02-06T16:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/prying-r-script-files-away-from-xcode-et-al-on-macos/</loc>
		<lastmod>2020-02-06T16:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-kala-kinyons-use-responsibly-recon-like-an-insider-threat-for-best-user-training/</loc>
		<lastmod>2020-02-06T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ethical-hacking-iot-hacking-tools/</loc>
		<lastmod>2020-02-06T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/4-times-a-security-breach-was-narrowly-avoided/</loc>
		<lastmod>2020-02-06T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-isnt-a-four-letter-word-how-infrastructure-as-code-amplifies-devops-through-the-inclusion-of-security/</loc>
		<lastmod>2020-02-06T17:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/discover-how-to-strengthen-supply-chain-trust-with-tcg-at-rsa-conference-2020/</loc>
		<lastmod>2020-02-06T17:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-satellite/</loc>
		<lastmod>2020-02-06T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-martin-vigos-from-email-address-to-phone-number/</loc>
		<lastmod>2020-02-06T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/anchore-federal-streamlines-government-devsecops-workflows/</loc>
		<lastmod>2020-02-06T19:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ics-strengths-and-weaknesses-from-security-perspective/</loc>
		<lastmod>2020-02-06T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/access-control-implementation-in-ics/</loc>
		<lastmod>2020-02-06T19:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/we-respect-your-privacy/</loc>
		<lastmod>2020-02-06T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-msps-should-care-about-cybersecurity/</loc>
		<lastmod>2020-02-06T20:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/network-data-the-best-source-for-actionable-data-in-cybersecurity/</loc>
		<lastmod>2020-02-06T21:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/it-legal-compliance-we-need-to-talk/</loc>
		<lastmod>2020-02-06T22:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/best-practices-for-iot-security/</loc>
		<lastmod>2020-02-06T21:07:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/creative-phishing-for-digital-gold-on-runescape/</loc>
		<lastmod>2020-02-06T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/dejablue-vulnerabilities-in-windows-7-to-windows-10-cve-2019-1181-and-cve-2019-1182/</loc>
		<lastmod>2020-02-07T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mfa-zero-trust-passwordless-and-more-blogs-you-loved-in-2019/</loc>
		<lastmod>2020-02-07T01:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/snake-ransomware-is-raising-concerns-for-industrial-controls-systems-2/</loc>
		<lastmod>2020-02-07T08:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-publish-java-artifacts-to-nexus-using-jenkins-and-maven/</loc>
		<lastmod>2020-02-07T12:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/gaming-became-industry-most-affected-by-ddos-attacks-in-2019/</loc>
		<lastmod>2020-02-07T13:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fbi-outlines-technique-behind-ddos-attacks-on-us-voter-registration-website/</loc>
		<lastmod>2020-02-07T13:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/infrastructure-of-australian-transportation-company-infected-with-mailto-ransomware/</loc>
		<lastmod>2020-02-07T14:16:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/designing-the-smart-experience-at-akamai-hq/</loc>
		<lastmod>2020-02-07T16:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-master-chens-a-url-shortened-by-any-other-name/</loc>
		<lastmod>2020-02-07T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ccpa-no-extensions-no-excuses/</loc>
		<lastmod>2020-02-07T17:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-a-sympathy-card-from-canada/</loc>
		<lastmod>2020-02-07T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-malware-trends-to-watch-out-for-in-2020/</loc>
		<lastmod>2020-02-07T18:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-in-2020-revisited/</loc>
		<lastmod>2020-02-07T18:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-mitchell-parkers-building-osint-and-recon-program-to-address-healthcare/</loc>
		<lastmod>2020-02-07T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/insecurity-podcast-kip-boyle-a-security-sherpa-at-your-service/</loc>
		<lastmod>2020-02-07T20:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/three-different-ways-teens-can-get-phished/</loc>
		<lastmod>2020-02-07T20:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-ryan-permeh-on-leading-ai-innovation-at-blackberry/</loc>
		<lastmod>2020-02-07T20:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/video-damon-motorcycles-blackberry-and-the-safe-and-secure-200-mph-electric-superbike/</loc>
		<lastmod>2020-02-07T20:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-not-all-artificial-intelligence-is-created-equal/</loc>
		<lastmod>2020-02-07T20:51:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rsa-conference-2020-blackberry-cylance-intelligent-security-everywhere/</loc>
		<lastmod>2020-02-07T20:51:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/artificial-intelligence-in-the-enterprise-the-race-is-on/</loc>
		<lastmod>2020-02-07T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/insecurity-podcast-jordan-devries-yes-user-experience-really-is-that-important/</loc>
		<lastmod>2020-02-07T20:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-teens-take-on-cyberbullying/</loc>
		<lastmod>2020-02-07T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/insecurity-podcast-mixtape-the-year-that-was-2019-volume-two/</loc>
		<lastmod>2020-02-07T20:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/blackberry-cylance-integration-with-safebreach-delivers-automated-enterprise-endpoint-security-validation/</loc>
		<lastmod>2020-02-07T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/using-cots-products-to-visualize-vehicle-data-and-more/</loc>
		<lastmod>2020-02-07T20:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/insecurity-podcast-mixtape-the-year-that-was-2019-volume-one/</loc>
		<lastmod>2020-02-07T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-to-keep-employees-safe-from-phishing-campaigns/</loc>
		<lastmod>2020-02-07T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/john-mcclurg-securing-data-all-over-the-world-and-beyond/</loc>
		<lastmod>2020-02-07T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/shaun-stalker-cybersecurity-in-a-dynamic-and-ever-changing-world/</loc>
		<lastmod>2020-02-07T21:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/christopher-bray-when-risk-travels-from-office-to-home/</loc>
		<lastmod>2020-02-07T21:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/threat-spotlight-amadey-bot-targets-non-russian-users/</loc>
		<lastmod>2020-02-07T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/blackberry-is-driving-the-connected-future-with-innovative-ai-based-automotive-solution/</loc>
		<lastmod>2020-02-07T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/blackberry-and-aws-present-secure-intelligent-connected-vehicle-software-platform-at-ces/</loc>
		<lastmod>2020-02-07T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/webinars-black-duck-on-vmware-cloud-and-open-source-scans/</loc>
		<lastmod>2020-02-07T21:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-to-do-when-you-need-appsec-right-now/</loc>
		<lastmod>2020-02-07T22:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/eff-report-amazons-ring-app-distributing-pii-to-3rd-parties/</loc>
		<lastmod>2020-02-07T22:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/security-instrumentation-for-industrial-control-systems-ics-environments/</loc>
		<lastmod>2020-02-08T03:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/verodin-helps-to-enforce-security-during-mergers-and-acquisitions/</loc>
		<lastmod>2020-02-08T03:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/activecyber-verodin-sets-the-pace-in-the-emerging-security-instrumentation-market-by-tracey-moon/</loc>
		<lastmod>2020-02-08T03:59:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-richard-golds-asset-discovery-making-sense-of-the-ocean-of-osint/</loc>
		<lastmod>2020-02-08T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-anthony-roses-hack-to-basics-adapting-exploit-frameworks-to-evade-microsoft-atp/</loc>
		<lastmod>2020-02-08T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-tax-ai/</loc>
		<lastmod>2020-02-08T21:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-will-we-learn-from-the-iowa-caucus-app/</loc>
		<lastmod>2020-02-09T12:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/compiling-a-dll-using-minggw/</loc>
		<lastmod>2020-02-09T14:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-bug-crowds-lets-get-technical-and-hunt-harder/</loc>
		<lastmod>2020-02-09T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/robert-m-lees-jeff-haas-little-bobby-comics-week-263/</loc>
		<lastmod>2020-02-09T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-jaime-sanchez-derevolutionizing-os-fingerprinting-cat-and-mouse-game/</loc>
		<lastmod>2020-02-09T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/key-changes-in-the-ags-updated-proposed-ccpa-regulations/</loc>
		<lastmod>2020-02-09T22:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/these-four-major-forces-will-disrupt-telecom-in-2020/</loc>
		<lastmod>2020-02-10T02:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/becoming-a-data-company-a-tale-of-two-trends/</loc>
		<lastmod>2020-02-10T02:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wearedelphix-meet-stephen-wolf/</loc>
		<lastmod>2020-02-10T02:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/dataops-2020-5-best-practices-for-test-data-management-in-multi-cloud-appdev/</loc>
		<lastmod>2020-02-10T02:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-cost-of-ccpa-noncompliance-is-steeper-than-you-think/</loc>
		<lastmod>2020-02-10T02:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/data-in-the-era-of-disruption/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-self-service-is-the-key-to-speeding-up-software-development/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/part-2-activating-your-masked-data-superpowers/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wearedelphix-meet-rita-rosenberg/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/ready-for-a-rewind-see-the-top-moments-that-fueled-the-dataops-movement-in-2019/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/why-2020-is-the-year-you-will-manage-your-data-as-code/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/wearedelphix-meet-ann-togasaki/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/top-3-reasons-why-application-development-in-the-cloud-can-drive-better-products-services-faster/</loc>
		<lastmod>2020-02-10T02:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/what-the-asian-financial-sector-can-teach-us-about-continuous-testing/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/delphix-partner-spotlight-on-risk-focus/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/bringing-fast-secure-data-to-google-cloud-platform-to-accelerate-cloud-modernization-and-boost-application-development/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/part-3-cloudy-with-a-chance-of-data-heres-how-to-develop-a-multi-cloud-data-fabric-through-dataops/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/spending-the-summer-at-delphix-2019-intern-edition/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/delivering-delphix-to-a-database-near-you/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/calling-all-sap-ase-users-its-time-to-level-up-your-data-ingestion-game/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/how-to-develop-plugins-using-the-delphix-virtualization-sdk/</loc>
		<lastmod>2020-02-10T02:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/your-legacy-erp-is-holding-you-back-from-keeping-up-with-consumers-its-time-to-invest-in-your-data/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/part-2-boosting-data-security-compliance-in-a-multi-cloud-world/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/its-time-to-close-the-gap-on-security-and-innovation-to-fix-australias-data-breach-problem/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/delphix-partner-spotlight-on-fwd-view/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/storing-a-million-files-in-a-tiny-box-an-introduction-to-filesystems/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/delphix-partner-spotlight-on-evotek/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/11/aws-reinvent-2019-is-approaching-at-hyperspeed-are-you-ready/</loc>
		<lastmod>2020-02-10T02:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-interns-sonam-kindy/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/wearedelphix-meet-alexandros-mathopoulos/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/top-takeaway-from-the-state-of-devops-report-2019-devops-excellence-improves-security/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/wearedelphix-meet-sara-hartse/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/learn-to-achieve-top-velocity-at-does-2019/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-interns-pearl-ruparel/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/part-1-the-multi-cloud-era-is-here-to-stay-but-is-your-data-ready/</loc>
		<lastmod>2020-02-10T02:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/the-one-key-insight-companies-are-missing-from-mary-meekers-2019-report/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-interns-uzair-inamdar/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/top-takeaways-from-devops-world-jenkins-world-2019/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-interns-tulsi-jain/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/part-i-unmasking-the-real-value-of-masked-data/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/belkin-charges-up-innovation-with-lightning-fast-data-delivery/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/ask-the-interns-grant-parton/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/wearedelphix-meet-manoj-joseph/</loc>
		<lastmod>2020-02-10T02:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/a-tale-of-debugging-command-aliasing-and-native-memory-exhaustion/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/heres-how-to-succeed-with-securing-enterprise-data-for-hundreds-of-applications-in-non-production/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ask-the-interns-brandon-lim/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/brace-for-the-new-wave-of-todays-fintech-ecosystem-powered-by-dataops/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/everything-you-need-to-know-about-the-new-delphix-dataops-community-platform/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/ask-the-interns-claire-mcmanus/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/wearedelphix-michael-coyle/</loc>
		<lastmod>2020-02-10T02:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/middle-leadership-new-language-for-cultivating-leadership-in-the-middle/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/in-search-of-data-agility-join-delphix-at-devops-world-jenkins-world-2019/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/delphix-partner-spotlight-on-accuras/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/no-more-data-excuses/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/failure-to-adopt-dataops-can-be-fatal-to-your-business/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wearedelphix-meet-ross-millenacker/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/will-capital-ones-latest-data-breach-upend-its-reputation-as-a-digital-transformation-darling/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/08/delphix-partner-spotlight-on-presidio/</loc>
		<lastmod>2020-02-10T02:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/how-to-find-the-right-dataops-platform/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/transformer-in-chief-the-evolving-role-of-the-cio/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/is-your-data-ready-for-ai/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wearedelphix-meet-brandon-chau/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/how-to-reach-the-nirvana-of-security-and-innovation-in-the-cloud-with-dataops/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/the-changing-face-of-tech-why-everyone-needs-a-diverse-engineering-team/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/wearedelphix-meet-aoife-obrien/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/07/building-governments-that-are-fit-for-the-digital-age/</loc>
		<lastmod>2020-02-10T02:01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/wearedelphix-roma-mehta/</loc>
		<lastmod>2020-02-10T02:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/5-data-security-lessons-from-game-of-thrones/</loc>
		<lastmod>2020-02-10T02:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/2019-internet-trends-report-youre-drinking-from-a-data-firehose/</loc>
		<lastmod>2020-02-10T02:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/wearedelphix-meet-amy-lock/</loc>
		<lastmod>2020-02-10T02:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/06/out-with-the-old-in-with-the-new-breaking-from-the-status-quo-to-accelerate-software-testing-cycles/</loc>
		<lastmod>2020-02-10T02:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-policy-automation-a-requirement-for-digital-transformation-2/</loc>
		<lastmod>2020-02-10T02:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/whats-new-in-tufin-policy-orchestration-suite-r19-3-2/</loc>
		<lastmod>2020-02-10T02:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/are-we-more-secure-in-2020-than-in-2010-summarizing-a-decade-of-cybersecurity-2/</loc>
		<lastmod>2020-02-10T02:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/healthcare-breaches-how-to-stop-the-spread-2/</loc>
		<lastmod>2020-02-10T02:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/preventing-tax-identity-theft-ftc-and-robocallers-google-photos-incident/</loc>
		<lastmod>2020-02-10T05:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/three-dynamic-cloud-security-aspects-every-ciso-desires/</loc>
		<lastmod>2020-02-10T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bridging-the-gap-between-it-and-ot/</loc>
		<lastmod>2020-02-10T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/no-relief-for-cybersecurity-teams-in-sight-reveals-tripwires-latest-skills-gap-report/</loc>
		<lastmod>2020-02-10T09:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/protecting-organizations-from-customized-phishing-attacks/</loc>
		<lastmod>2020-02-10T09:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/10-tenets-for-cyber-resilience-in-a-digital-world/</loc>
		<lastmod>2020-02-10T09:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/presidential-campaigns-reach-email-security-milestone/</loc>
		<lastmod>2020-02-10T10:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/data-breach-hits-san-diego-low-income-preschool-provider/</loc>
		<lastmod>2020-02-10T11:17:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/apples-tracking-prevention-feature-in-safari-has-a-privacy-bug/</loc>
		<lastmod>2020-02-10T12:06:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/facebooks-and-instagrams-twitter-accounts-hacked/</loc>
		<lastmod>2020-02-10T12:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ncipher-security-executives-comment-on-safer-internet-day/</loc>
		<lastmod>2020-02-10T13:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-feature-introductions-in-casb/</loc>
		<lastmod>2020-02-10T13:53:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pwned-passwords-the-epicenter-of-your-cybersecurity-storm/</loc>
		<lastmod>2020-02-10T15:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-arctic/</loc>
		<lastmod>2020-02-10T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/2020-update/</loc>
		<lastmod>2020-02-10T16:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hypervisor-introspection-thwarts-web-memory-corruption-attack-in-the-wild/</loc>
		<lastmod>2020-02-10T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/data-privacy-event-disclosed-by-affordable-preschool-provider/</loc>
		<lastmod>2020-02-10T16:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-alina-dorinas-using-cloud-services-for-dial-in-reconnaissance-automation/</loc>
		<lastmod>2020-02-10T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-operating-systems-virtualization-is-the-future-of-security/</loc>
		<lastmod>2020-02-10T17:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/12-talks-to-see-at-rsa-2020/</loc>
		<lastmod>2020-02-10T16:15:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-2020-bitglass-sko-recap-and-more/</loc>
		<lastmod>2020-02-10T17:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/luke-kingmas-lou-patrick-mackays-futurism-cartoons-surveillance/</loc>
		<lastmod>2020-02-10T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-cyber-security-its-all-about-developers-except-when-its-not/</loc>
		<lastmod>2020-02-10T18:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-companies-need-to-know-about-proposed-changes-to-the-gramm-leach-bliley-act/</loc>
		<lastmod>2020-02-10T18:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-recon-village-adrian-korns-the-osint-space-is-growing-are-we-ready/</loc>
		<lastmod>2020-02-10T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/steamboat-springs-school-district-secures-google-g-suite-with-managedmethods/</loc>
		<lastmod>2020-02-10T20:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/one-of-the-essentials/</loc>
		<lastmod>2020-02-10T21:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/spamdexing-what-is-seo-spam-and-how-to-remove-it/</loc>
		<lastmod>2020-02-10T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/back-to-the-basics-what-is-the-cost-of-non-pci-compliance/</loc>
		<lastmod>2020-02-11T00:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-perspectives-on-sd-wan-an-interview-with-stefano-gridelli/</loc>
		<lastmod>2020-02-11T00:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/profibus-and-profinet/</loc>
		<lastmod>2020-02-11T01:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-credential-guard-in-windows-10/</loc>
		<lastmod>2020-02-11T01:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-look-forward-to-2020-and-a-new-decade-of-cybersecurity-threats/</loc>
		<lastmod>2020-02-11T02:04:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/stopping-cyber-criminals-in-their-tracks/</loc>
		<lastmod>2020-02-11T02:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/digital-resolve-releases-new-infographic-that-highlights-the-urgent-need-for-companies-to-protect-themselves-from-cyber-criminals/</loc>
		<lastmod>2020-02-11T02:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/10/ceo-bill-calpin-talks-cybersecurity-with-atlanta-business-radiox/</loc>
		<lastmod>2020-02-11T02:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/</loc>
		<lastmod>2020-02-11T03:25:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-resilience-everything-you-really-need-to-know/</loc>
		<lastmod>2020-02-11T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-partners-can-guide-customers-on-their-sd-wan-journey/</loc>
		<lastmod>2020-02-11T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hindsight-is-2020-looking-back-so-we-can-move-forward/</loc>
		<lastmod>2020-02-11T08:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-frameworks-in-healthcare-and-how-to-adopt-them/</loc>
		<lastmod>2020-02-11T09:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-privacy-regulations-shift/</loc>
		<lastmod>2020-02-11T09:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/insecurity-podcast-richard-stiennon-and-the-security-yearbook-2020/</loc>
		<lastmod>2020-02-11T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/podcast-episode-2-cybersecurity-awareness-with-graham-cluley/</loc>
		<lastmod>2020-02-11T11:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tried-and-true-past-cybersecurity-practices-still-relevant-today/</loc>
		<lastmod>2020-02-11T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/are-utilities-ready-to-defend-against-industrial-cyber-threats/</loc>
		<lastmod>2020-02-11T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/safer-internet-day-2020-together-for-a-better-internet/</loc>
		<lastmod>2020-02-11T12:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/securely-patch-software-with-cyberark-endpoint-privilege-manager/</loc>
		<lastmod>2020-02-11T12:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/breakfast-lunch-and-bourbon-at-rsa-conference-2020/</loc>
		<lastmod>2020-02-11T14:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-paypal-phishing-campaign-asks-for-passport-photo-drivers-license/</loc>
		<lastmod>2020-02-11T14:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/explore-the-boundaries-of-the-human-element-with-bitdefender-at-rsa-2020/</loc>
		<lastmod>2020-02-11T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/majority-of-developers-are-concerned-over-the-state-of-their-application-security/</loc>
		<lastmod>2020-02-11T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/network-traffic-analysis-for-ir-tftp-with-wireshark/</loc>
		<lastmod>2020-02-11T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-work-podcast-take-control-of-your-career-with-cyberseek-product-walkthrough/</loc>
		<lastmod>2020-02-11T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-chrome-to-block-downloads-from-unsecured-locations/</loc>
		<lastmod>2020-02-11T14:42:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/checkmarx-research-soundcloud-api-security-advisory/</loc>
		<lastmod>2020-02-11T14:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-series-deploy-forgerock-identity-in-your-cloud-their-cloud-or-our-cloud/</loc>
		<lastmod>2020-02-11T15:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/phishing-sites-go-undetected-by-almost-three-quarters-of-consumers/</loc>
		<lastmod>2020-02-11T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/concern-over-coronavirus-leading-to-global-spread-of-fake-pharmacy-spam/</loc>
		<lastmod>2020-02-11T15:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/china-denies-it-was-behind-the-equifax-hack-as-four-men-charged-for-data-breach/</loc>
		<lastmod>2020-02-11T15:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/thick-client-penetration-testing-methodology/</loc>
		<lastmod>2020-02-11T16:03:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/browser-watch-google-chrome-to-block-http-downloads/</loc>
		<lastmod>2020-02-11T16:57:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-chris-hanlons-tls-decryption-attacks-and-back-doors/</loc>
		<lastmod>2020-02-11T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-paypal-phishing-email-scam-wants-your-social-security-number/</loc>
		<lastmod>2020-02-11T17:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/soc-it-2-me-cyberark-achieves-soc-2-type-2-compliance/</loc>
		<lastmod>2020-02-11T17:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/join-us-for-shapes-app-security-fraud-summit/</loc>
		<lastmod>2020-02-11T17:56:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/foundation-fieldbus/</loc>
		<lastmod>2020-02-11T17:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/account-management-concepts-for-ics-scada-environments/</loc>
		<lastmod>2020-02-11T17:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-leap-smearing/</loc>
		<lastmod>2020-02-11T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/celebrating-international-day-of-women-and-girls-in-science/</loc>
		<lastmod>2020-02-11T18:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hipaa-employee-password-policies/</loc>
		<lastmod>2020-02-11T18:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-digital-transformation-trends-that-will-impact-how-you-manage-data-in-2020/</loc>
		<lastmod>2020-02-11T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-well-equipped-security-team-could-save-you-millions-of-dollars-a-year/</loc>
		<lastmod>2020-02-11T18:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-cathie-yuns-implementing-a-zero-knowledge-proof/</loc>
		<lastmod>2020-02-11T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/vaporstream-supports-safe-house-project/</loc>
		<lastmod>2020-02-11T19:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/verodin-showcased-in-the-black-unicorn-report-for-2019-by-tracey-moon/</loc>
		<lastmod>2020-02-11T19:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/12/2020-cybersecurity-trends-measuring-cyber-risk-and-its-effect-on-business-risk-by-robert-potter/</loc>
		<lastmod>2020-02-11T19:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/without-server-certificate-validation-wpa2-enterprise-isnt-secure/</loc>
		<lastmod>2020-02-11T19:55:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-big-hack-that-actually-happened-chinese-military-implicated-in-equifax-breach/</loc>
		<lastmod>2020-02-11T22:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-expert-dr-shane-shook-joins-behaviosec-board-of-directors/</loc>
		<lastmod>2020-02-11T21:40:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/guest-post-katrina-k/</loc>
		<lastmod>2020-02-11T22:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/microsoft-patch-tuesday-february-2020-edition/</loc>
		<lastmod>2020-02-11T23:13:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/simple-certificate-enrollment-protocol-scep-explained/</loc>
		<lastmod>2020-02-11T22:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/eliminate-password-reset-tickets-to-increase-profits/</loc>
		<lastmod>2020-02-12T00:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/office-365-migrations-simplified/</loc>
		<lastmod>2020-02-12T00:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tufin-is-the-first-and-only-vendor-to-provide-unified-security-policy-management-for-the-hybrid-cloud/</loc>
		<lastmod>2020-02-12T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-reasons-devsecops-is-getting-so-much-attention/</loc>
		<lastmod>2020-02-12T01:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/february-2020-patch-tuesday-99-vulns-12-critical-patch-for-ie-0-day-exchange-vuln-adobe-vulns/</loc>
		<lastmod>2020-02-12T01:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/vert-threat-alert-february-2020-patch-tuesday-analysis/</loc>
		<lastmod>2020-02-12T01:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/third-party-risk-management-best-practices-for-protecting-your-business/</loc>
		<lastmod>2020-02-12T03:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/blackberry-cylance-vs-icedid-banking-trojan/</loc>
		<lastmod>2020-02-12T06:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/leveraging-container-security-to-accelerate-devops/</loc>
		<lastmod>2020-02-12T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/securing-containers-and-multi-cloud-operations/</loc>
		<lastmod>2020-02-12T08:00:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-voice-biometrics-became-a-real-game-changer-at-a-large-financial-services-organization/</loc>
		<lastmod>2020-02-12T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/stop-trying-to-swim-upstream-with-your-cybersecurity-2/</loc>
		<lastmod>2020-02-12T09:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-fido-alliance-anniversary-and-yubikey-for-rsa-securid-access/</loc>
		<lastmod>2020-02-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/managing-the-future-of-digital-risk/</loc>
		<lastmod>2020-02-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/credential-stuffing-breeds-fraud-on-a-grand-scale/</loc>
		<lastmod>2020-02-12T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-enabled-crimes-cost-u-s-citizens-3-5-billion-in-2019/</loc>
		<lastmod>2020-02-12T12:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/keys-to-the-kingdom-smart-cities-security-concerns/</loc>
		<lastmod>2020-02-12T13:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/israeli-elector-app-accidently-exposes-personal-data-of-6-5-million-voters/</loc>
		<lastmod>2020-02-12T13:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/find-and-fix-open-source-and-proprietary-code-security-defects-in-the-ide-with-polaris-and-code-sight/</loc>
		<lastmod>2020-02-12T14:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-foiled-over-1-9b-malware-installs-from-non-play-sources-in-2019/</loc>
		<lastmod>2020-02-12T14:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/veracode-channel-leader-leslie-bois-earns-top-channel-recognition-from-crn-2/</loc>
		<lastmod>2020-02-12T14:54:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/phishing-emails-pose-as-health-and-tax-info-avast/</loc>
		<lastmod>2020-02-12T14:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hackers-actively-targeting-u-s-supply-chain-companies-fbi-warns/</loc>
		<lastmod>2020-02-12T14:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tcg-talks-embedded-security-software-at-embedded-world-2020/</loc>
		<lastmod>2020-02-12T15:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bitglass-security-spotlight-healthcare-burglary-results-in-data-breach-affecting-over-654000-members/</loc>
		<lastmod>2020-02-12T15:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-configure-picture-passwords-and-pins-in-windows-10/</loc>
		<lastmod>2020-02-12T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zero-day-attacks-protections-best-practices-and-how-to-implement-them/</loc>
		<lastmod>2020-02-12T15:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/considering-cyber-insurance-heres-what-you-need-to-know/</loc>
		<lastmod>2020-02-12T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/industrial-ethernet/</loc>
		<lastmod>2020-02-12T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/endpoint-security-is-harder-than-ever/</loc>
		<lastmod>2020-02-12T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/owasp-top-10-apis-take-center-stage-in-latest-list-of-priorities/</loc>
		<lastmod>2020-02-12T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pci-pal-nominated-for-best-compliance-provider-award-at-cnp-2020/</loc>
		<lastmod>2020-02-12T16:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-christian-paquins-migrating-to-quantum-safe-crypto/</loc>
		<lastmod>2020-02-12T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mitre-attck-techniques-for-ics-practical-applications-part-1/</loc>
		<lastmod>2020-02-12T16:21:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/risk-based-cybersecurity-simplifies-compliance/</loc>
		<lastmod>2020-02-12T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/jot-2682-the-joy-of-tech-guests-whos-watching/</loc>
		<lastmod>2020-02-12T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tech-learning-lateral-phishing-what-k-12-schools-need-to-know/</loc>
		<lastmod>2020-02-12T18:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/managing-vulnerabilities-and-staying-compliant/</loc>
		<lastmod>2020-02-12T18:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/oauth-2-0-what-is-it-and-how-does-it-work/</loc>
		<lastmod>2020-02-12T18:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/whitesource-extends-its-patented-technology-to-python-javascript-and-c-cuts-open-source-security-alerts-by-up-to-85/</loc>
		<lastmod>2020-02-12T18:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-ethan-dodges-scrubber-an-open-source-compilation-to-protect-sources/</loc>
		<lastmod>2020-02-12T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-it-time-to-reimagine-appsec-training/</loc>
		<lastmod>2020-02-12T18:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/wearedelphix-meet-alan-levy/</loc>
		<lastmod>2020-02-12T19:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/and-then-theres-this/</loc>
		<lastmod>2020-02-12T20:02:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/adopting-zero-trust-in-it-five-steps-when-building-a-zero-trust-it-environment/</loc>
		<lastmod>2020-02-12T19:13:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/build-a-zero-trust-model-by-first-killing-local-admin-rights/</loc>
		<lastmod>2020-02-12T20:19:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-3-peap-mschapv2-mistakes-made-by-universities/</loc>
		<lastmod>2020-02-12T19:46:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/defining-and-calculating-cyber-risk/</loc>
		<lastmod>2020-02-12T20:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-3-webinar-takeaways-continuous-fuzzing-the-trending-security-technique-among-silicon-valleys-tech-behemoths/</loc>
		<lastmod>2020-02-12T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-ransomware-2/</loc>
		<lastmod>2020-02-12T21:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/dns-encryption-at-dns-oarc-32/</loc>
		<lastmod>2020-02-12T21:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nexus-intelligence-insights-cve-2020-2100-jenkins-udp-amplification-reflection-attack-leading-to-distributed-denial-of-service-ddos/</loc>
		<lastmod>2020-02-12T22:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-guide-to-digital-privacy-for-you-and-your-family/</loc>
		<lastmod>2020-02-13T04:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/10-security-privacy-statistics-that-may-surprise-you/</loc>
		<lastmod>2020-02-13T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/seven-best-practices-for-securing-digital-transformation-efforts/</loc>
		<lastmod>2020-02-13T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/in-store-payments-via-mobile-apps-can-lead-to-increase-in-card-not-present-cnp-fraud/</loc>
		<lastmod>2020-02-13T09:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/04/how-to-identify-sensitive-and-personal-data/</loc>
		<lastmod>2020-02-13T11:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-for-k12-essentials-for-district-it-teams/</loc>
		<lastmod>2020-02-13T11:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-rsa-homonym/</loc>
		<lastmod>2020-02-13T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/veracodes-new-scan-type-delivers-results-at-devsecops-speed/</loc>
		<lastmod>2020-02-13T14:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-new-clue-for-the-kryptos-sculpture/</loc>
		<lastmod>2020-02-13T14:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-wall/</loc>
		<lastmod>2020-02-13T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tase-2-0-and-iccp/</loc>
		<lastmod>2020-02-13T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-work-podcast-how-to-become-a-network-admin/</loc>
		<lastmod>2020-02-13T14:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ransomwared-ransomware-strain-demands-explicit-pictures-as-payment/</loc>
		<lastmod>2020-02-13T14:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/u-s-healthcare-system-attacked-at-least-172-times-with-ransomware-since-2016/</loc>
		<lastmod>2020-02-13T14:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/get-the-latest-devsecops-reference-architecture/</loc>
		<lastmod>2020-02-13T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/online-dating-safety-tips-avast/</loc>
		<lastmod>2020-02-13T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/i-know-where-you-rode-last-summer-uncovering-the-security-issues-of-shared-scooter-services/</loc>
		<lastmod>2020-02-13T16:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-identity-management-blind-spot/</loc>
		<lastmod>2020-02-13T16:16:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pass-the-hash-attack-mitigation-the-complete-guide/</loc>
		<lastmod>2020-02-13T16:20:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/safebreach-adds-risk-based-vulnerability-management-and-cloud-native-simulations/</loc>
		<lastmod>2020-02-19T14:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/at-21-tbps-reaching-new-levels-of-ipv6-traffic/</loc>
		<lastmod>2020-02-13T16:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-harlo-holmes-tiplines-today/</loc>
		<lastmod>2020-02-13T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-third-party-risk-management-matters-2/</loc>
		<lastmod>2020-02-13T17:20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/asking-the-right-questions-about-cyber-insurance/</loc>
		<lastmod>2020-02-13T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-credential-manager-in-windows-10/</loc>
		<lastmod>2020-02-13T17:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-blockchain/</loc>
		<lastmod>2020-02-13T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-native-application-security-protection-at-and-within-the-perimeter/</loc>
		<lastmod>2020-02-13T18:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/puerto-rico-government-falls-for-2-6-million-email-scam/</loc>
		<lastmod>2020-02-13T18:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-security-orchestration-supercharges-your-soc/</loc>
		<lastmod>2020-02-13T18:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-pki-a-crash-course-on-public-key-infrastructure-pki/</loc>
		<lastmod>2020-02-13T18:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-karl-koschers-enabling-https-for-home-network-devices/</loc>
		<lastmod>2020-02-13T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/setting-up-2fa-on-wordpress-with-the-google-authenticator-app/</loc>
		<lastmod>2020-02-13T19:11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/redefining-security-as-a-profit-driver/</loc>
		<lastmod>2020-02-13T19:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/devops-is-to-digital-transformation-as-orchestration-is-to-secure-devops/</loc>
		<lastmod>2020-02-13T20:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-10-foss-legal-developments-in-2019/</loc>
		<lastmod>2020-02-13T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/black-hills-information-securitys-john-strand-how-to-use-portspoof-cyber-deception/</loc>
		<lastmod>2020-02-13T22:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/enforcing-iam-on-iot-devices/</loc>
		<lastmod>2020-02-13T22:31:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-risks-of-vpns-and-desktop-sharing-tools-for-remote-access/</loc>
		<lastmod>2020-02-13T22:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/abused-cloudflare-workers-service-used-to-inject-korean-seo-spam/</loc>
		<lastmod>2020-02-13T22:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/alyssa-miller-on-application-security-and-the-value-of-diversity/</loc>
		<lastmod>2020-02-13T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-will-we-learn-from-the-iowa-caucus-app-fiasco/</loc>
		<lastmod>2020-02-14T00:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/wmi-101-for-pentesters/</loc>
		<lastmod>2020-02-14T05:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mose-using-configuration-management-for-evil/</loc>
		<lastmod>2020-02-14T07:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/key-takeaways-from-the-2019-cybersecurity-threat-landscape/</loc>
		<lastmod>2020-02-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/vipersoftx-new-javascript-threat/</loc>
		<lastmod>2020-02-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cisa-issues-multiple-agency-malware-analysis-reports-on-hidden-cobra/</loc>
		<lastmod>2020-02-14T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-phishing-scam-lures-iphone-owners-with-romantic-chat-gambling-free-vpn/</loc>
		<lastmod>2020-02-14T10:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/dnssec-keysigning-ceremony-postponed-because-of-locked-safe/</loc>
		<lastmod>2020-02-14T12:07:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-tarun-shome-blackberry-labs-turns-innovation-into-a-proof-of-concept/</loc>
		<lastmod>2020-02-14T12:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-blocked-790000-apps-from-the-play-store-in-2019/</loc>
		<lastmod>2020-02-14T14:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/email-fraudsters-trick-puerto-ricos-government-into-wiring-2-6-million-to-bogus-accounts/</loc>
		<lastmod>2020-02-14T14:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/payment-card-data-security-incident-disclosed-by-rutters/</loc>
		<lastmod>2020-02-14T14:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/web-isolation-with-authentic8-silo-at-rsa-2020/</loc>
		<lastmod>2020-02-14T16:12:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rethinking-authentication-with-hybrid-single-sign-on-access/</loc>
		<lastmod>2020-02-14T16:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/introduction-to-central-management-building-a-single-unified-view-of-data-in-a-fragmented-data-world/</loc>
		<lastmod>2020-02-14T16:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-kate-roses-adversarial-fashion-sartorial-hacking/</loc>
		<lastmod>2020-02-14T17:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-betelgeuse-is-dimming/</loc>
		<lastmod>2020-02-14T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-light-at-the-end-of-liberty-reserves-demise/</loc>
		<lastmod>2020-02-14T18:48:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-tiffany-lis-facial-recognition-dna-and-biometric-privacy/</loc>
		<lastmod>2020-02-14T18:48:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-washington-state-privacy-act-could-be-more-comprehensive-than-the-ccpa/</loc>
		<lastmod>2020-02-14T20:28:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/6-noteworthy-data-breaches-in-2019/</loc>
		<lastmod>2020-02-14T21:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/feature-release-20-1/</loc>
		<lastmod>2020-02-14T21:44:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/setting-up-the-root-account-on-kali-2020/</loc>
		<lastmod>2020-02-14T22:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/alert-logic-dashboards-let-you-drill-down-to-actionable-intelligence/</loc>
		<lastmod>2020-02-14T22:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/huawei-the-backdoor-papers/</loc>
		<lastmod>2020-02-15T01:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/slow-response-times-to-blame-for-phishing-attack-success-on-organizations/</loc>
		<lastmod>2020-02-15T02:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/video-mike-williams-the-more-things-change-the-more-they-stay-the-same/</loc>
		<lastmod>2020-02-15T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/video-david-castignola-being-as-good-on-the-sidelines-as-you-are-on-the-field/</loc>
		<lastmod>2020-02-15T06:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/video-brian-robison-the-tools-and-techniques-of-real-world-threat-actors/</loc>
		<lastmod>2020-02-15T06:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-mike-kisers-ensuring-privacy-through-obfuscation/</loc>
		<lastmod>2020-02-15T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/crypto-ag-was-owned-by-the-cia/</loc>
		<lastmod>2020-02-15T17:36:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-further-research-is-needed/</loc>
		<lastmod>2020-02-15T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-riana-pfefferkorns-compelled-device-decryption-and-the-fifth-amendment/</loc>
		<lastmod>2020-02-15T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/lets-change-the-world/</loc>
		<lastmod>2020-02-16T00:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-sarah-mccarthys-quantum-safe-instantaneous-vehicle-comms/</loc>
		<lastmod>2020-02-16T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/robert-m-lees-jeff-haas-little-bobby-comics-week-264/</loc>
		<lastmod>2020-02-16T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zero-trust-can-fix-healthcares-security-problem/</loc>
		<lastmod>2020-02-16T18:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-steve-thomas-easy-pake-oven/</loc>
		<lastmod>2020-02-16T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mediaops-offers-conference-disaster-plans-amid-growing-coronavirus-concerns/</loc>
		<lastmod>2020-02-17T09:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/accelerated-strategies-group-launches-research-study-into-coronavirus-impact-on-it-industry-with-health-emergency-it-preparedness-survey/</loc>
		<lastmod>2020-02-17T09:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/crisis-management-automation-for-the-entire-organization-with-dispatch-bsidessf-preview/</loc>
		<lastmod>2020-02-17T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/equifax-hacked-by-china-israeli-voter-registry-exposed-how-the-cia-owned-encryption/</loc>
		<lastmod>2020-02-17T05:00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-perspectives-on-cloud-security-an-interview-with-gururaj-pandurangi/</loc>
		<lastmod>2020-02-17T07:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-driven-networking-a-strategic-approach-to-digital-innovation/</loc>
		<lastmod>2020-02-17T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsac-2020-trust-in-the-cloud-what-should-you-do-with-your-encryption-keys/</loc>
		<lastmod>2020-02-17T08:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/get-a-grip-on-data-in-box-and-beyond-for-compliance-sake/</loc>
		<lastmod>2020-02-17T09:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-tech-cycognito-employs-offensive-bot-network-to-put-companies-a-step-a-head-of-attackers/</loc>
		<lastmod>2020-02-17T10:05:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/voatz-internet-voting-app-is-insecure/</loc>
		<lastmod>2020-02-17T12:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/twitter-accounts-of-the-olympics-and-fc-barcelona-hijacked-by-ourmine-hacking-group/</loc>
		<lastmod>2020-02-17T13:20:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ic3-gov-2019-internet-crime-report-its-all-about-that-bec/</loc>
		<lastmod>2020-02-17T14:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/pay-up-or-well-make-google-ban-your-ads/</loc>
		<lastmod>2020-02-17T14:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/oil-industry-boosts-spending-on-cybersecurity-five-fold-since-2017/</loc>
		<lastmod>2020-02-17T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/getting-started-with-web-server-security/</loc>
		<lastmod>2020-02-17T15:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-networked/</loc>
		<lastmod>2020-02-17T15:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/upcoming-security-events-in-florida/</loc>
		<lastmod>2020-02-17T16:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/whitehat-security-names-chris-leffel-vice-president-of-product-management/</loc>
		<lastmod>2020-02-18T14:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-panel-suchismita-pahi-marina-spiru-mike-johnson-robin-andruss-how-to-integrate-privacy-legal-security/</loc>
		<lastmod>2020-02-17T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/daniel-storis-egoless-programming/</loc>
		<lastmod>2020-02-17T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-does-the-new-cvss-3-1-scoring-model-mean-for-enterprise-security/</loc>
		<lastmod>2020-02-17T18:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-mark-b-coopers-pki-and-shaken-stir-will-fix-robocalls/</loc>
		<lastmod>2020-02-17T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/your-cloud-journeys-is-unique-but-not-unknown/</loc>
		<lastmod>2020-02-17T21:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/10-must-see-talks-to-attend-at-rsa-conference-2020/</loc>
		<lastmod>2020-02-18T05:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fabian-wosar-joins-me-to-chat-about-ransomware-and-data-privacy/</loc>
		<lastmod>2020-02-18T07:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/enhancing-your-security-team-with-ai-driven-security-operations/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hyperscale-security-enables-the-art-of-whats-possible/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/know-who-and-what-with-zero-trust-network-access/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-redefines-the-open-security-platform/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/protecting-todays-networks-with-dynamic-cloud-security/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/defining-security-driven-networking/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/every-second-counts-in-endpoint-protection-why-real-time-matters/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-unveils-new-fortigate-1800f-appliance-and-np7-network-processor/</loc>
		<lastmod>2020-02-18T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/twenty-tech-trends-for-2020/</loc>
		<lastmod>2020-02-18T09:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zero-trust-approach-to-threat-intelligence-bsidessf-preview/</loc>
		<lastmod>2020-02-18T10:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/australian-transportation-company-is-still-battling-ransomware-infection-18-days-later/</loc>
		<lastmod>2020-02-18T11:06:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/business-email-compromise-inflicts-1-7-billion-in-losses-in-us-in-2019/</loc>
		<lastmod>2020-02-18T11:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/our-next-episode/</loc>
		<lastmod>2020-02-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-decade-new-possibilities/</loc>
		<lastmod>2020-02-18T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hacking-mcdonalds-for-free-food/</loc>
		<lastmod>2020-02-18T12:09:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-we-productized-our-staging-environment-and-survived-to-tell-the-tale/</loc>
		<lastmod>2020-02-18T12:42:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/enveil-raises-10-million-in-series-a-funding/</loc>
		<lastmod>2020-02-18T12:57:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/governance-risk-and-compliance-how-does-threat-intelligence-help/</loc>
		<lastmod>2020-02-18T13:46:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/untangle-releases-ng-firewall-15-0-to-keep-smb-assets-safe-from-todays-evolving-threats-2/</loc>
		<lastmod>2020-02-18T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/get-to-know-your-security-threats/</loc>
		<lastmod>2020-02-18T14:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/signal-sciences-named-a-2020-gartner-peer-insights-customers-choice-for-web-application-firewalls-two-years-in-a-row/</loc>
		<lastmod>2020-02-18T14:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/privacy-regulation-in-a-connected-iot-world/</loc>
		<lastmod>2020-02-18T14:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/one-for-all-and-all-in-one-regain-control-of-your-security-with-bitdefender-and-threatconnect/</loc>
		<lastmod>2020-02-18T14:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/enforcing-pci-dss-compliance-requirements-os-isolation/</loc>
		<lastmod>2020-02-18T15:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/theres-another-global-pandemic-were-not-talking-about/</loc>
		<lastmod>2020-02-18T15:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-tyler-kells-towards-usable-dining-crypto-networks-with-howl/</loc>
		<lastmod>2020-02-18T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-know-you-meet-nerc-cip-cybersecurity-requirements/</loc>
		<lastmod>2020-02-18T17:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-the-us-ready-for-centralized-data-privacy-enforcement/</loc>
		<lastmod>2020-02-18T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/azorult-trojan-disguised-itself-as-fake-protonvpn-installer/</loc>
		<lastmod>2020-02-18T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/theres-no-such-thing-as-tmi-when-it-comes-to-open-source-software/</loc>
		<lastmod>2020-02-18T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-security-cam-letdown/</loc>
		<lastmod>2020-02-18T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/encoding-stolen-credit-card-data-on-barcodes/</loc>
		<lastmod>2020-02-18T18:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/symphony-technology-group-enters-definitive-agreement-with-dell-technologies-to-acquire-rsa/</loc>
		<lastmod>2020-02-18T18:15:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-resurrection-of-phpunit-rce-vulnerability/</loc>
		<lastmod>2020-02-18T18:27:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/reversing-and-exploiting-with-free-tools-part-3/</loc>
		<lastmod>2020-02-18T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-vitor-ventura-snoop-all-telegram-messages/</loc>
		<lastmod>2020-02-18T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/featured-mixmode-client-success-story-nisos/</loc>
		<lastmod>2020-02-18T19:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/my-take-why-new-tools-tactics-are-needed-to-mitigate-risks-introduced-by-widespread-encryption/</loc>
		<lastmod>2020-02-18T20:12:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/perilous-peripherals-the-hidden-dangers-inside-windows-linux-computers/</loc>
		<lastmod>2020-02-18T20:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/larry-maccherone-says-pixie-dust-security-is-an-epic-failure-video/</loc>
		<lastmod>2020-02-18T20:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-baymard-study-how-to-improve-ecommerce-checkout-rates-with-site-seals-checkout-design/</loc>
		<lastmod>2020-02-18T21:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/successful-infosec-strategies-start-with-asset-inventory/</loc>
		<lastmod>2020-02-18T21:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-divvycloud-enables-continuous-multi-cloud-security-and-compliance-best-practices-for-costar-during-mergers-and-acquisitions/</loc>
		<lastmod>2020-02-18T21:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-state-of-smart-iam-solutions-2020/</loc>
		<lastmod>2020-02-18T22:08:09+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->