<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/2020/02/currency-cleaning-on-demand-not-to-be-confused-with-money-laundering/</loc>
		<lastmod>2020-02-18T22:15:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mitre-attck-techniques-for-ics-practical-applications-part-2/</loc>
		<lastmod>2020-02-18T21:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-will-you-see-and-do-at-rsa-next-week/</loc>
		<lastmod>2020-02-18T22:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-3-trends-at-shmoocon-2020/</loc>
		<lastmod>2020-02-19T02:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/red-teaming-for-blue-teamers-a-practical-approach-using-open-source-tools/</loc>
		<lastmod>2020-02-19T05:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mental-health-for-hackers-contents-under-pressure/</loc>
		<lastmod>2020-02-19T05:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-microsoft-passport-in-windows-10/</loc>
		<lastmod>2020-02-19T05:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/driver-security-in-windows-10/</loc>
		<lastmod>2020-02-19T05:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/web-server-security-web-server-hardening/</loc>
		<lastmod>2020-02-19T05:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-nosql-injection/</loc>
		<lastmod>2020-02-19T05:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/imperva-launches-the-cyber-threat-index/</loc>
		<lastmod>2020-02-19T07:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-partners-leveraging-secaas-and-forticloud-provide-value-to-customers/</loc>
		<lastmod>2020-02-19T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-prioritizes-cybersecurity-skills-gap-through-several-program-offerings/</loc>
		<lastmod>2020-02-19T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-i-am-excited-for-rsas-next-frontier/</loc>
		<lastmod>2020-02-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/with-a-new-decade-comes-a-new-chapter/</loc>
		<lastmod>2020-02-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/2020-vision-driving-the-future-of-identity/</loc>
		<lastmod>2020-02-19T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/managedmethods-a-k-12-cybersecurity-company-to-watch-in-2020-following-213-percent-annual-growth/</loc>
		<lastmod>2020-02-19T12:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ciso-view-insights-securely-scaling-rpa-initiatives/</loc>
		<lastmod>2020-02-19T13:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cisa-disclosed-ransomware-attack-at-natural-gas-compression-facility/</loc>
		<lastmod>2020-02-19T14:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fc-barcelona-twitter-account-hacked-again-by-the-same-group/</loc>
		<lastmod>2020-02-19T14:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/more-than-44-million-patient-health-records-compromised-in-2019-in-the-us/</loc>
		<lastmod>2020-02-19T15:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-divvycloud-report-finds-breaches-caused-by-cloud-misconfigurations-cost-enterprises-nearly-5-trillion/</loc>
		<lastmod>2020-02-19T15:46:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hackers-were-inside-citrix-for-five-months/</loc>
		<lastmod>2020-02-19T15:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/calculate-the-business-value-of-an-iam-solution-with-our-roi-calculator/</loc>
		<lastmod>2020-02-19T16:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-ben-brechts-mitm-mixed-mode-butterfly-key-privacy-attack/</loc>
		<lastmod>2020-02-19T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-importance-of-creating-raving-fans-to-build-a-successful-msp-business-avast/</loc>
		<lastmod>2020-02-19T17:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-2020-and-the-human-element-of-security/</loc>
		<lastmod>2020-02-19T17:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-phylogenetic-tree/</loc>
		<lastmod>2020-02-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ccpas-statutory-damages-push-more-breach-litigation-to-the-golden-state/</loc>
		<lastmod>2020-02-19T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/my-keynote-for-this-years-rsa/</loc>
		<lastmod>2020-02-19T17:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-crypto-and-privacy-village-cat-murdocks-black-mirror-you-are-your-own-privacy-nightmare/</loc>
		<lastmod>2020-02-19T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-unintended-secops-consequences-of-digital-transformation/</loc>
		<lastmod>2020-02-19T19:51:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/checkmarx-research-apache-dubbo-2-7-3-unauthenticated-rce-via-deserialization-of-untrusted-data-cve-2019-17564/</loc>
		<lastmod>2020-02-19T19:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-windows-backup-and-restore-utility/</loc>
		<lastmod>2020-02-19T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-reset-windows-10/</loc>
		<lastmod>2020-02-19T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/network-traffic-analysis-for-ir-analyzing-iot-attacks/</loc>
		<lastmod>2020-02-19T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nist-csf-implementing-nist-csf/</loc>
		<lastmod>2020-02-19T19:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-my-site-hacked/</loc>
		<lastmod>2020-02-19T20:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/transforming-the-uk-pensions-industry/</loc>
		<lastmod>2020-02-19T20:37:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-conference-2020-ciso-tips-for-making-the-most-of-conference-sessions/</loc>
		<lastmod>2020-02-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-human-side-of-third-party-risk-management/</loc>
		<lastmod>2020-02-19T21:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-conference-2020-ciso-tips-for-making-the-most-of-conference-sessions-2/</loc>
		<lastmod>2020-02-19T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-security-that-performs/</loc>
		<lastmod>2020-02-19T22:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-healthcare-breach-report-breaches-on-the-upsurge/</loc>
		<lastmod>2020-02-19T22:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/want-to-comply-with-privacy-laws-start-with-security/</loc>
		<lastmod>2020-02-19T22:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/maze-ransomware-attacks-surging-in-2020-demanding-ransom-exposing-stolen-data/</loc>
		<lastmod>2020-02-20T02:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/top-email-security-threats-of-2020-how-to-stop-them/</loc>
		<lastmod>2020-02-20T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-is-cyber-resilience-essential-and-whos-responsible-for-it/</loc>
		<lastmod>2020-02-20T04:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/helm-nexus-steering-towards-faster-deployments-in-nexus-3-21/</loc>
		<lastmod>2020-02-20T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/threat-spotlight-nuke-ransomware/</loc>
		<lastmod>2020-02-20T04:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-engage-a-partner-program-designed-for-todays-business-needs/</loc>
		<lastmod>2020-02-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-are-the-problems-with-2fa-codes-and-whats-apples-latest-proposal-to-solve-them/</loc>
		<lastmod>2020-02-20T07:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsac-2020-the-roaring-20s-a-new-decade-brings-new-cybersecurity-opportunities-and-challenges/</loc>
		<lastmod>2020-02-20T08:47:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/countering-network-resident-threats/</loc>
		<lastmod>2020-02-20T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/do-you-have-gaps-in-your-cybersecurity-tech-stack/</loc>
		<lastmod>2020-02-20T11:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-remove-favicon-ico-virus-from-your-wordpress-website/</loc>
		<lastmod>2020-02-20T11:19:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mgm-resorts-hacked-10-6-million-guests-have-their-personal-data-exposed-on-hacking-forum/</loc>
		<lastmod>2020-02-20T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/scammers-use-fake-website-to-masquerade-as-burning-man-organizers/</loc>
		<lastmod>2020-02-20T12:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/us-gas-company-attacked-with-ransomware/</loc>
		<lastmod>2020-02-20T12:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/web-browser-based-attacks-how-to-protect-users/</loc>
		<lastmod>2020-02-20T13:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/insecurity-podcast-mixtape-vol-iii-ces-2020-edition/</loc>
		<lastmod>2020-02-20T13:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/stay-sharp-and-squash-security-debt-with-veracodes-security-labs/</loc>
		<lastmod>2020-02-20T13:29:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/developers-hack-mcdonalds-reward-system-to-get-free-hamburgers/</loc>
		<lastmod>2020-02-20T14:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/5-things-you-wont-miss-about-risk-and-compliance-on-spreadsheets/</loc>
		<lastmod>2020-02-20T14:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-heist/</loc>
		<lastmod>2020-02-20T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/phishing-techniques-asking-for-sensitive-information-via-email/</loc>
		<lastmod>2020-02-20T14:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/blocking-expected-and-similar-passwords-in-active-directory/</loc>
		<lastmod>2020-02-20T14:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/swiss-cybersecurity-body-urges-businesses-to-stop-paying-ransomware-demands-exposes-lax-security-practices/</loc>
		<lastmod>2020-02-20T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/4-ways-to-improve-cybersecurity-posture/</loc>
		<lastmod>2020-02-20T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-easily-identify-conda-vulnerabilities-using-sonatype-jake/</loc>
		<lastmod>2020-02-20T15:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-series-how-financial-services-can-embrace-the-cloud/</loc>
		<lastmod>2020-02-20T15:38:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/defining-the-journey-the-four-cloud-adoption-patterns/</loc>
		<lastmod>2020-02-20T15:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-our-data-reveals-about-security-debt/</loc>
		<lastmod>2020-02-20T16:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-develop-a-hybrid-cloud-security-strategy/</loc>
		<lastmod>2020-02-20T15:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-your-wordpress-e-commerce-solution-has-to-be-secure-and-how-to-do-it/</loc>
		<lastmod>2020-02-20T16:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zero-networks-launches-industrys-first-autonomous-network-access-orchestrator-announces-4-65-million-in-funding/</loc>
		<lastmod>2020-02-20T16:51:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-bob-lords-misinformation-keynote/</loc>
		<lastmod>2020-02-20T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/web-application-security-without-organizational-resistance/</loc>
		<lastmod>2020-02-20T17:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-get-better-application-security-and-preserve-time-to-market/</loc>
		<lastmod>2020-02-20T17:28:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-you-need-a-software-restriction-policy-right-now/</loc>
		<lastmod>2020-02-20T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-picking-bad-stocks/</loc>
		<lastmod>2020-02-20T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-one-two-punch-of-zero-trust-verify-every-user-validate-every-device/</loc>
		<lastmod>2020-02-20T18:14:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/phishing-threat-actor-blocking-techniques-geoblocking-by-ip/</loc>
		<lastmod>2020-02-20T18:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-andrew-mckim-on-ensuring-security-for-tomorrows-mobile-endpoints/</loc>
		<lastmod>2020-02-20T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-hyrum-andersons-competitions-in-infosec-machine-learning/</loc>
		<lastmod>2020-02-20T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-the-internet-becoming-less-open/</loc>
		<lastmod>2020-02-20T19:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fiddling-with-windows-proxy-tools-for-win10/</loc>
		<lastmod>2020-02-21T16:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/iranian-backed-fox-kitten-apt-exploits-vpn-vulnerabilities-heres-why-it-should-matter-to-you/</loc>
		<lastmod>2020-02-20T19:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mobile-carriers-free-speech-rights-compromised-by-new-privacy-law-read-it-and-weep/</loc>
		<lastmod>2020-02-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mercury-7-friendship-7-with-john-glenn-aboard-launch-anniversary/</loc>
		<lastmod>2020-02-20T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-you-need-cloud-based-security-for-agile-innovative-and-lean-it/</loc>
		<lastmod>2020-02-20T20:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/types-of-user-accounts-in-windows-10-local-domain-microsoft/</loc>
		<lastmod>2020-02-20T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-windows-recovery-environment/</loc>
		<lastmod>2020-02-20T20:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/can-i-use-peap-mschapv2-and-eap-tls-authentication-on-my-network/</loc>
		<lastmod>2020-02-20T19:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-carta-approach-is-the-new-black-in-stopping-online-crime/</loc>
		<lastmod>2020-02-20T20:58:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/detection-coverage-and-detection-in-depth/</loc>
		<lastmod>2020-02-20T21:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/insecure-direct-object-reference-idor-web-based-application-security-part-6/</loc>
		<lastmod>2020-02-20T22:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/how-an-iso-27001-expert-can-become-a-gdpr-data-protection-officer/</loc>
		<lastmod>2020-02-20T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/experts-better-iot-security-depends-on-changes-in-culture-habits/</loc>
		<lastmod>2020-02-20T23:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-find-remove-seo-spam-on-wordpress/</loc>
		<lastmod>2020-02-20T23:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-nists-cybersecurity-framework-to-foster-a-culture-of-cybersecurity/</loc>
		<lastmod>2020-02-21T00:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/technology-good-thing-or-bad-thing/</loc>
		<lastmod>2020-02-21T00:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/4-reasons-to-automate-security-testing-with-appsec-instrumentation/</loc>
		<lastmod>2020-02-21T03:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chinese-hackers-coronavirus-phishing-attacks-how-to-stay-almost-anonymous-online/</loc>
		<lastmod>2020-02-21T05:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-security-performance-drives-digital-innovation/</loc>
		<lastmod>2020-02-21T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-data-security-jobs-are-growing-in-popularity/</loc>
		<lastmod>2020-02-21T08:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/my-take-pki-digital-certificates-now-ready-to-take-on-the-task-of-securing-digital-transformation/</loc>
		<lastmod>2020-02-21T11:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-removes-600-apps-from-play-store-for-serving-disruptive-ads/</loc>
		<lastmod>2020-02-21T12:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/u-s-department-of-defense-disclosed-data-breach-at-disa/</loc>
		<lastmod>2020-02-21T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/juice-jacking-how-hackers-can-steal-your-info-when-you-charge-devices/</loc>
		<lastmod>2020-02-21T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/becoming-a-data-company-back-to-the-future/</loc>
		<lastmod>2020-02-21T16:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/most-uk-government-devices-lost-or-stolen-in-12-months-were-unencrypted/</loc>
		<lastmod>2020-02-21T16:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-jason-mancusos-machine-learnings-privacy-problem/</loc>
		<lastmod>2020-02-21T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bimi-up-scotty-a-look-at-brand-indicators-for-message-identification-bimi-adoption-with-r-and-the-alexa-top-1m/</loc>
		<lastmod>2020-02-21T17:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/iranian-hackers-plant-backdoors-through-vpns-avast/</loc>
		<lastmod>2020-02-21T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-business-plan/</loc>
		<lastmod>2020-02-21T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/with-mdr-one-size-does-not-fit-all/</loc>
		<lastmod>2020-02-21T18:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-dr-ethan-rudds-loss-is-more-improving-malware-detectors/</loc>
		<lastmod>2020-02-21T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ssl-certificate-validity-will-be-limited-to-one-year-by-apples-safari-browser/</loc>
		<lastmod>2020-02-21T19:16:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cnbc-feature-5-steps-to-take-if-you-suspect-you-were-affected-by-the-mgm-resort-data-breach/</loc>
		<lastmod>2020-02-21T20:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-shared-responsibility-of-cloud-security/</loc>
		<lastmod>2020-02-21T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/three-ways-to-intelligently-and-efficiently-mitigate-identity-risk-in-your-business/</loc>
		<lastmod>2020-02-21T22:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/three-lessons-learned-from-a-data-breach/</loc>
		<lastmod>2020-02-21T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ethos-capitals-press-release-targeting-the-sale-of-pir-org-gtld/</loc>
		<lastmod>2020-02-21T23:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-mark-wilson-on-why-blackberry-is-where-ai-meets-the-road/</loc>
		<lastmod>2020-02-22T06:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/wordpress-xss-vulnerability-how-to-prevent-it/</loc>
		<lastmod>2020-02-22T15:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/securing-the-real-perimeter-part-1/</loc>
		<lastmod>2020-02-22T16:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-barton-rhodes-securing-your-kubeflow-clusters/</loc>
		<lastmod>2020-02-22T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-grandpa-jason-and-grandpa-chad/</loc>
		<lastmod>2020-02-22T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-anna-skeltons-deep-fakes-deep-trouble-analyzing-the-effects-of-deepfakes-on-market-manipulation/</loc>
		<lastmod>2020-02-22T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/kali-2020-1-default-username-password-kali-kali/</loc>
		<lastmod>2020-02-22T22:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tcg-addresses-the-rapid-pace-of-iot-security-with-new-guidelines-for-software-updates-on-embedded-systems-2/</loc>
		<lastmod>2020-02-23T06:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/policy-vs-technology/</loc>
		<lastmod>2020-02-23T07:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-is-nerc-cip/</loc>
		<lastmod>2020-02-23T07:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/synopsys-acquires-tinfoil-security-dast-and-api-testing-solutions-provider/</loc>
		<lastmod>2020-02-23T12:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-angelo-oliveiras-fighting-malware-with-deep-learning/</loc>
		<lastmod>2020-02-23T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/an-enterprise-guide-to-using-threat-intelligence-for-cyber-defense/</loc>
		<lastmod>2020-02-23T17:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/intel-the-hider/</loc>
		<lastmod>2020-02-23T17:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-ceo-bias-is-weakening-cybersecurity/</loc>
		<lastmod>2020-02-23T17:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/we-have-answers-questions-from-the-validating-the-known-webinar-with-idc/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/smoke-and-mirrors-the-key-to-a-snaring-a-cyber-criminal/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/what-is-rfid-skimming/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/leverage-artificial-intelligence-for-cyber-defense/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/500-million-breached-passwords-released-by-researcher-to-help-organizations-protect-their-systems/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/avast-highlights-the-latest-security-risks-at-mwc-2018/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/samsam-ransomware-infects-colorado-department-of-transportation/</loc>
		<lastmod>2020-02-23T17:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/ftc-creates-de-facto-legal-requirements-for-credential-stuffing-account-takeover/</loc>
		<lastmod>2020-02-23T17:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/webinar-qa-delta-risk-experts-share-tips-for-improving-incident-response-plans/</loc>
		<lastmod>2020-02-23T17:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/chase-glitch-exposed-customer-accounts/</loc>
		<lastmod>2020-02-23T17:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/securityeverafter-2018-02-22-194100/</loc>
		<lastmod>2020-02-23T17:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/cyber-innovation-in-2018/</loc>
		<lastmod>2020-02-23T17:37:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/new-vulnerability-and-assessment-scanning-for-your-aws-cloud-databases/</loc>
		<lastmod>2020-02-23T17:37:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/deepfakes-fakeapp-tool-briefly-includes-cryptominer/</loc>
		<lastmod>2020-02-23T17:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-about-the-testing-you-cant-automate/</loc>
		<lastmod>2020-02-23T18:13:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/do-we-really-need-a-cso/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/facebook-pulls-its-vpn-from-the-ios-app-store-after-data-harvesting-accusations/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/analysts-forecast-global-cybersecurity-spending-slowdown-next-year/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cardiac-patient-data-at-risk-philips-reports/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/extending-trust-to-embedded-mobile-systems/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/american-megatrends-adds-tpm-support-on-arm-based-systems-running-aptio-v-uefi-firmware/</loc>
		<lastmod>2020-02-23T18:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/trend-micro-takes-multi-pronged-approach-to-narrowing-the-gaping-cybersecurity-skills-gap/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/introducing-windows-acl-working-with-acls-in-rust/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/black-hat-the-exposed/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-risks-how-similar-solution-information-sharing-reduces-risk-at-the-network-perimeter/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-most-effective-defense-is-proactive-cybersecurity/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/facebookery-caught-red-handed-violating-apple-data-collection-rules/</loc>
		<lastmod>2020-02-23T18:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/google-warns-businesses-of-government-backed-phishing-attacks/</loc>
		<lastmod>2020-02-23T18:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/39-of-uk-ceos-admit-that-cyber-attacks-are-unavoidable/</loc>
		<lastmod>2020-02-23T18:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/john-mueller-and-mark-stewart-on-the-risks-of-terrorism/</loc>
		<lastmod>2020-02-23T18:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ssd-advisory-cloudbyte-elastistor-os-unauthenticated-remote-code-execution/</loc>
		<lastmod>2020-02-23T18:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/pci-compliance-is-it-still-an-annual-event/</loc>
		<lastmod>2020-02-23T18:13:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/a-worrying-trend-attacks-on-asian-healthcare-organizations/</loc>
		<lastmod>2020-02-23T18:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/an-android-package-is-no-longer-a-zip/</loc>
		<lastmod>2020-02-23T18:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/android-bondpath-a-mature-spyware/</loc>
		<lastmod>2020-02-23T18:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/school-district-of-philadelphia-securing-virtual-servers-chromebooks-and-student-data/</loc>
		<lastmod>2020-02-23T18:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/school-district-of-philadelphia-securing-virtual-servers-chromebooks-and-student-data-while-saving-six-figures/</loc>
		<lastmod>2020-02-23T18:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/nydfs-cybersecurity-regulation-transition-period-ends/</loc>
		<lastmod>2020-02-23T18:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/02/how-much-of-your-security-gear-is-misconfigured-or-not-configured/</loc>
		<lastmod>2020-02-23T18:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/from-the-archive-robert-m-lees-jeff-haas-little-bobby-comics-week-105/</loc>
		<lastmod>2020-02-23T18:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-jesus-solanos-behavioral-biometrics-and-context-analytics/</loc>
		<lastmod>2020-02-23T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/netops-vs-devops-vs-devsecops-whats-the-difference/</loc>
		<lastmod>2020-02-24T04:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-get-started-in-digital-forensics/</loc>
		<lastmod>2020-02-24T04:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ring-mandates-two-factor-authentication-license-plate-reader-data-sharing-rsa-conference-coronavirus-fears/</loc>
		<lastmod>2020-02-24T05:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinets-np7-is-key-to-secure-the-hyperscalability-mandatory-in-5g/</loc>
		<lastmod>2020-02-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinets-longstanding-history-of-ai-driven-security/</loc>
		<lastmod>2020-02-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortiai-virtual-security-analyst-revolutionizes-threat-protection-for-secops/</loc>
		<lastmod>2020-02-24T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-threats-for-2020/</loc>
		<lastmod>2020-02-24T08:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/financial-account-security-causing-the-greatest-angst-survey-says/</loc>
		<lastmod>2020-02-24T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-burisma-hack-cyberwar-or-not/</loc>
		<lastmod>2020-02-24T11:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/book-review-security-yearbook-preserves-cybersecurity-history-highlights-tectonic-shift/</loc>
		<lastmod>2020-02-24T11:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/us-defense-it-agency-says-data-breach-may-have-affected-200000-people/</loc>
		<lastmod>2020-02-24T12:13:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/google-docs-forms-abused-by-phishers-to-harvest-microsoft-credentials/</loc>
		<lastmod>2020-02-24T12:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/organizations-struggle-with-cloud-security-in-the-post-digital-transformation-era-highlights-from-our-2020-data-threat-report-global-edition/</loc>
		<lastmod>2020-02-24T12:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/raccoon-the-story-of-a-typical-infostealer/</loc>
		<lastmod>2020-02-24T13:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-iot-security-regulations-what-you-need-to-know-2/</loc>
		<lastmod>2020-02-24T14:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/data-center-management-best-practices-for-attracting-enterprise-clients-2/</loc>
		<lastmod>2020-02-24T14:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mobile-world-congress-mwc-2020-canceled-heres-what-to-do-instead/</loc>
		<lastmod>2020-02-24T14:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-scope-your-organization-for-nerc-cip/</loc>
		<lastmod>2020-02-24T14:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/attackers-use-sms-phishing-to-steal-credentials-and-install-emotet-malware/</loc>
		<lastmod>2020-02-24T14:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/secure-living-on-the-edge/</loc>
		<lastmod>2020-02-24T15:08:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/is-security-for-containers-and-microservices-the-same/</loc>
		<lastmod>2020-02-24T15:11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/clearswift-and-goanywhere-demonstrate-award-winning-file-transfer-technology-at-rsa/</loc>
		<lastmod>2020-02-24T15:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-aragog/</loc>
		<lastmod>2020-02-24T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/secure-your-apis-dont-give-hackers-a-chance/</loc>
		<lastmod>2020-02-24T15:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-retain-the-right-kinds-of-control-in-the-cloud/</loc>
		<lastmod>2020-02-24T15:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hipaa-compliance-why-it-matters-and-how-to-obtain-it/</loc>
		<lastmod>2020-02-24T15:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/gartner-you-must-assess-overall-software-health-and-welfare/</loc>
		<lastmod>2020-02-24T15:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-anomaly-detection-accelerates-ot-and-iot-security/</loc>
		<lastmod>2020-02-24T16:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-jon-hawes-a-buyers-guide-to-the-market-promise-of-automagic-artificial-intelligence/</loc>
		<lastmod>2020-02-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/forgerock-at-rsa/</loc>
		<lastmod>2020-02-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/untangle-recognized-for-smb-cybersecurity-innovation-2/</loc>
		<lastmod>2020-02-24T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/</loc>
		<lastmod>2020-02-24T17:13:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/veracode-wins-three-awards-for-appsec-excellence-as-a-leader-in-devsecops/</loc>
		<lastmod>2020-02-24T17:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/appsec-related-must-do-activities-and-sessions-at-rsa-2020/</loc>
		<lastmod>2020-02-24T17:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-cybersecurity-trends-increased-demand-for-election-security-the-nations-biggest-threat-to-democracy-in-2020-by-major-general-earl-matthews-usaf-ret/</loc>
		<lastmod>2020-02-24T17:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/2020-cybersecurity-trends-building-customer-trust-through-data-protection-and-privacy-regulation-by-robert-potter/</loc>
		<lastmod>2020-02-24T17:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/every-ciso-tell-me-whats-working-and-whats-not-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/inserting-security-in-pull-requests%e2%80%8a-%e2%80%8ain-a-developer-friendly-way/</loc>
		<lastmod>2020-02-24T17:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/marketing-meat-and-mayhem-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-tools-overload-is-bad-business-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/precise-practical-pocs-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisco-and-verodin-live-in-las-vegas-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-salute-to-it-security-professionals-on-wannacry-weekend-by/</loc>
		<lastmod>2020-02-24T17:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-at-the-mitre-7th-annual-secure-and-resilient-cyber-architectures-invitational-by-thomas-leduc/</loc>
		<lastmod>2020-02-24T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-optiv-and-some-denver-beer-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/environmental-drift-and-continuous-security-validation-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/elevating-offensive-red-teaming-with-sip-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisco-live-las-vegas-by-brian-contos/</loc>
		<lastmod>2020-02-24T17:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/robert-m-lees-jeff-haas-little-bobby-comics-week-265/</loc>
		<lastmod>2020-02-24T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/coronas-burritos-and-security-oh-my-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/5-essential-security-principles-that-could-save-you-4-83-billion-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/entire-population-of-langley-virginia-face-palms-as-cia-cyber-arsenal-leaks-by/</loc>
		<lastmod>2020-02-24T18:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/password-rules-blow-the-best-part-they-dont-even-work-by/</loc>
		<lastmod>2020-02-24T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/wall-st-security-jedi-jay-leek-verodins-insights-are-a-godsend-for-the-enterprise-video-by/</loc>
		<lastmod>2020-02-24T18:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/weaponizing-pcaps-for-security-assessments-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/trust-but-verify-verodin-allows-you-to-do-both-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-effort-%e2%89%a0-security-effectiveness-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodins-cybersecurity-dream-team-is-hiring-by-thomas-leduc/</loc>
		<lastmod>2020-02-24T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/siems-can-suck-and-other-stories-from-the-security-sarlacc-pit-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/communicating-security-in-the-heartland-of-minnesota-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-day-in-the-life-of-a-security-startup-by/</loc>
		<lastmod>2020-02-24T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-tools-are-too-unpredictable-to-take-chances-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/uk-cio-event-verodin-and-varmour-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/defining-a-true-cybersecurity-posture-by/</loc>
		<lastmod>2020-02-24T18:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/challenge-communicate-cybersecurity-effectiveness-to-execs-without-using-technobabble-by-thomas-leduc/</loc>
		<lastmod>2020-02-24T18:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/effectiveness-of-snort-with-verodin-sip-by-brian-contos/</loc>
		<lastmod>2020-02-24T18:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ftc-seeks-public-comment-on-approach-to-influencers-endorsements-testimonials-and-reviews/</loc>
		<lastmod>2020-02-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-kenya-yoshimuras-clairvoyance-concurrent-lip-reading-for-smart-masses/</loc>
		<lastmod>2020-02-24T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/can-you-spot-whats-wrong-with-this-picture-by-thomas-leduc/</loc>
		<lastmod>2020-02-24T19:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/train-like-your-real-enemy-not-the-one-you-think-you-know-by/</loc>
		<lastmod>2020-02-24T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ransomware-wiper-by-james-lerud/</loc>
		<lastmod>2020-02-24T19:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-crisis-in-confidence-and-other-impressions-from-rsa-conference-by/</loc>
		<lastmod>2020-02-24T19:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/validating-advanced-malware-protection-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/defensive-regression-in-cybersecurity-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/you-wont-believe-this-one-simple-hack-to-steal-data-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/siems-sometimes-suck-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/congrats-youre-the-new-ciso-now-what-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/inadequate-intelligence-integration-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-high-ground/</loc>
		<lastmod>2020-02-24T18:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/ceo-calls-ciso-are-we-safe-what-happens-next-will-blow-your-mind-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:46:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cybersecurity-and-the-pacific-northwest-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/forget-cyber-what-about-radioactive-boars-other-dangerous-beasts-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-rsa-17-letting-go-of-of-the-security-assumptions-blankie-by/</loc>
		<lastmod>2020-02-24T19:46:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/were-hiring-get-out-of-the-sarlacc-pit-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/math-versus-assumptions-spoiler-alert-math-wins-by/</loc>
		<lastmod>2020-02-24T19:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/us-cert-warns-your-security-boxes-might-be-uh-damaging-your-security-by/</loc>
		<lastmod>2020-02-24T19:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/trump-truth-and-kitties-by/</loc>
		<lastmod>2020-02-24T19:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/crosslink-capital-and-verodin-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/selfie-fatalities-skyrocket-by/</loc>
		<lastmod>2020-02-24T19:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sensational-shocking-and-sexy-vs-security-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/home-pwn-y-home-by/</loc>
		<lastmod>2020-02-24T19:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/seeing-through-security-snake-oil-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-football-teaches-us-about-cybersecurity-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/whats-the-first-security-product-you-ever-used-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-us-cert-and-the-verizon-data-breach-investigations-report-dbir-remind-us-about-security-health-decision-making-shortcuts-by/</loc>
		<lastmod>2020-02-24T19:49:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisco-and-verodin-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/urgent-sea-slug-security-news-from-usenix-enigma-con-by/</loc>
		<lastmod>2020-02-24T19:49:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-is-presenting-at-the-department-of-justice-cybersecurity-symposium-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-the-challenger-tragedy-can-teach-cisos-and-soc-teams-by/</loc>
		<lastmod>2020-02-24T19:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/doj-event-security-beyond-assumptions-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/practicing-cybersecurity-like-football-a-video-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-alert-validate-that-youre-secure-from-wannacry-ransomware-by-james-lerud/</loc>
		<lastmod>2020-02-24T19:50:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/coming-to-rsa-17-maybe-bring-cash-by/</loc>
		<lastmod>2020-02-24T19:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-controls-validation-for-internal-auditors-top-5-needs-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/what-some-cybersecurity-vendors-dont-want-you-to-know-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-kgb-clif-bars-and-peer-150-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-dhs-czar-all-your-passwordz-are-now-belong-to-us-by/</loc>
		<lastmod>2020-02-24T19:50:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/heres-to-the-crazy-ones-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/thanks-for-the-verodin-shoutout-arthur-coviello-by/</loc>
		<lastmod>2020-02-24T19:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/optiv-verodin-sip-and-houston-texas-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rsa-security-conference-to-booth-or-not-to-booth-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/red-teaming-made-modern-with-sip-top-5-tips-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/brian-krebs-wins-a-big-one-by/</loc>
		<lastmod>2020-02-24T19:51:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/evaluating-your-existing-security-solutions-with-sip-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/before-you-buy-another-cybersecurity-buzzword-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/making-your-cybersecurity-team-the-best-of-the-best-with-sip-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/all-these-worlds-by/</loc>
		<lastmod>2020-02-24T19:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-and-cisco-live-day-ii-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:51:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/new-harvard-study-boards-are-the-absolute-worst-at-by/</loc>
		<lastmod>2020-02-24T19:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cisos-select-verodin-as-security-shark-tank-winner-by-thomas-leduc/</loc>
		<lastmod>2020-02-24T19:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/the-89th-academy-awards-and-incident-response-process-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/supercharge-your-dlp-from-poc-to-production-with-sip-by-brian-contos/</loc>
		<lastmod>2020-02-24T19:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pee-pools-and-instrumenting-security-the-importance-of-finding-out-what-youd-rather-not-know-by/</loc>
		<lastmod>2020-02-24T19:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/why-i-joined-the-exciting-non-stop-thrill-ride-called-verodin-by/</loc>
		<lastmod>2020-02-24T19:52:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-friday-fun-napflix-soothes-cisos-with-stunningly-boring-videos-by/</loc>
		<lastmod>2020-02-24T19:52:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/february-firmware-threat-report/</loc>
		<lastmod>2020-02-24T19:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/start-paying-down-your-security-debt-with-devsecops/</loc>
		<lastmod>2020-02-24T19:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-100000/</loc>
		<lastmod>2020-02-24T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-microsoft-endpoint-manager-mem/</loc>
		<lastmod>2020-02-24T20:36:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-osint-benefits-cyber-threat-intelligence/</loc>
		<lastmod>2020-02-24T21:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/s3-bucket-ransomware-attack-what-is-it-and-how-can-it-happen/</loc>
		<lastmod>2020-02-24T21:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/time-to-tighten-up-cybersecurity-to-fight-tax-fraud/</loc>
		<lastmod>2020-02-24T21:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/lte-insecurity-cruft/</loc>
		<lastmod>2020-02-24T23:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/visibility-and-control-in-the-public-cloud-is-possible-and-it-must-be-unified-and-contextual/</loc>
		<lastmod>2020-02-24T23:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-minds-expert-insights-on-blockchain-and-much-more-2/</loc>
		<lastmod>2020-02-24T23:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/secure-firmware-and-software-updates-a-matter-of-trust/</loc>
		<lastmod>2020-02-25T02:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/secure-memories-in-a-connected-world/</loc>
		<lastmod>2020-02-25T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/website-vulnerability-vs-malware-whats-the-difference/</loc>
		<lastmod>2020-02-25T02:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ciphercloud-wins-at-the-prestigious-infosec-awards-2020/</loc>
		<lastmod>2020-02-25T04:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-internet-of-things-making-mountains-out-of-microprocessors/</loc>
		<lastmod>2020-02-25T04:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ken-johnson-scholarship-2020/</loc>
		<lastmod>2020-02-25T04:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/turning-out-the-lights-on-ransomware/</loc>
		<lastmod>2020-02-25T04:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/prepare-for-cyber-threats-to-power-grids-with-the-new-sans-threat-analysis-rundown-star-webcast-series/</loc>
		<lastmod>2020-02-25T04:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/breaches-in-the-cloud-and-why-blame-matters/</loc>
		<lastmod>2020-02-25T04:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/osintforgood-using-open-source-intelligence-to-solve-real-world-problems/</loc>
		<lastmod>2020-02-25T04:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/advice-to-vendors-at-rsa-dont-ignore-the-influencers/</loc>
		<lastmod>2020-02-25T04:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-visibility-in-aws-authority-access-and-capability/</loc>
		<lastmod>2020-02-25T04:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/14-sans-instructors-share-their-cyber-resolutions-for-2020/</loc>
		<lastmod>2020-02-25T04:07:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/getting-ready-for-5g-iot/</loc>
		<lastmod>2020-02-25T04:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/emotet-attacks-spread-alongside-fears-of-coronavirus/</loc>
		<lastmod>2020-02-25T05:15:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/creating-a-secure-climate-for-your-business/</loc>
		<lastmod>2020-02-25T05:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-is-on-the-verge-of-a-major-transformation/</loc>
		<lastmod>2020-02-25T05:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-free-ddos-protection-can-be-the-most-expensive/</loc>
		<lastmod>2020-02-25T05:39:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-bot-management-is-essential-for-ccpa-compliance/</loc>
		<lastmod>2020-02-25T05:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-primer-on-the-california-consumer-privacy-act/</loc>
		<lastmod>2020-02-25T05:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/webinar-blackberry-cylance-2020-threat-report-highlights/</loc>
		<lastmod>2020-02-25T06:07:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-blackberry-cylance-2020-threat-report/</loc>
		<lastmod>2020-02-25T06:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/case-study-investment-bank-takes-on-cybersecurity/</loc>
		<lastmod>2020-02-25T06:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/case-study-jouve-digital-takes-on-cybersecurity/</loc>
		<lastmod>2020-02-25T06:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/blackberrys-new-digital-workplace-secures-the-modern-workforce/</loc>
		<lastmod>2020-02-25T06:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/a-ransomware-prescription-for-the-healthcare-industry/</loc>
		<lastmod>2020-02-25T06:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/navigating-toward-a-password-free-future-with-privileged-access-management/</loc>
		<lastmod>2020-02-25T06:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/talas-2020-vision-were-excited-about-the-future/</loc>
		<lastmod>2020-02-25T06:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/americans-data-elections-encryption-and-the-matter-of-trust/</loc>
		<lastmod>2020-02-25T06:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/climbing-the-vulnerability-management-mountain-reaching-maturity-level-4/</loc>
		<lastmod>2020-02-25T07:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-functional-requirements-of-a-security-platform/</loc>
		<lastmod>2020-02-25T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-fido2-devices-offer-a-single-token-for-combined-pki-fido-use-cases-without-the-need-to-rip-and-replace-existing-infrastructure/</loc>
		<lastmod>2020-02-25T08:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chronicle-one-year-later%e2%80%8a-%e2%80%8aantons-reflections/</loc>
		<lastmod>2020-02-25T08:06:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/login-logout-time-tracking-for-employees/</loc>
		<lastmod>2020-02-25T08:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/providing-the-best-and-most-secure-digital-engagements-for-your-customers/</loc>
		<lastmod>2020-02-25T08:56:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-use-third-party-marketing-tools-on-your-website-without-compromising-security/</loc>
		<lastmod>2020-02-25T08:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-three-best-practices-for-securing-the-hybrid-cloud/</loc>
		<lastmod>2020-02-25T09:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/clearswift-shortlisted-for-fstech-cyber-security-solution-of-the-year-award/</loc>
		<lastmod>2020-02-25T09:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mixmode-now-supports-amazon-vpc-flow-logs/</loc>
		<lastmod>2020-02-25T09:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/four-keys-to-comprehensive-network-protection/</loc>
		<lastmod>2020-02-25T12:00:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/managedmethods-named-saas-cloud-security-product-winner-in-2020-infosec-awards/</loc>
		<lastmod>2020-02-25T12:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-to-secure-devops-environments-exploring-best-practices/</loc>
		<lastmod>2020-02-25T14:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/introducing-the-morphisec-unified-threat-prevention-platform-version-4/</loc>
		<lastmod>2020-02-25T14:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/doppelpaymer-ransomware-launches-site-for-publishing-victims-data/</loc>
		<lastmod>2020-02-25T14:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/network-traffic-analysis-for-ir-discovering-rats/</loc>
		<lastmod>2020-02-25T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nist-csf-cybersecurity-basics-foundation-of-csf/</loc>
		<lastmod>2020-02-25T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/dont-get-scammed-during-the-hypest-moment-in-history/</loc>
		<lastmod>2020-02-25T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/8-tips-to-make-your-battery-last-longer-avast/</loc>
		<lastmod>2020-02-25T15:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/inrupt-tim-berners-lees-solid-and-me/</loc>
		<lastmod>2020-02-25T15:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/almost-60-of-uk-consumers-affected-by-data-breaches-in-2019/</loc>
		<lastmod>2020-02-25T16:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-qa-with-senior-infosec-analyst-aaron-sherrill-discussing-mdr-security-services/</loc>
		<lastmod>2020-02-25T15:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-lauren-putvin-phd-exploratory-data-analysis-how-and-why-in-python/</loc>
		<lastmod>2020-02-25T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/digital-trends-transforming-the-media-and-entertainment-industry-in-2020/</loc>
		<lastmod>2020-02-25T17:14:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-ringtone-timeline/</loc>
		<lastmod>2020-02-25T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/risk-is-a-parallel-circuit/</loc>
		<lastmod>2020-02-25T18:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bec-attacks-hit-more-than-2100-companies-throughout-the-us/</loc>
		<lastmod>2020-02-25T18:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-laurin-weissingers-regulating-ai-and-algorithms-lessons/</loc>
		<lastmod>2020-02-25T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/can-we-really-make-the-world-a-passwordless-place/</loc>
		<lastmod>2020-02-25T19:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/admin-vs-non-admin-accounts-in-windows-10/</loc>
		<lastmod>2020-02-25T19:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/communications-of-the-acm-march-2020-edmond-awads-sohan-dsouzas-jean-franois-bonnefons-azim-shariffs-iyad-rahwans-crowdsourcing-moral-machines/</loc>
		<lastmod>2020-02-25T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/securing-the-real-perimeter-part-2/</loc>
		<lastmod>2020-02-25T20:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/windows-csp-simple-tips-thatll-save-your-bacon/</loc>
		<lastmod>2020-02-25T20:07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/blackberry-cylance-extends-capabilities-with-solution-enhancements-and-linux-coverage/</loc>
		<lastmod>2020-02-25T22:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/code-quality-and-maintenance-emerging-risks-of-open-source-use/</loc>
		<lastmod>2020-02-25T22:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/want-fast-dfir-results-learn-how-with-the-ez-tools-command-line-poster/</loc>
		<lastmod>2020-02-25T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/introducing-the-new-mac-cloud-agent/</loc>
		<lastmod>2020-02-26T02:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/sans-2019-incident-response-survey-successful-ir-relies-on-visibility/</loc>
		<lastmod>2020-02-26T07:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyber-minds-expert-insights-on-blockchain-and-much-more/</loc>
		<lastmod>2020-02-26T07:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/using-the-fortiguard-labs-threat-landscape-report-to-defend-against-evolving-cybercrime/</loc>
		<lastmod>2020-02-26T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/lift-the-ddos-smokescreen-investigate-underlying-attacks/</loc>
		<lastmod>2020-02-26T08:17:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/newly-declassified-study-demonstrates-uselessness-of-nsas-phone-metadata-program/</loc>
		<lastmod>2020-02-26T12:08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/attack-campaign-leveraged-coronavirus-theme-to-deliver-remcos-rat/</loc>
		<lastmod>2020-02-26T12:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/complexity-keeps-pressure-on-security-professionals-to-keep-up-with-cloud-growth/</loc>
		<lastmod>2020-02-26T13:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/raccoon-malware-aims-to-steal-credentials-of-people-who-use-popular-apps/</loc>
		<lastmod>2020-02-26T14:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/exaggerated-lion-and-business-email-compromise-dont-send-that-check/</loc>
		<lastmod>2020-02-26T14:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/for-distributed-teams-its-not-all-about-the-tools/</loc>
		<lastmod>2020-02-26T14:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/zyxel-0day-affects-its-firewall-products-too/</loc>
		<lastmod>2020-02-26T14:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/introduction-to-the-owasp-api-top-ten/</loc>
		<lastmod>2020-02-26T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/certifications-compared-gcfe-vs-cfce-vs-cce/</loc>
		<lastmod>2020-02-26T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mac-filtering-in-windows-10/</loc>
		<lastmod>2020-02-26T15:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/firmware-attacks-what-they-are-how-i-can-protect-myself/</loc>
		<lastmod>2020-02-26T15:44:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/you-need-to-know-why-humans-are-now-the-biggest-challenge-in-security/</loc>
		<lastmod>2020-02-26T15:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-integration-must-be-simple-flexible-and-customizable/</loc>
		<lastmod>2020-02-26T16:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/checkmarx-research-smart-vacuum-security-flaws-may-leave-users-exposed/</loc>
		<lastmod>2020-02-26T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/bitglass-for-sase/</loc>
		<lastmod>2020-02-26T16:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/malwarebytes-launches-enhanced-cloud-platform-msp-premier-partner-program/</loc>
		<lastmod>2020-02-26T16:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/partners-power-firemon-growth-while-guiding-customers-through-security-complexity/</loc>
		<lastmod>2020-02-26T16:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hey-where-are-my-credits/</loc>
		<lastmod>2020-02-26T16:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-rand-waltzmans-disinformation-its-the-thought-that-counts/</loc>
		<lastmod>2020-02-26T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/misconfigurations-and-alert-fatigue-require-a-modern-appsec-approach/</loc>
		<lastmod>2020-02-26T17:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-wave-of-ransomware-threatens-ot-security-and-reliability/</loc>
		<lastmod>2020-02-26T17:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-joy-of-tech-pitch-meeting/</loc>
		<lastmod>2020-02-26T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/applying-behavior-analytics-to-the-mitre-attck-framework/</loc>
		<lastmod>2020-02-26T18:15:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-richard-harangs-a-tutorial-on-hacking-facial-recognition-systems/</loc>
		<lastmod>2020-02-26T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/unleash-a-kick-ass-appsec-ninja-program/</loc>
		<lastmod>2020-02-26T18:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/reputation-intelligence-at-your-fingertips/</loc>
		<lastmod>2020-02-26T20:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/menlo-security-stands-behind-its-security-announces-1-million-malware-protection-warranty/</loc>
		<lastmod>2020-02-26T20:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chronicle-road-to-detection-context%e2%80%8a-%e2%80%8apart-1-of-3/</loc>
		<lastmod>2020-02-26T22:36:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/why-risk-and-ownership-must-be-aligned-and-how-to-get-there/</loc>
		<lastmod>2020-02-26T23:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-top-3-mobile-security-threats-how-to-combat-them/</loc>
		<lastmod>2020-02-27T00:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/steve-breens-superb-memorial-to-katherine-johnson/</loc>
		<lastmod>2020-02-27T00:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/severe-vulnerability-in-ibaby-monitor-m6s-camera-leads-to-remote-access-to-video-storage-bucket/</loc>
		<lastmod>2020-02-27T02:58:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nsa-releases-cloud-vulnerability-guidance/</loc>
		<lastmod>2020-02-27T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/staying-ahead-of-cybercriminals-with-ai-and-playbooks/</loc>
		<lastmod>2020-02-27T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cylanceprotect-vs-doppelpaymer-bitpaymer-and-dridex/</loc>
		<lastmod>2020-02-27T08:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-steps-to-reduce-your-api-and-web-service-risk-in-ma-due-diligence/</loc>
		<lastmod>2020-02-27T08:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/10-cybersecurity-myths-that-put-k-12-districts-at-risk/</loc>
		<lastmod>2020-02-27T11:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/in-case-of-fire-break-windows/</loc>
		<lastmod>2020-02-27T13:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/privileged-access-workstation-vs-jump-server/</loc>
		<lastmod>2020-02-27T13:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/facial-recognition-start-up-that-sells-data-to-police-got-its-client-list-stolen/</loc>
		<lastmod>2020-02-27T14:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/managedmethods-wins-6-awards-in-the-2020-cybersecurity-excellence-awards/</loc>
		<lastmod>2020-02-27T14:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/scammers-disguise-two-domains-as-cdn-to-cloak-credit-card-skimmer/</loc>
		<lastmod>2020-02-27T14:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ransomware-attack-in-florida-forces-prosecutor-to-drop-charges-in-drug-cases/</loc>
		<lastmod>2020-02-27T14:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hiring-training-and-human-oversight-can-help-battle-insider-threats-us-state-department-official-says/</loc>
		<lastmod>2020-02-27T14:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/automation-and-integration-thwarts-misconfiguration-staff-burnout/</loc>
		<lastmod>2020-02-27T15:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/eliza-may-austin-asks-us-to-question-everything-video/</loc>
		<lastmod>2020-02-27T15:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/preventing-common-passwords-in-active-directory/</loc>
		<lastmod>2020-02-27T15:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/critical-vulnerability-found-in-envira-photo-gallery-plugin-how-to-protect-your-site/</loc>
		<lastmod>2020-02-27T14:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-do-you-manage-cybersecurity-as-a-one-person-it-team/</loc>
		<lastmod>2020-02-27T15:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-roei-amits-tal-leibovichs-how-to-get-over-your-malicious-extensions-using-deep-learning/</loc>
		<lastmod>2020-02-27T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/nation-state-attacks-are-on-the-rise-heres-why-you-should-be-worried/</loc>
		<lastmod>2020-02-27T17:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-truck-proximity/</loc>
		<lastmod>2020-02-27T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/at-rsa-the-road-to-better-security-is-to-make-it-easier/</loc>
		<lastmod>2020-02-27T18:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-ryan-kovars-dave-herralds-david-veuves-datasciencery-by-the-splunk-field/</loc>
		<lastmod>2020-02-27T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cloud-series-building-a-secure-identity-cloud/</loc>
		<lastmod>2020-02-27T20:09:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/connecting-to-secure-wireless-networks-in-windows-10/</loc>
		<lastmod>2020-02-27T20:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/hack-the-box-htb-machines-walkthrough-series-gitlab/</loc>
		<lastmod>2020-02-27T20:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/north-americas-top-it-security-conferences-in-2020/</loc>
		<lastmod>2020-02-27T20:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cmmc-compliance-soon-required-for-government-contractors-subcontracts/</loc>
		<lastmod>2020-02-27T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/2019-data-breaches-by-the-numbers/</loc>
		<lastmod>2020-02-27T20:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/mastering-the-journey-building-network-manageability-and-security-for-your-path/</loc>
		<lastmod>2020-02-27T20:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/intel-highlights-latest-security-investments-at-rsa-2020/</loc>
		<lastmod>2020-02-27T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-device-anti-theft-survival-guide-avast/</loc>
		<lastmod>2020-02-27T21:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/3-keys-to-having-an-infosec-team-that-loves-their-job/</loc>
		<lastmod>2020-02-27T21:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/how-can-third-party-risk-affect-your-healthcare-compliance/</loc>
		<lastmod>2020-02-27T21:46:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/cyber-attacks-and-the-cold-wars-north-vietnamese-air-force-by/</loc>
		<lastmod>2020-02-27T21:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/black-hat-las-vegas-verodin-it-begins-by-brian-contos/</loc>
		<lastmod>2020-02-27T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/picking-the-best-product-by-brian-contos/</loc>
		<lastmod>2020-02-27T21:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/conversations-with-chicago-cisos-by-brian-contos/</loc>
		<lastmod>2020-02-27T21:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/webinar-safeguard-citizens-and-students-from-cyber-attacks/</loc>
		<lastmod>2020-02-27T22:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chronicle-road-to-detection-approach%e2%80%8a-%e2%80%8apart-2-of-3/</loc>
		<lastmod>2020-02-28T00:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/intel-report-reveals-security-insights-and-highlights-the-value-of-transparency/</loc>
		<lastmod>2020-02-28T01:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-is-pharma-hack-spam/</loc>
		<lastmod>2020-02-28T03:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/shark-tank-tv-star-loses-almost-400000-in-business-email-compromise-scam/</loc>
		<lastmod>2020-02-28T07:29:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fortinet-optimizes-network-performance-with-secure-sd-wan/</loc>
		<lastmod>2020-02-28T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-steve-olsen-on-bringing-the-blackberry-qnx-experience-to-users/</loc>
		<lastmod>2020-02-28T12:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/infocytes-chris-gerritz-appointed-to-board-of-non-profit-merivis-to-support-veteran-tech-transitions/</loc>
		<lastmod>2020-02-28T13:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/20-ransomware-statistics-youre-powerless-to-resist-reading/</loc>
		<lastmod>2020-02-28T13:50:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/beware-secret-lovers-spreading-nemty-ransomware/</loc>
		<lastmod>2020-02-28T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/more-than-140gb-of-data-exposed-by-israeli-marketing-company/</loc>
		<lastmod>2020-02-28T14:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/tripwire-patch-priority-index-for-february-2020/</loc>
		<lastmod>2020-02-28T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/red-teaming-how-to-run-effective-cyber-drills/</loc>
		<lastmod>2020-02-28T14:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/7-best-practices-for-successfully-managing-third-party-risk/</loc>
		<lastmod>2020-02-28T14:17:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/what-to-expect-when-implementing-a-vendor-risk-management-program/</loc>
		<lastmod>2020-02-28T14:24:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/vpns-continue-to-be-a-popular-vector-for-cyberattacks/</loc>
		<lastmod>2020-02-28T15:44:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/divvycloud-ranks-no-18-on-inc-5000-series-d-c-metro-fastest-growing-companies-list/</loc>
		<lastmod>2020-02-28T15:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/new-sonatype-scan-gradle-plugin/</loc>
		<lastmod>2020-02-28T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/it-managers-want-better-vsaas-and-acaas-solutions-survey-shows/</loc>
		<lastmod>2020-02-28T15:58:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cyberattacks-target-u-s-dod-and-mexicos-economy-ministry-avast/</loc>
		<lastmod>2020-02-28T15:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-deep-fakes-panel/</loc>
		<lastmod>2020-02-28T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-essentials-for-financial-institutions/</loc>
		<lastmod>2020-02-28T17:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/chronicle-road-to-detection-yara-l-language%e2%80%8a-%e2%80%8apart-3-of-3/</loc>
		<lastmod>2020-02-28T17:48:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/deep-learning-to-find-malicious-email-attachments/</loc>
		<lastmod>2020-02-28T17:57:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/daniel-stori-the-naive-engineer/</loc>
		<lastmod>2020-02-28T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cybersecurity-essentials-for-financial-institutions-2/</loc>
		<lastmod>2020-02-28T17:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/survey-results-how-organizations-can-foster-a-culture-of-ethics-and-compliance/</loc>
		<lastmod>2020-02-28T18:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-siwei-lyus-seeing-is-deceiving-the-rise-of-ai-synthesized-fake-media/</loc>
		<lastmod>2020-02-28T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/security-priorities-automation-ascend-to-business-relevancy-per-new-kpmg-cybersecurity-report/</loc>
		<lastmod>2020-02-28T19:58:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/rsa-the-human-element/</loc>
		<lastmod>2020-02-28T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fin7-targets-new-windows-10-functionality/</loc>
		<lastmod>2020-02-28T19:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/webinar-effective-vulnerability-remediation-requires-more-than-one-data-point/</loc>
		<lastmod>2020-02-28T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/collaborating-to-treat-chronic-conditions/</loc>
		<lastmod>2020-02-28T21:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fcc-proposes-to-fine-wireless-carriers-200m-for-selling-customer-location-data/</loc>
		<lastmod>2020-02-28T22:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/validating-cybersecurity-efficacy-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/art-coviello-on-the-urgent-need-for-instrumented-security-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/environmental-drift-what-weve-got-here-is-failure-to-communicate-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-team-brazil-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-ceo-chris-key-rolling-up-his-sleeves-delivering-straight-talk-in-indiana-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-and-anomali-at-detect-2017-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-with-guns-n-roses-in-brazil-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/escape-room-verodin-style-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-takes-on-budapest-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/black-hat-verodin-boom-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/verodin-takes-on-brazil-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/black-hat-verodin-customer-appreciation-party-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/regress-no-way-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/security-sequences-and-szechuan-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/boston-and-art-coviello-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/structure-security-at-verodin-be-there-or-be-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/pitfalls-of-layered-security-by-brian-contos/</loc>
		<lastmod>2020-02-28T23:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/apple-harshes-cumulative-mellow-enforces-unilateral-tls-certificate-13-month-time-limit-in-safari-web-browser/</loc>
		<lastmod>2020-02-29T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/you-cant-act-on-what-you-dont-see-how-to-intelligently-uncover-hidden-access-risks/</loc>
		<lastmod>2020-02-29T01:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/this-is-why-devsecops-was-the-backbone-of-rsa-2020/</loc>
		<lastmod>2020-02-29T01:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/trickbot-delivery-method-gets-a-new-upgrade-focusing-on-windows-10/</loc>
		<lastmod>2020-02-29T03:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-renovo-and-the-car-that-produces-32tb-of-data-a-day/</loc>
		<lastmod>2020-02-29T05:28:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/video-cheryl-biswas-and-joshua-corman-hacking-our-way-from-vicious-to-virtuous-cycle/</loc>
		<lastmod>2020-02-29T12:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-tal-leibovichs-shimon-noam-orens-from-noisy-distorted-data-sets-to-excellent-prediction-models/</loc>
		<lastmod>2020-02-29T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/xkcd-stargazing-3/</loc>
		<lastmod>2020-02-29T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/patch-your-tomcat-and-jboss-instances-to-protect-from-ghostcat-vulnerability-cve-2020-1938-and/</loc>
		<lastmod>2020-02-29T18:16:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/def-con-27-artificial-intelligence-village-yisroel-mirskys-automated-injection-and-removal-of-medical-evidence-in-ct-and-mri-scans/</loc>
		<lastmod>2020-02-29T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cdc-n95-the-infographic/</loc>
		<lastmod>2020-03-01T03:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/cdc-niosh-n95-myth-versus-fact-its-not-what-you-think/</loc>
		<lastmod>2020-03-01T04:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/idaptive-release-20-1-is-now-available/</loc>
		<lastmod>2020-03-01T04:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/remote-file-inclusion-rfi-detecting-the-undetectable/</loc>
		<lastmod>2020-03-01T12:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-artificial-intelligence-village-walter-scheirers-backdooring-convolutional-neural-networks/</loc>
		<lastmod>2020-03-01T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/its-past-time-to-actively-stop-evil-hackers/</loc>
		<lastmod>2020-03-01T16:54:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/robert-m-lees-jeff-haas-little-bobby-comics-week-266/</loc>
		<lastmod>2020-03-01T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rob-greshams-hacking-your-soel-soc-automation-and-orchestration/</loc>
		<lastmod>2020-03-01T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/fidelis-cybersecurity-presenting-apt28-attack-simulation-at-rsa-2020/</loc>
		<lastmod>2020-03-01T22:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/rsa-2020-5-tips-for-centering-the-human-element/</loc>
		<lastmod>2020-03-01T22:25:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/sensor-feng-shui-and-the-art-of-metadata/</loc>
		<lastmod>2020-03-01T22:25:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/qa-with-former-cia-official-on-iranian-cyber-capabilities/</loc>
		<lastmod>2020-03-01T22:25:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/threat-research-team-communication-concerning-potential-heightened-activity-from-iran/</loc>
		<lastmod>2020-03-01T22:25:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/01/make-cybersecurity-your-new-years-resolution-for-2020/</loc>
		<lastmod>2020-03-01T22:27:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/youve-been-hacked-now-what/</loc>
		<lastmod>2020-03-02T05:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/one-team-two-team-red-team-blue-team/</loc>
		<lastmod>2020-03-02T07:39:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/offense-and-defense-a-tale-of-two-sides-powershell/</loc>
		<lastmod>2020-03-02T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/firefox-enables-dns-over-https-by-default-in-the-united-states/</loc>
		<lastmod>2020-03-02T09:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/contact-form-7-vulnerability-in-wordpress-privilege-escalation/</loc>
		<lastmod>2020-03-02T10:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/new-tech-juicing-up-soar-sirp-inserts-risk-based-analysis-into-network-defense-playbooks/</loc>
		<lastmod>2020-03-02T11:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/reality-check-the-story-of-cybersecurity/</loc>
		<lastmod>2020-03-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/8-digital-risks-your-board-will-ask-about-this-year/</loc>
		<lastmod>2020-03-02T12:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/make-wsj-esque-uber-tuesday-democrat-delegate-cartograms-in-r-with-catchpole/</loc>
		<lastmod>2020-03-02T12:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyberattack-fears-haunt-state-employees-more-than-natural-disasters-and-terrorist-attacks/</loc>
		<lastmod>2020-03-02T13:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/rsa-conference-2020-wrap-up-human-centric-security/</loc>
		<lastmod>2020-03-02T14:38:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/weighing-pros-and-cons-to-select-appsec-testing-types/</loc>
		<lastmod>2020-03-02T15:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/city-of-cartersville-admits-paying-ryuk-ransomware-operators-380000/</loc>
		<lastmod>2020-03-02T15:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/network-traffic-analysis-for-ir-introduction-to-networking/</loc>
		<lastmod>2020-03-02T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-work-podcast-getting-started-in-red-teaming/</loc>
		<lastmod>2020-03-02T15:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-tanya-jancas-dyi-azure-security-assessment/</loc>
		<lastmod>2020-03-02T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-joy-of-tech-facebook-versus-disinformation/</loc>
		<lastmod>2020-03-02T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/french-firms-rocked-by-kasbah-hacker/</loc>
		<lastmod>2020-03-02T18:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/launch-of-the-sevillage-at-def-con-28/</loc>
		<lastmod>2020-03-02T18:31:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/ask-the-experts-how-can-we-improve-the-security-of-the-2020-election/</loc>
		<lastmod>2020-03-02T18:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/four-common-security-acronyms-explained/</loc>
		<lastmod>2020-03-02T18:58:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-setu-parimis-pacbot-policy-as-code-from-t-mobile-oss/</loc>
		<lastmod>2020-03-02T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/defending-against-the-most-common-cyber-attack-vectors/</loc>
		<lastmod>2020-03-02T19:48:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cdcs-facial-hairstyles-and-filtering-facepiece-respirators/</loc>
		<lastmod>2020-03-02T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-spot-an-unsafe-airport/</loc>
		<lastmod>2020-03-02T20:38:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-security-roundup-for-march-2020/</loc>
		<lastmod>2020-03-02T20:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/instructions/</loc>
		<lastmod>2020-03-02T20:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/gps-tracking-device-removal-from-your-vehicle-is-not-thievery/</loc>
		<lastmod>2020-03-02T21:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/use-golang-these-mistakes-could-compromise-your-apps-security/</loc>
		<lastmod>2020-03-02T20:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/four-critical-steps-to-speeding-up-devsecops-programs/</loc>
		<lastmod>2020-03-02T21:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-is-pipeda-and-how-does-it-protect-you-and-your-privacy/</loc>
		<lastmod>2020-03-02T21:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/walgreens-disclosed-data-security-incident-involving-its-mobile-app/</loc>
		<lastmod>2020-03-02T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/navigating-cyber-landscape-of-connected-and-autonomous-cars/</loc>
		<lastmod>2020-03-02T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/7-tips-for-protecting-your-website/</loc>
		<lastmod>2020-03-02T21:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/09/are-you-using-the-right-vendor-remote-access-tool-lessons-from-the-texas-mass-ransomware-attack-2/</loc>
		<lastmod>2020-03-02T22:36:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-to-use-labels-in-hyperproof-to-save-time-on-audit-preparation/</loc>
		<lastmod>2020-03-02T23:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/menlo-security-moves-to-larger-headquarters-to-accommodate-growth/</loc>
		<lastmod>2020-03-03T00:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/technology-and-the-vote-in-2020-avast/</loc>
		<lastmod>2020-03-03T01:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/bitglass-security-spotlight-6-5-million-registered-voters-exposed-in-israel-three-weeks-before-the-election/</loc>
		<lastmod>2020-03-03T01:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-partners-can-help-customers-fill-the-cybersecurity-skills-gap/</loc>
		<lastmod>2020-03-03T08:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2019/04/how-to-improve-your-risk-assessment-process/</loc>
		<lastmod>2020-03-03T08:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/enabling-secure-code-signing-at-scale/</loc>
		<lastmod>2020-03-03T08:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/keeping-customer-data-secure-in-the-cloud-5-things-to-know/</loc>
		<lastmod>2020-03-03T09:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/recent-ransomware-threatens-ot-security-reputation-and-gdpr-fines/</loc>
		<lastmod>2020-03-03T09:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/fighting-data-breach-fatigue-give-cyber-thieves-a-run-for-their-money/</loc>
		<lastmod>2020-03-03T09:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-mobile-phones-make-teens-safer/</loc>
		<lastmod>2020-03-03T10:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/podcast-episode-3-how-the-mitre-attck-framework-can-improve-your-defenses/</loc>
		<lastmod>2020-03-03T10:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/nvidia-fixes-high-severity-vulnerability-in-drivers/</loc>
		<lastmod>2020-03-03T10:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/what-about-gandcrabs-2-billion-ransomware-operators-pocketed-only-140-million-over-six-years-fbi-calculates/</loc>
		<lastmod>2020-03-03T11:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/lessons-learned-from-2019s-biggest-data-breaches/</loc>
		<lastmod>2020-03-04T08:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Impact-Cybersecurity-Threats-2.jpg</image:loc>
			<image:title><![CDATA[fraud]]></image:title>
			<image:caption><![CDATA[fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/managedmethods-2019-state-of-k-12-cybersecurity-infographic-reveals-cybersecurity-incidents-impacting-school-districts-increased-185/</loc>
		<lastmod>2020-03-03T12:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/service-providers-keep-pace-in-todays-digitally-charged-world/</loc>
		<lastmod>2020-03-03T13:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/untangle-wins-best-sme-security-solution-at-2020-sc-awards/</loc>
		<lastmod>2020-03-03T14:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/a-brief-history-of-securing-the-hybrid-cloud/</loc>
		<lastmod>2020-03-03T14:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/head-of-mi5-calls-on-tech-companies-to-let-law-agencies-access-encrypted-messages/</loc>
		<lastmod>2020-03-03T14:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/preventing-context-specific-passwords-in-active-directory/</loc>
		<lastmod>2020-03-03T14:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/protect-your-third-party-workflows-with-security-infrastructure-integrations/</loc>
		<lastmod>2020-03-03T14:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/wearedelphix-meet-vanessa-negrete/</loc>
		<lastmod>2020-03-03T14:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/pwndlocker-ransomware-targeting-municipalities-enterprise-networks/</loc>
		<lastmod>2020-03-03T15:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-do-you-encourage-developers-to-be-passionate-about-security-give-them-some-grit/</loc>
		<lastmod>2020-03-03T14:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-case-for-limiting-your-browser-extensions/</loc>
		<lastmod>2020-03-03T15:39:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/zero-to-hashing-in-under-10-minutes-argon2-in-nodejs/</loc>
		<lastmod>2020-03-03T14:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/smishing-is-a-growing-mobile-phishing-threat-vector-that-needs-your-attention/</loc>
		<lastmod>2020-03-03T15:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/ip-reputation-scores-additional-security-for-smbs/</loc>
		<lastmod>2020-03-03T16:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/4-ways-the-coronavirus-may-affect-cybersecurity-operations/</loc>
		<lastmod>2020-03-03T16:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/secure-card-payments-not-just-for-the-retail-sector/</loc>
		<lastmod>2020-03-03T16:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/3-jobs-other-than-developers-that-need-to-know-application-security/</loc>
		<lastmod>2020-03-03T15:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/5-reasons-your-app-is-insecure/</loc>
		<lastmod>2020-03-03T15:35:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/improper-access-control-in-django-what-it-looks-like-and-how-to-fix-it/</loc>
		<lastmod>2020-03-03T15:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-top-8-concerns-for-cisos-in-2020/</loc>
		<lastmod>2020-03-03T16:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/a-case-for-pedm/</loc>
		<lastmod>2020-03-03T16:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/perspectives-on-the-changing-linux-ecosystem/</loc>
		<lastmod>2020-03-03T16:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/different-paths-same-goal-privileged-account-and-session-management-pasm-and-privilege-elevation-and-delegation-management-pedm/</loc>
		<lastmod>2020-03-03T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/three-signs-youve-outgrown-password-vaulting/</loc>
		<lastmod>2020-03-03T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/the-six-ws-of-granular-access-control/</loc>
		<lastmod>2020-03-03T16:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/with-public-cloud-os-instances-growing-security-challenges-grow-too/</loc>
		<lastmod>2020-03-03T16:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/eight-steps-toward-a-secure-hybrid-cloud-environment/</loc>
		<lastmod>2020-03-03T16:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/02/staying-ahead-of-the-curve-implementing-privileged-access-management-solutions/</loc>
		<lastmod>2020-03-03T16:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-rod-sotos-and-jos-hernandez-using-splunk-or-elk-for-auditing-aws-gcp-azure-security/</loc>
		<lastmod>2020-03-03T17:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/the-terrible-horrible-no-good-very-bad-truth-about-vulnerability-management/</loc>
		<lastmod>2020-03-03T17:58:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/xkcd-coronavirus-name/</loc>
		<lastmod>2020-03-03T18:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/how-dmarc-works-to-protect-companies-and-elections-video/</loc>
		<lastmod>2020-03-03T18:41:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/cyber-threat-intelligence-how-to-use-osint/</loc>
		<lastmod>2020-03-03T18:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/def-con-27-cloud-village-rotem-bars-hacking-into-automative-clouds/</loc>
		<lastmod>2020-03-03T19:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/doh-firefox-engages-more-secure-dns-over-https-protocol-heres-what-that-means-for-you/</loc>
		<lastmod>2020-03-03T19:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/manticore-discovers-the-ens-bug/</loc>
		<lastmod>2020-03-03T19:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/thoreaus-simplify-exhortation-hovers-over-rsa/</loc>
		<lastmod>2020-03-03T19:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/security-training-has-a-place-in-a-secure-sdlc/</loc>
		<lastmod>2020-03-03T18:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/wash-your-hands/</loc>
		<lastmod>2020-03-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/intrusion-detection-systems-a-deep-dive-into-nids-hids/</loc>
		<lastmod>2020-03-03T20:49:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/apwg-year-end-report-2019-a-roller-coaster-ride-for-phishing/</loc>
		<lastmod>2020-03-03T20:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/single-sign-on-in-windows-10/</loc>
		<lastmod>2020-03-03T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/mitre-attck-credential-dumping/</loc>
		<lastmod>2020-03-03T20:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/malware-spotlight-tarmac/</loc>
		<lastmod>2020-03-03T20:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/sonatype-rolls-out-enhanced-javascript-scanning-npm-automated-pull-requests-more-free-js-developer-tools/</loc>
		<lastmod>2020-03-03T21:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/why-manufacturing-should-invest-in-third-party-risk-management/</loc>
		<lastmod>2020-03-03T22:16:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/integration-at-the-heart-of-everything/</loc>
		<lastmod>2020-03-03T22:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/modernizing-passwordless-authentication-what-enterprises-can-learn-from-the-u-s-government/</loc>
		<lastmod>2020-03-03T23:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/human-factor-securitys-jenny-radcliffe-on-social-engineering/</loc>
		<lastmod>2020-03-04T00:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2020/03/get-the-skills-you-need-to-be-a-successful-social-engineer/</loc>
		<lastmod>2020-03-04T05:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-onedrive-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2020-03-04T05:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Microsoft-OneDrive.jpg</image:loc>
			<image:title><![CDATA[Microsoft-OneDrive]]></image:title>
			<image:caption><![CDATA[Microsoft OneDrive Good Bad Ugly]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/five-eyes-countries-attribute-apt10-attacks-to-chinese-intelligence-service/</loc>
		<lastmod>2020-03-04T05:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/CounterIntelligence.jpg</image:loc>
			<image:title><![CDATA[CounterIntelligence]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/two-chinese-indicted-for-conducting-mss-directed-cyberespionage/</loc>
		<lastmod>2020-03-04T05:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/cyberespionage.jpg</image:loc>
			<image:title><![CDATA[cyberespionage]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/4-things-to-know-about-the-wpa3-protocol/</loc>
		<lastmod>2020-03-04T05:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/WPA3-Protocol.jpg</image:loc>
			<image:title><![CDATA[WPA3-Protocol]]></image:title>
			<image:caption><![CDATA[Wind River Star Lab]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-rise-and-fall-of-enterprise-security-technology/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Enterprise-Security-Technology.jpg</image:loc>
			<image:title><![CDATA[skills]]></image:title>
			<image:caption><![CDATA[skills]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/walmart-moves-closer-to-minority-report-reality/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Walmart-Minority-Report.jpg</image:loc>
			<image:caption><![CDATA[retail cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/its-beginning-to-look-a-lot-like-christmas-with-cyberattacks-lurking-in-every-data-store/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Christmas-Cyberattacks.jpg</image:loc>
			<image:title><![CDATA[Christmas-Cyberattacks]]></image:title>
			<image:caption><![CDATA[Cyberattacks Lurking in Every Data Store]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/emergency-patch-for-zero-day-vulnerability-in-internet-explorer/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FTP.jpg</image:loc>
			<image:title><![CDATA[FTP]]></image:title>
			<image:caption><![CDATA[Npm Update Crashes Linux Systems]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-ways-hackers-killed-the-sandbox-and-what-to-do-about-it/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Hackers-Sandbox.jpg</image:loc>
			<image:caption><![CDATA[IBM data security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/researcher-drops-third-windows-zero-day-exploit-in-four-months/</loc>
		<lastmod>2020-03-04T05:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/oss-security-a-top-priority-in-national-cyber-strategy/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/National-Cyber-Strategy.jpg</image:loc>
			<image:caption><![CDATA[NAC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/education-sector-ranks-last-in-total-cybersecurity-safety/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Education-Cybersecurity-Safety.jpg</image:loc>
			<image:title><![CDATA[Education-Cybersecurity-Safety]]></image:title>
			<image:caption><![CDATA[Education Sector Total Cybersecurity Safety]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-ways-ai-is-securing-crypto-exchanges/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/AI-Crypto-Exchanges.jpg</image:loc>
			<image:title><![CDATA[AI-Crypto-Exchanges]]></image:title>
			<image:caption><![CDATA[AI is Securing Crypto Exchanges]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/the-time-for-passwords-came-and-went/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Passwords-Came-Went.jpg</image:loc>
			<image:title><![CDATA[Passwords-Came-Went]]></image:title>
			<image:caption><![CDATA[credentials]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/more-shamoon-3-attacks-detected-in-the-middle-east-and-europe/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/enrich-your-siem-with-real-time-event-contextualization/</loc>
		<lastmod>2020-03-04T05:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/SIEM-Real-Time.jpg</image:loc>
			<image:title><![CDATA[SIEM-Real-Time]]></image:title>
			<image:caption><![CDATA[SIEM with Real-Time Event Contextualization]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/tis-the-season-for-an-uptick-in-spam-and-phishing/</loc>
		<lastmod>2020-03-04T05:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Season-Spam-Phishing.jpg</image:loc>
			<image:title><![CDATA[Season-Spam-Phishing]]></image:title>
			<image:caption><![CDATA[Season Uptick in Spam and Phishing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/destructive-shamoon-malware-hits-italian-oil-and-gas-firm/</loc>
		<lastmod>2020-03-04T05:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Security-Mistakes.jpg</image:loc>
			<image:title><![CDATA[danger]]></image:title>
			<image:caption><![CDATA[breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/public-clouds-fertile-ground-to-spread-malware/</loc>
		<lastmod>2020-03-04T05:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Public-Clouds-Malware.jpg</image:loc>
			<image:title><![CDATA[Public-Clouds-Malware]]></image:title>
			<image:caption><![CDATA[Public Clouds Spread Malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/public-private-partnership-takes-down-global-cybercriminals/</loc>
		<lastmod>2020-03-04T05:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Public-Private-Cybercriminals.jpg</image:loc>
			<image:title><![CDATA[Public-Private-Cybercriminals]]></image:title>
			<image:caption><![CDATA[Public-Private Partnership Takes Down Cybercriminals]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/wordpress-5-0-gets-security-patch-a-week-after-release/</loc>
		<lastmod>2020-03-04T05:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/midsized-businesses-need-enterprise-sized-security/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Enterprise-Sized-Security.jpg</image:loc>
			<image:title><![CDATA[Enterprise-Sized-Security]]></image:title>
			<image:caption><![CDATA[Midsized Businesses Need Enterprise-Sized Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/attack-kit-hijacks-dns-of-home-and-business-routers/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39752295.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39752295]]></image:title>
			<image:caption><![CDATA[Contrast Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-ways-cisos-can-break-out-of-the-security-as-necessary-evil-mentality/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/CISO-Security-Necessary.jpg</image:loc>
			<image:title><![CDATA[CISO-Security-Necessary]]></image:title>
			<image:caption><![CDATA[corporate security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/phishing-an-ever-changing-threat/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Phishing-Evolving-Threat.jpg</image:loc>
			<image:title><![CDATA[Phishing-Evolving-Threat]]></image:title>
			<image:caption><![CDATA[phishing email]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/microsoft-patches-another-actively-exploited-zero-day-vulnerability/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto512540.jpg</image:loc>
			<image:title><![CDATA[canstockphoto512540]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/evaluating-risk-critical-to-cloud-security/</loc>
		<lastmod>2020-03-04T05:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Risk-Cloud-Security.jpg</image:loc>
			<image:caption><![CDATA[Exabeam]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/major-dns-threats-preventing-dns-hijacking-and-leaks/</loc>
		<lastmod>2020-03-04T05:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/DNS-Threats-Hijacking.jpg</image:loc>
			<image:title><![CDATA[DNS-Threats-Hijacking]]></image:title>
			<image:caption><![CDATA[Major DNS Threats: Preventing DNS Hijacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/two-dozen-click-fraud-apps-found-in-google-play/</loc>
		<lastmod>2020-03-04T05:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Mobile-Fraud-Threats.jpg</image:loc>
			<image:title><![CDATA[MFA]]></image:title>
			<image:caption><![CDATA[multi-factor authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/chief-enterprise-intelligence-officer-necessary-addition-to-the-c-suite/</loc>
		<lastmod>2020-03-04T05:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Chief-Enterprise-Intelligence.jpg</image:loc>
			<image:title><![CDATA[Chief-Enterprise-Intelligence]]></image:title>
			<image:caption><![CDATA[Chief Enterprise Intelligence Officer]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/dark-patterns-stealth-ways-companies-collect-personal-data/</loc>
		<lastmod>2020-03-04T05:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Dark-Patterns-Personal-Data.jpg</image:loc>
			<image:caption><![CDATA[database security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/for-better-security-you-need-ai-done-right/</loc>
		<lastmod>2020-03-04T05:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Security-AI.jpg</image:loc>
			<image:title><![CDATA[Security-AI]]></image:title>
			<image:caption><![CDATA[Better Security, AI Done Right]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/business-email-compromise-gang-targeted-50000-company-executives/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/ATO-Attacks.jpg</image:loc>
			<image:title><![CDATA[ATO-Attacks]]></image:title>
			<image:caption><![CDATA[Barracuda Networks ATO Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/3-ways-cisos-can-boost-their-credibility-within-the-enterprise/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/CISO-Credibillity-Enterprise.jpg</image:loc>
			<image:title><![CDATA[CISO-Credibillity-Enterprise]]></image:title>
			<image:caption><![CDATA[CISOs Can Boost Their Credibility]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/6-ways-to-improve-your-security-posture-using-critical-security-controls/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Critical-Security-Controls.jpg</image:loc>
			<image:title><![CDATA[protection]]></image:title>
			<image:caption><![CDATA[Ivanti]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/north-korean-apt-group-targets-academia-via-malicious-chrome-extensions/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto34390927.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/5-challenges-utilities-will-face-in-preparing-for-new-ferc-security-standards/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Utilities-FERC-Security-Standards.jpg</image:loc>
			<image:title><![CDATA[Utilities-FERC-Security-Standards]]></image:title>
			<image:caption><![CDATA[Preparing for New FERC Security Standards]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ai-ml-in-security-know-what-youre-buying/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/AI-ML-Security.jpg</image:loc>
			<image:title><![CDATA[AI-ML-Security]]></image:title>
			<image:caption><![CDATA[budget]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/email-spam-campaign-targets-u-s-retail-restaurant-sectors/</loc>
		<lastmod>2020-03-04T05:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/BEC-Fraud.jpg</image:loc>
			<image:title><![CDATA[BEC-Fraud]]></image:title>
			<image:caption><![CDATA[phaxttachments]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/ai-and-big-data-in-health-care-the-risks-and-rewards/</loc>
		<lastmod>2020-03-04T05:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Big-Data-Health-Care.jpg</image:loc>
			<image:title><![CDATA[Big-Data-Health-Care]]></image:title>
			<image:caption><![CDATA[AI and Big Data in Health Care]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/czech-republic-blames-russia-for-yearlong-email-breach/</loc>
		<lastmod>2020-03-04T05:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russia.jpg</image:loc>
			<image:title><![CDATA[Russia]]></image:title>
			<image:caption><![CDATA[election Russians]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/facial-recognition-your-face-is-under-surveillance/</loc>
		<lastmod>2020-03-04T05:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Facial-Recognition-Surveillance.jpg</image:loc>
			<image:caption><![CDATA[data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/to-get-full-ai-payoff-invest-first-in-data-management/</loc>
		<lastmod>2020-03-04T05:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/AI-Data-Management.jpg</image:loc>
			<image:caption><![CDATA[AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/12/to-byod-or-not-byod-let-your-risk-decide/</loc>
		<lastmod>2020-03-04T05:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/BYOD-Risk.jpg</image:loc>
			<image:title><![CDATA[BYOD-Risk]]></image:title>
			<image:caption><![CDATA[To BYOD or Not BYOD]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/u-s-charges-two-iranians-for-samsam-ransomware-attacks/</loc>
		<lastmod>2020-03-04T05:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Irancyberthreat.jpg</image:loc>
			<image:title><![CDATA[Irancyberthreat]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/doj-jumps-into-the-micron-intellectual-property-theft-fray/</loc>
		<lastmod>2020-03-04T05:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Micron-Intellectual-Property.jpg</image:loc>
			<image:title><![CDATA[cyberlaw]]></image:title>
			<image:caption><![CDATA[Accenture]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/remedy-for-a-dying-software-development-team/</loc>
		<lastmod>2020-03-04T05:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Dying-Software-Development.jpg</image:loc>
			<image:title><![CDATA[Dying-Software-Development]]></image:title>
			<image:caption><![CDATA[Remedy for 'Dying' Software Development Team]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-exploit-upnp-in-routers-to-expose-private-networks-to-attacks/</loc>
		<lastmod>2020-03-04T05:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Routersecurity.jpg</image:loc>
			<image:title><![CDATA[Routersecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/3-ways-cisos-can-pump-up-their-political-prowess/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CISO-Political-Prowess.jpg</image:loc>
			<image:title><![CDATA[CISO-Political-Prowess]]></image:title>
			<image:caption><![CDATA[CISOs Pump Up Political Prowess]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/soar-doesnt-have-mood-swings/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/SOAR-Mood-Swings.jpg</image:loc>
			<image:title><![CDATA[SOAR-Mood-Swings]]></image:title>
			<image:caption><![CDATA[security employees]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ecc-memory-not-safe-from-rowhammer-attack/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Exfiltrate-Intellectual-Property.jpg</image:loc>
			<image:caption><![CDATA[Bitbucket]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-ai-and-machine-learning-can-fool-biometric-sensors/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/AI-Machine-Learning-Biometric.jpg</image:loc>
			<image:caption><![CDATA[cybersecurity AI]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/solving-the-problem-of-human-error-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Human-Error-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[pandemic]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/5-crucial-requirements-for-enterprise-security-beyond-the-firewall/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Enterprise-Security-Firewall.jpg</image:loc>
			<image:caption><![CDATA[SD-WAN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cisco-takes-another-stab-at-patching-recent-webex-vulnerability/</loc>
		<lastmod>2020-03-04T05:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/securing-the-new-network/</loc>
		<lastmod>2020-03-04T05:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Securing-New-Network.jpg</image:loc>
			<image:caption><![CDATA[security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/devops-chat-iot-security-with-digicerts-mike-nelson/</loc>
		<lastmod>2020-03-04T05:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/IoT-Security-DigiCert.jpg</image:loc>
			<image:title><![CDATA[IoT-Security-DigiCert]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/airlines-and-personal-data-a-flight-of-fancy/</loc>
		<lastmod>2020-03-04T05:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Airlines-Personal-Data.jpg</image:loc>
			<image:title><![CDATA[Airlines-Personal-Data]]></image:title>
			<image:caption><![CDATA[Airlines and Personal Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/adobe-patches-zero-day-flaw-in-flash-player/</loc>
		<lastmod>2020-03-04T05:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Phishing2.jpg</image:loc>
			<image:title><![CDATA[Phishing2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/data-privacy-is-a-property-rights-issue/</loc>
		<lastmod>2020-03-04T05:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Property-Rights-Issue.jpg</image:loc>
			<image:title><![CDATA[Property-Rights-Issue]]></image:title>
			<image:caption><![CDATA[Data Privacy is a Property Rights Issue]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/rbs-survey-one-third-of-vulnerabilities-rated-high-or-critical-this-year/</loc>
		<lastmod>2020-03-04T05:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/e-retailers-stay-secure-this-and-every-holiday/</loc>
		<lastmod>2020-03-04T05:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/E-Retailers-Secure.jpg</image:loc>
			<image:title><![CDATA[E-Retailers-Secure]]></image:title>
			<image:caption><![CDATA[E-Retailers: Stay Secure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-network-traffic-analysis-can-help-in-meeting-security-goals/</loc>
		<lastmod>2020-03-04T05:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Network-Traffic-Analysis.jpg</image:loc>
			<image:title><![CDATA[Network-Traffic-Analysis]]></image:title>
			<image:caption><![CDATA[Network Traffic Analysis Security Goals]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/apt28-pulls-out-new-malware-cannon/</loc>
		<lastmod>2020-03-04T05:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Russia.jpg</image:loc>
			<image:title><![CDATA[Russia]]></image:title>
			<image:caption><![CDATA[election Russians]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/former-ciso-series/</loc>
		<lastmod>2020-03-04T05:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CISCO-Security-Boulevard.jpg</image:loc>
			<image:title><![CDATA[CISCO-Security-Boulevard]]></image:title>
			<image:caption><![CDATA[work-from-home SOC]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/olympic-destroyer-returns-with-improved-arsenal/</loc>
		<lastmod>2020-03-04T05:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto17445614.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17445614]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/defend-against-magecart-style-website-supply-chain-attacks/</loc>
		<lastmod>2020-03-04T05:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Website-Supply-Chain-Attacks.jpg</image:loc>
			<image:title><![CDATA[Website-Supply-Chain-Attacks]]></image:title>
			<image:caption><![CDATA[digital data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/canadas-new-data-privacy-law-now-in-effect/</loc>
		<lastmod>2020-03-04T05:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Canada-Data-Privacy.jpg</image:loc>
			<image:title><![CDATA[Canada-Data-Privacy]]></image:title>
			<image:caption><![CDATA[Canada's New Data Privacy Law]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/6-best-practices-to-make-the-most-of-your-sandbox-proof-of-concept/</loc>
		<lastmod>2020-03-04T05:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Sandbox-Proof-Concept.jpg</image:loc>
			<image:title><![CDATA[software asset management]]></image:title>
			<image:caption><![CDATA[threat intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/galaxy-s9-iphone-x-xiaomi-mi6-devices-hacked-at-pwn2own-contest/</loc>
		<lastmod>2020-03-04T05:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Security-Intelligence-Education.jpg</image:loc>
			<image:title><![CDATA[Security-Intelligence-Education]]></image:title>
			<image:caption><![CDATA[Security Intelligence Education Prepared]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/researchers-find-most-atms-vulnerable-to-hacker-attacks/</loc>
		<lastmod>2020-03-04T05:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/ATM-Hacker-Attacks.jpg</image:loc>
			<image:title><![CDATA[ATM-Hacker-Attacks]]></image:title>
			<image:caption><![CDATA[ATMs Vulnerable to Hacker Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/move-over-ransomware-cryptojacking-is-the-new-kid-in-town/</loc>
		<lastmod>2020-03-04T05:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Cryptojacking-New-Ransomware.jpg</image:loc>
			<image:caption><![CDATA[insider threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/microsoft-and-adobe-patch-zero-day-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto7243964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7243964]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/dialing-in-mayhem-for-profit-more-targeted-attacks-less-malware/</loc>
		<lastmod>2020-03-04T05:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Profit-Malware-Attacks.jpg</image:loc>
			<image:title><![CDATA[Profit-Malware-Attacks]]></image:title>
			<image:caption><![CDATA[More Targeted Attacks, Less Malware]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Cyberthreat-Chart-Types-of-Data-Targeted.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-exploit-flaw-wordpress-gdpr-compliance-plug-in/</loc>
		<lastmod>2020-03-04T05:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FreeTool.jpg</image:loc>
			<image:title><![CDATA[FreeTool]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/consumer-data-protection-act-forcing-accountability/</loc>
		<lastmod>2020-03-04T05:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/CDPA-Forcing-Accountability.jpg</image:loc>
			<image:caption><![CDATA[protecting data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/hackers-exploit-recently-patched-coldfusion-vulnerability/</loc>
		<lastmod>2020-03-04T05:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto41644345.jpg</image:loc>
			<image:title><![CDATA[canstockphoto41644345]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/data-security-spotlight-protecting-electoral-and-everyday-data/</loc>
		<lastmod>2020-03-04T05:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Age-Of-Collaboration.jpg</image:loc>
			<image:title><![CDATA[Age-Of-Collaboration]]></image:title>
			<image:caption><![CDATA[HR data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-changing-face-of-web-application-security/</loc>
		<lastmod>2020-03-04T05:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Web-Application-Security.jpg</image:loc>
			<image:title><![CDATA[Web-Application-Security]]></image:title>
			<image:caption><![CDATA[Changing Face of Web Application Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/user-experience-achieving-performance-and-security/</loc>
		<lastmod>2020-03-04T05:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/User-Experience-Performance.jpg</image:loc>
			<image:title><![CDATA[User-Experience-Performance]]></image:title>
			<image:caption><![CDATA[WFH]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/top-5-industries-grappling-with-bad-bots/</loc>
		<lastmod>2020-03-04T05:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Bad-Bots.jpg</image:loc>
			<image:title><![CDATA[Bad-Bots]]></image:title>
			<image:caption><![CDATA[bots]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/compliance-headaches-and-how-to-avoid-them/</loc>
		<lastmod>2020-03-04T05:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Compliance-Headaches.jpg</image:loc>
			<image:caption><![CDATA[personality]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/zero-day-exploit-published-for-vm-escape-flaw-in-virtualbox/</loc>
		<lastmod>2020-03-04T05:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto39874704.jpg</image:loc>
			<image:title><![CDATA[canstockphoto39874704]]></image:title>
			<image:caption><![CDATA[fileless malware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/legacy-government-systems-vulnerable-cyberattacks/</loc>
		<lastmod>2020-03-04T05:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Legacy-Government-Systems.jpg</image:loc>
			<image:caption><![CDATA[FTCode]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/adequacy-agreements-legislation-and-compliance-in-a-gdpr-world/</loc>
		<lastmod>2020-03-04T05:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Adequacy-Legislation-GDPR.jpg</image:loc>
			<image:title><![CDATA[Adequacy-Legislation-GDPR]]></image:title>
			<image:caption><![CDATA[Adequacy Agreements, Legislation and Compliance]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/flaws-in-self-encrypting-ssds-compromise-data-encryption/</loc>
		<lastmod>2020-03-04T05:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto37097989.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37097989]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/online-freedom-of-speech-is-becoming-extinct/</loc>
		<lastmod>2020-03-04T05:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Online-Freedom-Speech.jpg</image:loc>
			<image:title><![CDATA[Online-Freedom-Speech]]></image:title>
			<image:caption><![CDATA[Freedom of Speech Becoming Extinct]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/6-must-have-features-for-risk-based-vulnerability-management/</loc>
		<lastmod>2020-03-04T05:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Risk-Vulnerability-Management.jpg</image:loc>
			<image:caption><![CDATA[remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/the-evolving-sense-of-trust-in-the-age-of-cryptocurrency/</loc>
		<lastmod>2020-03-04T05:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Trust-Cryptocurrency.jpg</image:loc>
			<image:title><![CDATA[Trust-Cryptocurrency]]></image:title>
			<image:caption><![CDATA[cryptocurrency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/cisco-warns-of-actively-exploited-dos-flaw-in-security-appliances/</loc>
		<lastmod>2020-03-04T05:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/your-employees-pose-a-bigger-security-risk-than-you-think/</loc>
		<lastmod>2020-03-04T05:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Employee-Security-Risk.jpg</image:loc>
			<image:title><![CDATA[Employee-Security-Risk]]></image:title>
			<image:caption><![CDATA[health data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/flaw-allows-hacking-macs-ios-devices-with-single-network-packet/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/ways-to-avoid-getting-scammed-during-election-season/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Avoid-Scammed-Election.jpg</image:loc>
			<image:title><![CDATA[Avoid-Scammed-Election]]></image:title>
			<image:caption><![CDATA[Avoid Getting Scammed During Election Season]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/guarding-against-backdoors-and-malicious-hardware/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Backdoors-Malicious-Hardware.jpg</image:loc>
			<image:title><![CDATA[Backdoors-Malicious-Hardware]]></image:title>
			<image:caption><![CDATA[Razy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/tips-and-best-practices-for-network-security-in-the-connected-enterprise/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Network-Security-Connected.jpg</image:loc>
			<image:title><![CDATA[Network-Security-Connected]]></image:title>
			<image:caption><![CDATA[sledgehammer VPN]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/how-security-can-enable-digital-transformation/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Security-Digital-Transformation.jpg</image:loc>
			<image:title><![CDATA[Security-Digital-Transformation]]></image:title>
			<image:caption><![CDATA[Security Can Enable Digital Transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/11/flaws-in-ble-chips-expose-millions-of-enterprise-wi-fi-aps-to-hacking/</loc>
		<lastmod>2020-03-04T05:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DarkSide.jpg</image:loc>
			<image:title><![CDATA[DarkSide]]></image:title>
			<image:caption><![CDATA[Dark Side Quantum Computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/jquery-file-upload-flaw-highlights-security-challenges-with-code-reuse/</loc>
		<lastmod>2020-03-04T05:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/Phishing2.jpg</image:loc>
			<image:title><![CDATA[Phishing2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ai-will-bring-rise-to-a-new-federal-cybersecurity-workforce/</loc>
		<lastmod>2020-03-04T05:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Federal-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[Qualys]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-in-digital-transformation-think-of-it-as-risk-management/</loc>
		<lastmod>2020-03-04T05:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Digital-Transformation-Security.jpg</image:loc>
			<image:title><![CDATA[Digital-Transformation-Security]]></image:title>
			<image:caption><![CDATA[ICS Risk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/higher-ed-brings-hands-on-cybersecurity-experiences-to-students/</loc>
		<lastmod>2020-03-04T05:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Higher-Ed-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Higher-Ed-Cybersecurity]]></image:title>
			<image:caption><![CDATA[WFH SOC]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/CTOC-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/what-are-your-it-and-information-security-nightmares-experts-weigh-in/</loc>
		<lastmod>2020-03-04T05:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/IT-Information-Security-2.jpg</image:loc>
			<image:title><![CDATA[IT-Information-Security-2]]></image:title>
			<image:caption><![CDATA[insider theft]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/russia-meddling-round-two-project-lakhtas-accountant/</loc>
		<lastmod>2020-03-04T05:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Russia-Lakhta-Accountant.jpg</image:loc>
			<image:title><![CDATA[Russia-Lakhta-Accountant]]></image:title>
			<image:caption><![CDATA[Russia Project Lakhta’s Accountant]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Project-Lakhta-recruitment.png</image:loc>
			<image:caption><![CDATA[Security Boulevard - Project Lakhta recruitment excerpt]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/collecting-and-storing-private-data-limits-with-no-limits/</loc>
		<lastmod>2020-03-04T05:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Collecting-Storing-Private-Data.jpg</image:loc>
			<image:title><![CDATA[Collecting-Storing-Private-Data]]></image:title>
			<image:caption><![CDATA[Collecting and Storing Private Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webinar-black-duck-legal-certification-course/</loc>
		<lastmod>2020-03-04T05:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/most-gandcrab-ransomware-victims-can-now-recover-their-files-for-free/</loc>
		<lastmod>2020-03-04T05:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Rise-Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ciso-tips-to-get-the-board-onboard-with-security/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/CISCO-Board-Security.jpg</image:loc>
			<image:title><![CDATA[CISCO-Board-Security]]></image:title>
			<image:caption><![CDATA[CISCO Board Onboard with Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ensuring-smooth-security-management-across-your-cisco-aci-fabric/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cisco-ACI-Fabric.jpg</image:loc>
			<image:caption><![CDATA[lending security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-windows-zero-day-flaw-dropped-on-twitter/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Security-Practices.jpg</image:loc>
			<image:title><![CDATA[Data-Security-Practices]]></image:title>
			<image:caption><![CDATA[Best Practices for Data Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/4-sectors-more-vulnerable-because-of-iot/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Vulnerable-IoT.jpg</image:loc>
			<image:title><![CDATA[Vulnerable-IoT]]></image:title>
			<image:caption><![CDATA[IoT security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/webex-vulnerability-can-enable-remote-code-execution/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20936828.jpg</image:loc>
			<image:title><![CDATA[canstockphoto20936828]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/security-awareness-5-creative-ways-to-train-employees-on-cybersecurity/</loc>
		<lastmod>2020-03-04T05:11:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Employees.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Employees]]></image:title>
			<image:caption><![CDATA[Train Employees on Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/cybersecurity-best-practices-calls-for-penetration-testing/</loc>
		<lastmod>2020-03-04T05:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Cybersecurity-Penetration-Testing.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Penetration-Testing]]></image:title>
			<image:caption><![CDATA[Cybersecurity Best Practices Penetration Testing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/drupal-patches-critical-remote-code-execution-flaws/</loc>
		<lastmod>2020-03-04T05:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/freertos-flaws-puts-many-iot-ics-devices-at-risk/</loc>
		<lastmod>2020-03-04T05:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto26922402.jpg</image:loc>
			<image:title><![CDATA[canstockphoto26922402]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/35-million-u-s-voter-records-available-for-sale-on-hacker-forum/</loc>
		<lastmod>2020-03-04T05:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Voter-Records-Hacker-Forum.jpg</image:loc>
			<image:title><![CDATA[Voter-Records-Hacker-Forum]]></image:title>
			<image:caption><![CDATA[Voter Records Available on Hacker Forum]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/blackenergy-successor-hits-energy-companies-since-2015/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto31494711.jpg</image:loc>
			<image:title><![CDATA[canstockphoto31494711]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/new-attacks-reuse-malware-code-from-dormant-apt1/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Firewall-Layers.jpg</image:loc>
			<image:title><![CDATA[Firewall-Layers]]></image:title>
			<image:caption><![CDATA[Know Your Firewall: Layer 3 vs. Layer 7]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/insider-threat-fincen-insider-bares-treasury-secrets/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Insider-Treasury-Secrets.jpg</image:loc>
			<image:caption><![CDATA[SMB]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/natalie-edwards-mugshot.png</image:loc>
			<image:caption><![CDATA[Security Boulevard - Natalie Edwards Mugshot]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/asan-and-beyond-harnessing-the-potential-of-the-masses-to-fight-cybercrime/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/ASan-Fight-Cybercrime.jpg</image:loc>
			<image:title><![CDATA[ASan-Fight-Cybercrime]]></image:title>
			<image:caption><![CDATA[Potential of the Masses to Fight Cybercrime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/6-devops-security-challenges-to-overcome/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Overcome-Security-Challenges.jpg</image:loc>
			<image:title><![CDATA[Overcome-Security-Challenges]]></image:title>
			<image:caption><![CDATA[DevOps Security Challenges to Overcome]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/schneier-security-tough-in-the-computerization-of-everything/</loc>
		<lastmod>2020-03-04T05:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Computerization-Of-Everything.jpg</image:loc>
			<image:title><![CDATA[Computerization-Of-Everything]]></image:title>
			<image:caption><![CDATA[Security Tough in the 'Computerization of Everything']]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/making-sense-of-the-senseless-ai-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[AI-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Senseless AI in Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/survey-businesses-wont-be-ready-for-ccpa/</loc>
		<lastmod>2020-03-04T05:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Businesses-Ready-CCPA.jpg</image:loc>
			<image:title><![CDATA[Businesses-Ready-CCPA]]></image:title>
			<image:caption><![CDATA[Businesses Won't Be Ready for CCPA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/spyware-pushers-modify-equation-editor-exploit-to-bypass-av-detection/</loc>
		<lastmod>2020-03-04T05:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Security-Practices.jpg</image:loc>
			<image:title><![CDATA[Data-Security-Practices]]></image:title>
			<image:caption><![CDATA[Best Practices for Data Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/keeping-data-on-a-short-leash-to-avoid-breaches/</loc>
		<lastmod>2020-03-04T05:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Keeping-Data-Avoid-Breaches.jpg</image:loc>
			<image:title><![CDATA[Keeping-Data-Avoid-Breaches]]></image:title>
			<image:caption><![CDATA[Short Leash to Avoid Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/people-the-critical-element-in-devsecops/</loc>
		<lastmod>2020-03-04T05:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/People-Element-DevSecOps.jpg</image:loc>
			<image:caption><![CDATA[personality traits]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/microsofts-jet-vulnerability-patch-incomplete-researchers-say/</loc>
		<lastmod>2020-03-04T05:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Macs.jpg</image:loc>
			<image:caption><![CDATA[cyber attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/5-tips-to-ensure-a-secure-cloud-migration/</loc>
		<lastmod>2020-03-04T05:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Secure-Cloud-Migration.jpg</image:loc>
			<image:title><![CDATA[Secure-Cloud-Migration]]></image:title>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/five-eyes-cybersecurity-agencies-release-report-on-hacking-tools/</loc>
		<lastmod>2020-03-04T05:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Language-Matters.jpg</image:loc>
			<image:title><![CDATA[Language-Matters]]></image:title>
			<image:caption><![CDATA[Language Matters Data Breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/act-quickly-to-ensure-data-security/</loc>
		<lastmod>2020-03-04T05:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ensure-Data-Security.jpg</image:loc>
			<image:title><![CDATA[Ensure-Data-Security]]></image:title>
			<image:caption><![CDATA[Ensure Data Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/magecart-injects-skimmer-code-in-customer-rating-widget/</loc>
		<lastmod>2020-03-04T05:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/chinese-mss-officer-extradited-to-u-s-from-belgium/</loc>
		<lastmod>2020-03-04T05:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Spy.jpg</image:loc>
			<image:title><![CDATA[Spy]]></image:title>
			<image:caption><![CDATA[Chinese Spy Jerry Chun Shing Lee]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-maximize-the-value-of-your-security-team/</loc>
		<lastmod>2020-03-04T05:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Security-Team-Value.jpg</image:loc>
			<image:caption><![CDATA[data privacy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/microsofts-anne-johnson-striking-the-right-data-breach-disclosure-balance-remains-a-big-challenge-for-enterprises/</loc>
		<lastmod>2020-03-04T05:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Data-Breach-Disclosures.jpg</image:loc>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AnnJohnson_cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/backdoor-links-2016-ukrainian-blackout-to-sandworm-apt-and-notpetya/</loc>
		<lastmod>2020-03-04T05:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36889966-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36889966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-scraping-attacks-can-compromise-web-security-and-impact-business-continuity/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Compromising-Web-Security.jpg</image:loc>
			<image:title><![CDATA[Compromising-Web-Security]]></image:title>
			<image:caption><![CDATA[DataSecOps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AttackStages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Stage1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Stage2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Stage3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Topology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/whitehat-security-introduces-dynamic-single-page-application-scanning-for-an-automated-seamless-customer-experience/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/for-patch-management-do-like-the-bad-guys-and-use-automation/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Patch-Management-Automation.jpg</image:loc>
			<image:caption><![CDATA[SD-WAN network edge]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/white-house-lets-get-it-on-with-cyber-ops/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/White-House-Cyber-Ops.jpg</image:loc>
			<image:title><![CDATA[White-House-Cyber-Ops]]></image:title>
			<image:caption><![CDATA[White House Cyber Ops]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/phishing-the-gdpr-data-subject-rights/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Phishing-GDPR-Rights.jpg</image:loc>
			<image:title><![CDATA[Phishing-GDPR-Rights]]></image:title>
			<image:caption><![CDATA[employees]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/real-or-fake-the-difficulty-in-detecting-fraudulent-identity/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Detecting-Fraudulent-Identity.jpg</image:loc>
			<image:title><![CDATA[Detecting-Fraudulent-Identity]]></image:title>
			<image:caption><![CDATA[Difficulty in Detecting Fraudulent Identity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/study-most-home-routers-have-unpatched-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/WPA3-Protocol.jpg</image:loc>
			<image:title><![CDATA[WPA3-Protocol]]></image:title>
			<image:caption><![CDATA[Wind River Star Lab]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/apt28-gets-the-spotlight-but-turla-remains-russias-elite-hacking-unit/</loc>
		<lastmod>2020-03-04T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[virus]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/secretary-of-homeland-security-were-ready-for-election-day-interference/</loc>
		<lastmod>2020-03-04T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Secretary-Homeland-Security.jpg</image:loc>
			<image:title><![CDATA[Secretary-Homeland-Security]]></image:title>
			<image:caption><![CDATA[Secretary of Homeland Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/the-economics-of-data-and-information/</loc>
		<lastmod>2020-03-04T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Economics-Data-Information.jpg</image:loc>
			<image:title><![CDATA[Economics-Data-Information]]></image:title>
			<image:caption><![CDATA[The Economics of Data and Information]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Informationpyramid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/employee-hacks-spotting-insider-threats/</loc>
		<lastmod>2020-03-04T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Spotting-Insider-Threats.jpg</image:loc>
			<image:title><![CDATA[Spotting-Insider-Threats]]></image:title>
			<image:caption><![CDATA[business Data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/forgo-the-fud-to-prevent-the-security-breach/</loc>
		<lastmod>2020-03-04T05:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/FUD-Security-Breach.jpg</image:loc>
			<image:caption><![CDATA[cyberattack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/know-your-firewall-layer-3-vs-layer-7/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Firewall-Layers.jpg</image:loc>
			<image:title><![CDATA[Firewall-Layers]]></image:title>
			<image:caption><![CDATA[Know Your Firewall: Layer 3 vs. Layer 7]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ransomware-recovery-at-the-taxpayers-cost/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Ransomware-Recovery.jpg</image:loc>
			<image:caption><![CDATA[Maze]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/google-cracks-down-on-malicious-chrome-extensions/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto7243964.jpg</image:loc>
			<image:title><![CDATA[canstockphoto7243964]]></image:title>
			<image:caption><![CDATA[encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/ponemon-study-finds-ai-can-help-close-security-gaps/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/AI-Security.jpg</image:loc>
			<image:title><![CDATA[AI-Security]]></image:title>
			<image:caption><![CDATA[AI Can Help Close Security Gaps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Security-Gap-Study.jpg</image:loc>
			<image:caption><![CDATA[The Top Security Benefits from ML and from Advanced Analytics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/protego-labs-releases-no-cost-version-of-serverless-security-solution/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/overcoming-the-shadow-it-catch-22/</loc>
		<lastmod>2020-03-04T05:11:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Shadow-IT-Catch-22.jpg</image:loc>
			<image:caption><![CDATA[Security Automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/100k-routers-hijacked-for-phishing-in-ghostdns-campaign/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto36889966-1.jpg</image:loc>
			<image:title><![CDATA[canstockphoto36889966]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-help-your-best-employees-leave-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/How-to-Help-Your-Best-Employees-Leave.jpg</image:loc>
			<image:title><![CDATA[dismissal guilty office worker man kick out]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/privacy-whos-listening-in-the-workplace/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Workplace-Privacy.jpg</image:loc>
			<image:title><![CDATA[Workplace-Privacy]]></image:title>
			<image:caption><![CDATA[business security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-secure-are-smart-security-systems/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Smart-Security-Systems.jpg</image:loc>
			<image:title><![CDATA[Smart-Security-Systems]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/how-to-safeguard-against-apt-attacks/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/APT-Attacks.jpg</image:loc>
			<image:title><![CDATA[APT-Attacks]]></image:title>
			<image:caption><![CDATA[virtual appliances]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/sophisticated-iot-botnet-torii-uses-6-persistence-methods/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto37353110.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37353110]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/is-formal-education-critical-for-a-career-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Career-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Career-Cybersecurity]]></image:title>
			<image:caption><![CDATA[training]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cybersecurity-and-employee-productivity-a-constant-tug-of-war/</loc>
		<lastmod>2020-03-04T05:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Cybersecurity-Employe-Productivity.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Employe-Productivity]]></image:title>
			<image:caption><![CDATA[Cybersecurity and Employee Productivity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/russian-hacker-group-apt28-used-uefi-rootkit-on-select-targets/</loc>
		<lastmod>2020-03-04T05:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DarkSide.jpg</image:loc>
			<image:title><![CDATA[DarkSide]]></image:title>
			<image:caption><![CDATA[Dark Side Quantum Computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/10/china-fails-in-attempt-to-infiltrate-the-u-s-army-reserves/</loc>
		<lastmod>2020-03-04T05:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/China-Infiltrate-US.jpg</image:loc>
			<image:title><![CDATA[China-Infiltrate-US]]></image:title>
			<image:caption><![CDATA[China Fails Infiltrates U.S. Army Reserves]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/does-your-biometric-and-behavioral-biometric-data-meet-data-privacy-compliances/</loc>
		<lastmod>2020-03-04T05:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Behavioral-Biometric-Data.jpg</image:loc>
			<image:caption><![CDATA[Biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/macos-mojave-fixes-flaws-yet-privacy-feature-can-be-bypassed/</loc>
		<lastmod>2020-03-04T05:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto32161062.jpg</image:loc>
			<image:title><![CDATA[canstockphoto32161062]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-the-point-solution-mindset-for-it-security-is-dead/</loc>
		<lastmod>2020-03-04T05:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Point-Solution-Mindset.jpg</image:loc>
			<image:caption><![CDATA[cloud security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cyber-war-games-exercises-to-improve-disaster-response/</loc>
		<lastmod>2020-03-04T05:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Cyber-War-Games.jpg</image:loc>
			<image:title><![CDATA[Cyber-War-Games]]></image:title>
			<image:caption><![CDATA[Cyber War Games Improve Disaster Response]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/half-of-smbs-experienced-a-security-breach-last-year/</loc>
		<lastmod>2020-03-04T05:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto34390927.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-at-speed-a-new-paradigm-for-a-secure-devops-process/</loc>
		<lastmod>2020-03-04T05:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-At-Speed.jpg</image:loc>
			<image:title><![CDATA[Security-At-Speed]]></image:title>
			<image:caption><![CDATA[Security at Speed: A New Paradigm]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/i-wish-i-didnt-post-that-but-im-glad-i-did/</loc>
		<lastmod>2020-03-04T05:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/I-Wish-I-Didnt-Post-That-But-Im-Glad-I-Did.jpg</image:loc>
			<image:title><![CDATA[Bad news even in morning]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO-Vendor-Podcast-Logo-300x300_Updated-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/why-phishing-works-it-exploits-human-gullibility/</loc>
		<lastmod>2020-03-04T05:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Phishing-Exploits-Gullibility.jpg</image:loc>
			<image:caption><![CDATA[phishing attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/zero-day-rce-flaw-found-in-microsoft-jet-database-engine/</loc>
		<lastmod>2020-03-04T05:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/3-biggest-threats-to-data-security-in-health-care/</loc>
		<lastmod>2020-03-04T05:11:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Biggest-Threats-Health-Care.jpg</image:loc>
			<image:title><![CDATA[Biggest-Threats-Health-Care]]></image:title>
			<image:caption><![CDATA[Biggest Threats to Data Security in Health Care]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/french-government-open-sources-secure-operating-system/</loc>
		<lastmod>2020-03-04T05:11:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Bolster.jpg</image:loc>
			<image:title><![CDATA[Bolster]]></image:title>
			<image:caption><![CDATA[Skype End-to-End Encryption]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/a-chinese-affair-theft-of-glaxosmithkline-rd/</loc>
		<lastmod>2020-03-04T05:11:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/GlaxoSmithKline.jpg</image:loc>
			<image:title><![CDATA[GlaxoSmithKline]]></image:title>
			<image:caption><![CDATA[Theft of GlaxoSmithKline R&amp;D]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/online-retailer-newegg-hit-by-magecart-card-skimming-gang/</loc>
		<lastmod>2020-03-04T05:11:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Data-Breach-Settlement.jpg</image:loc>
			<image:title><![CDATA[Data-Breach-Settlement]]></image:title>
			<image:caption><![CDATA[Yahoos Data Breach Settlement]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/best-responses-to-one-cisos-grand-experiment-to-engage-with-security-vendors/</loc>
		<lastmod>2020-03-04T05:12:31+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_SV_Series_logo_square_Orange_300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/do-you-have-security-champions-in-your-company/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-Champions.jpg</image:loc>
			<image:title><![CDATA[Security-Champions]]></image:title>
			<image:caption><![CDATA[Security Champions in Your Company]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/application-security-and-devops-qa-with-author-kenneth-van-wyk/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/App-Security-DevOps.jpg</image:loc>
			<image:title><![CDATA[App-Security-DevOps]]></image:title>
			<image:caption><![CDATA[Application Security and DevOps]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/KNGeskTaJIC8VbcSauA_thumb_3bcb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/study-finds-mobile-fraud-threats-soar/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Mobile-Fraud-Threats.jpg</image:loc>
			<image:title><![CDATA[MFA]]></image:title>
			<image:caption><![CDATA[multi-factor authentication]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/unusual-iot-botnet-removes-cryptomining-malware-from-devices/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Botnet.jpg</image:loc>
			<image:title><![CDATA[Botnet]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/server-maintenance-checklist-15-common-issues-and-how-to-fix-them/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Server-Maintenance-Checklist.jpg</image:loc>
			<image:title><![CDATA[Server-Maintenance-Checklist]]></image:title>
			<image:caption><![CDATA[Server Maintenance Checklist]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/nvr-software-flaw-threatens-thousands-of-devices/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Hand.jpg</image:loc>
			<image:title><![CDATA[Hand]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/our-all-white-male-panel-discusses-diversity-in-cybersecurity-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Our-All-White-Male-Panel-Discusses-Diversity-in-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Male team]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO-Vendor-Podcast-Logo-300x300_Updated-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/what-the-healthcare-industry-needs-cybersecurity-pros/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Healthcare-Industry-Needs.jpg</image:loc>
			<image:title><![CDATA[Healthcare-Industry-Needs]]></image:title>
			<image:caption><![CDATA[Healthcare data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/chinas-mss-leveraging-students-in-from-u-s/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/China-MSS-Students.jpg</image:loc>
			<image:title><![CDATA[China-MSS-Students]]></image:title>
			<image:caption><![CDATA[China's MSS Leveraging Students In, From U.S.]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-site-infected-with-card-skimming-code/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/canstockphoto2665994.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2665994]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/best-responses-to-how-and-when-do-you-trust-a-security-vendor-ciso-security-vendor-relationship-series/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_SV_Series_logo_square_Orange_300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/new-android-botnet-pops-up-on-malware-as-a-service-market/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Authentication-Bypass.jpg</image:loc>
			<image:title><![CDATA[Authentication-Bypass]]></image:title>
			<image:caption><![CDATA[Systems Vulnerable Authentication Bypass]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/microsoft-fixes-17-critical-vulnerabilities/</loc>
		<lastmod>2020-03-04T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/11/ACDC.jpg</image:loc>
			<image:title><![CDATA[will-developing-nations-turn-to-cybercrime-to-fuel-their-economy]]></image:title>
			<image:caption><![CDATA[Developing Nations Cybercrime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/email-threats-must-take-top-priority-in-cybersecurity/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Email-Threats-Cybersecurity-1.jpg</image:loc>
			<image:title><![CDATA[Email-Threats-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Email Threats Top Priority in Cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/corporate-boot-camps-and-other-ways-to-find-and-retain-security-talent/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Corporate-Boot-Camps.jpg</image:loc>
			<image:title><![CDATA[cybersecurity]]></image:title>
			<image:caption><![CDATA[cybersecurity startups]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/our-latest-product-release-includes-shiny-new-security-vulnerabilities-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Our-Latest-Product-Release-Includes-Shiny-New-Security-Vulnerabilities.jpg</image:loc>
			<image:title><![CDATA[Available Now On Smartphone Shows In Stock]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO-Vendor-Podcast-Logo-300x300_Updated-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/british-airways-suffers-customer-payment-card-breach/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto41644345.jpg</image:loc>
			<image:title><![CDATA[canstockphoto41644345]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/security-gets-baked-in-at-vmworld/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-VMworld.jpg</image:loc>
			<image:title><![CDATA[Security-VMworld]]></image:title>
			<image:caption><![CDATA[Security Gets 'Baked In' at VMworld]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/is-it-safe-realizing-the-benefits-for-digital-workplace-transformations/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/digital-workplace.jpg</image:loc>
			<image:title><![CDATA[digital workplace]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/old-technology-we-all-use-it-but-at-what-risk/</loc>
		<lastmod>2020-03-04T05:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Old-Technology.jpg</image:loc>
			<image:title><![CDATA[Old-Technology]]></image:title>
			<image:caption><![CDATA[Risk of Using Old Technology]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/cisco-products-receive-patches-for-critical-struts-vulnerability/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto17786197.jpg</image:loc>
			<image:title><![CDATA[canstockphoto17786197]]></image:title>
			<image:caption><![CDATA[automation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/can-security-be-open/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Open-Source-Security.jpg</image:loc>
			<image:title><![CDATA[Open-Source-Security]]></image:title>
			<image:caption><![CDATA[Open Source Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/data-breach-notification-laws-is-it-time-for-a-uniform-standard/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Data-Breach-Notification.jpg</image:loc>
			<image:title><![CDATA[Data-Breach-Notification]]></image:title>
			<image:caption><![CDATA[Data Breach Notification Laws]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-companies-can-stop-failing-at-security/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Failing-At-Security.jpg</image:loc>
			<image:title><![CDATA[Failing-At-Security]]></image:title>
			<image:caption><![CDATA[Stop Failing At Security]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/georgiaweidmanshevirah.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/putting-the-ops-in-devsecops-why-its-hard-and-how-to-do-it/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Ops-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Ops-DevSecOps]]></image:title>
			<image:caption><![CDATA[network security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/one-cisos-grand-experiment-to-engage-with-security-vendors/</loc>
		<lastmod>2020-03-04T05:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/One-CISOs-Grand-Experiment-to-Engage-with-Security-Vendors.jpg</image:loc>
			<image:title><![CDATA[Science fan]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/CISO_SV_Series_logo_300x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Allan-Alford.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/best-responses-to-4-stories-of-security-vendors-overcoming-roadblocks/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Roadblocks-Thumbnail_1.jpg</image:loc>
			<image:title><![CDATA[Roadblocks-Thumbnail_1]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_SV_Series_logo_square_Orange_300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/securitys-greatest-enemy-endpoints-disguised-as-stuff/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Endpoints-Disguised.jpg</image:loc>
			<image:title><![CDATA[Endpoints-Disguised]]></image:title>
			<image:caption><![CDATA[Endpoints Disguised as 'Stuff']]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/two-gru-officers-wanted-by-uk-skripals-would-be-assassins/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/CO1416-2018-CCTV3.jpg</image:loc>
			<image:title><![CDATA[CO1416-2018-CCTV3]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/CO1416-2018-Bottle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/hackers-replace-mega-chrome-extension-with-trojanized-version/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Trojan.jpg</image:loc>
			<image:title><![CDATA[Trojan]]></image:title>
			<image:caption><![CDATA[China Gifts African Union]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/meeting-the-security-challenges-for-ics-ot/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Security-Challenges-ICS-OT.jpg</image:loc>
			<image:title><![CDATA[Security-Challenges-ICS-OT]]></image:title>
			<image:caption><![CDATA[Security Challenges for ICS, OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/thousands-of-3d-printers-exposed-to-attacks/</loc>
		<lastmod>2020-03-04T05:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Roger-Clark-Silk-Road.jpg</image:loc>
			<image:title><![CDATA[Roger-Clark-Silk-Road]]></image:title>
			<image:caption><![CDATA[vulnerability management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-the-rules-of-engagement-to-mitigate-insider-risk/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Rules-of-Engagement.jpg</image:loc>
			<image:caption><![CDATA[contractors]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-rise-of-fileless-malware/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Rise-Fileless-Malware.jpg</image:loc>
			<image:caption><![CDATA[ransomware]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/how-and-when-do-you-trust-a-security-vendor/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/How-and-When-Do-You-Know-to-Trust-a-Security-Vendor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/CISO_SV_Series_logo_300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/the-fuzzy-line-between-necessary-information-and-invasion-of-privacy/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Invasion-Of-Privacy.jpg</image:loc>
			<image:title><![CDATA[Invasion-Of-Privacy]]></image:title>
			<image:caption><![CDATA[biometrics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/09/thousands-of-magento-sites-infected-with-card-skimming-code/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Rethinking-Cybersecurity.jpg</image:loc>
			<image:caption><![CDATA[data leakage]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/unofficial-patch-available-for-latest-windows-zero-day-exploit/</loc>
		<lastmod>2020-03-04T05:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/PrivacyTrends.jpg</image:loc>
			<image:title><![CDATA[PrivacyTrends]]></image:title>
			<image:caption><![CDATA[cloud file service]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/best-responses-to-4-effective-targeted-techniques-to-marketing-gdpr/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Four-Effective-Targeted-Techniques-for-Marketing-GDPR-Thumbnail2.jpg</image:loc>
			<image:title><![CDATA[Four Effective Targeted Techniques for Marketing GDPR-Thumbnail2]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_SV_Series_logo_square_Orange_300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/air-canada-resets-customer-passwords-after-hackers-access-data/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Bad-Passwords.jpg</image:loc>
			<image:title><![CDATA[Bad-Passwords]]></image:title>
			<image:caption><![CDATA[We Still Use Bad Passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/why-the-entire-c-suite-is-responsible-in-a-data-breach/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/C-Suite-Data-Breach.jpg</image:loc>
			<image:title><![CDATA[C-Suite-Data-Breach]]></image:title>
			<image:caption><![CDATA[C-Suite-Data-Breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/someone-dropped-a-windows-zero-day-exploit-on-github/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/FTP.jpg</image:loc>
			<image:title><![CDATA[FTP]]></image:title>
			<image:caption><![CDATA[Npm Update Crashes Linux Systems]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/securing-multi-cloud-environments/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Securing-Multi-Cloud.jpg</image:loc>
			<image:caption><![CDATA[SMBs cloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/german-counterintelligence-there-are-spies-active-in-germany/</loc>
		<lastmod>2020-03-04T05:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/German-Counterintelligence.jpg</image:loc>
			<image:title><![CDATA[German-Counterintelligence]]></image:title>
			<image:caption><![CDATA[German Counterintelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/voting-security-suggestions-to-protect-our-elections/</loc>
		<lastmod>2020-03-04T05:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Voting-Security.jpg</image:loc>
			<image:title><![CDATA[Voting-Security]]></image:title>
			<image:caption><![CDATA[elections]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/in-the-age-of-the-data-breach-why-do-we-still-use-bad-passwords/</loc>
		<lastmod>2020-03-04T05:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Bad-Passwords.jpg</image:loc>
			<image:title><![CDATA[Bad-Passwords]]></image:title>
			<image:caption><![CDATA[We Still Use Bad Passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/discovered-modular-malware-marap-and-advisorsbot/</loc>
		<lastmod>2020-03-04T05:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Marap-AdvisorsBot.jpg</image:loc>
			<image:caption><![CDATA[dark web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-made-the-mess-they-should-clean-it-up-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Security-Made-the-Mess-They-Should-Clean-It-Up.jpg</image:loc>
			<image:title><![CDATA[scrap]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO-Vendor-Podcast-Logo-300x300_Updated-August-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/devsecops-robservations-from-black-hat-2018/</loc>
		<lastmod>2020-03-04T05:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/DevSecOps-Robservations.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Robservations]]></image:title>
			<image:caption><![CDATA[DevSecOps: Robservations from Black Hat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/mirai-iot-malware-variant-abuses-linux-cross-compilation-framework/</loc>
		<lastmod>2020-03-04T05:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto37869733.jpg</image:loc>
			<image:title><![CDATA[canstockphoto37869733]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/critical-vulnerability-patched-in-apache-struts/</loc>
		<lastmod>2020-03-04T05:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Security-Practices.jpg</image:loc>
			<image:title><![CDATA[Data-Security-Practices]]></image:title>
			<image:caption><![CDATA[Best Practices for Data Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/third-party-extensions-the-hidden-security-risk/</loc>
		<lastmod>2020-03-04T05:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Third-Party-Extensions.jpg</image:loc>
			<image:title><![CDATA[Third-Party-Extensions]]></image:title>
			<image:caption><![CDATA[protecting data]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/4-stories-of-security-vendors-overcoming-roadblocks/</loc>
		<lastmod>2020-03-04T05:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/4-Stories-of-Security-Vendors-Overcoming-Roadblocks.jpg</image:loc>
			<image:title><![CDATA[Road closed barrier]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_Security-Vendor-Relationship-Series-Rectangular-Logo_350PX.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-boulevards-5-most-read-stories-for-the-week-august-20-24/</loc>
		<lastmod>2020-03-04T05:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/analysis-of-web-apps-reveals-current-top-security-threats/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Web-Apps-Security-Threats.jpg</image:loc>
			<image:title><![CDATA[Web-Apps-Security-Threats]]></image:title>
			<image:caption><![CDATA[Web Apps Reveals Security Threats]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/necurs-botnet-launches-campaign-against-banks/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ransomware-strains-the-stealthy-cyberthreat/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Ransomware-Strains.jpg</image:loc>
			<image:title><![CDATA[Ransomware]]></image:title>
			<image:caption><![CDATA[ransom]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/microsoft-pushes-microcode-updates-for-foreshadow-cpu-flaws/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Equifax.jpg</image:loc>
			<image:title><![CDATA[Equifax]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/demystifying-insider-threats/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Demystifying-Insider-Threats.jpg</image:loc>
			<image:title><![CDATA[security tools]]></image:title>
			<image:caption><![CDATA[open source security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/bonus-whats-so-awesome-about-being-a-ciso-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Bonus-what-so-awesome-about-being-a-CISO.jpg</image:loc>
			<image:title><![CDATA[Surprised Man]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/shadow-it-an-essential-component-for-enterprise-security/</loc>
		<lastmod>2020-03-04T05:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Shadow-IT.jpg</image:loc>
			<image:title><![CDATA[Shadow-IT]]></image:title>
			<image:caption><![CDATA[Cisco cybersecurity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-chinese-spy-or-a-dupe-in-the-senators-office/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Chinese-Spy.jpg</image:loc>
			<image:title><![CDATA[Chinese-Spy]]></image:title>
			<image:caption><![CDATA[The Chinese Spy in Senator’s Office]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/malware-complacency-time-to-wake-up/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Malware-Complacency-2.jpg</image:loc>
			<image:title><![CDATA[Malware-Complacency]]></image:title>
			<image:caption><![CDATA[Malware Complacency]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/job-opportunity-youre-unqualified-and-underpaid-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/jobs-and-careers_fyopU8vd.jpg</image:loc>
			<image:title><![CDATA[Jobs and careers]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-boulevards-5-most-read-stories-for-the-week-august-13-17/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/what-does-gdpr-mean-for-intelligent-video/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/GDPR-Intelligent-Video.jpg</image:loc>
			<image:title><![CDATA[GDPR-Intelligent-Video]]></image:title>
			<image:caption><![CDATA[GDPR Mean for Intelligent Video]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/microsoft-seizes-domains-set-up-by-russian-cyberspies/</loc>
		<lastmod>2020-03-04T05:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Modernized-Industrial.jpg</image:loc>
			<image:caption><![CDATA[zero trust]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/manufacturing-a-rising-target-for-cybercriminals/</loc>
		<lastmod>2020-03-04T05:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Manufacturing-Cybercriminals-1.jpg</image:loc>
			<image:caption><![CDATA[manufacturing remote]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/4-effective-targeted-techniques-to-market-gdpr-ciso-security-vendor-relationship-series/</loc>
		<lastmod>2020-03-04T05:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Target-GDPR.jpg</image:loc>
			<image:title><![CDATA[Target]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO_Security-Vendor-Relationship-Series-Rectangular-Logo_350PX.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/ikev1-vulnerabilities-break-ipsec-vpn-security-in-cisco-huawei-zyxel-gear/</loc>
		<lastmod>2020-03-04T05:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Routers-Target.jpg</image:loc>
			<image:title><![CDATA[Routers-Target]]></image:title>
			<image:caption><![CDATA[Easy Target for Russian Hackers]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-foreshadow-vulnerabilities-defeat-memory-defenses-on-intel-cpus/</loc>
		<lastmod>2020-03-04T05:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/DarkSide.jpg</image:loc>
			<image:title><![CDATA[DarkSide]]></image:title>
			<image:caption><![CDATA[Dark Side Quantum Computing]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/man-in-the-disk-attack-lets-hackers-bypass-android-app-sandbox-security/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto48282095.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48282095]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/lack-of-user-privacy-threatens-security-defenses/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Lack-Of-User-Privacy-1.jpg</image:loc>
			<image:title><![CDATA[Lack-Of-User-Privacy]]></image:title>
			<image:caption><![CDATA[User Privacy Threatens Security Defenses]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/how-cisos-stay-current-when-theyre-ignoring-vendor-pitches-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/ManSticksFingersInEarToIgnore.jpg</image:loc>
			<image:title><![CDATA[Businessman sitting at the table and covering his ears]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/SentinelOnePodcast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/security-boulevards-5-most-read-stories-for-the-week-august-06-10/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/cyber-kill-switch-the-good-the-bad-and-the-potentially-ugly/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Cyber-Kill-Switch.jpg</image:loc>
			<image:title><![CDATA[Cyber-Kill-Switch]]></image:title>
			<image:caption><![CDATA[Cyber Kill Switch]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/industrial-control-gateways-its-like-exploiting-in-the-1990s/</loc>
		<lastmod>2020-03-04T05:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Industrial-Control-Gateways.jpg</image:loc>
			<image:title><![CDATA[Industrial-Control-Gateways]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/for-sale-u-s-military-reaper-drone-designs/</loc>
		<lastmod>2020-03-04T05:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Reaper-Drone-2.jpg</image:loc>
			<image:title><![CDATA[Reaper-Drone-2]]></image:title>
			<image:caption><![CDATA[U.S. Military 'Reaper Drone' Designs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/asian-dark-web-communities-thrive-on-cultural-differences/</loc>
		<lastmod>2020-03-04T05:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Warfare.jpg</image:loc>
			<image:title><![CDATA[Warfare]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/new-wpa2-attack-can-compromise-wireless-networks/</loc>
		<lastmod>2020-03-04T05:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/canstockphoto34390927-800x450.jpg</image:loc>
			<image:title><![CDATA[canstockphoto34390927-800x450]]></image:title>
			<image:caption><![CDATA[insider threat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/moonlighting-in-china-with-ges-intellectual-property/</loc>
		<lastmod>2020-03-04T05:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Moonlighting-China.jpg</image:loc>
			<image:title><![CDATA[Moonlighting-China]]></image:title>
			<image:caption><![CDATA[China with GE’s Intellectual Property]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/state-of-eavesdropping-on-mobile-devices/</loc>
		<lastmod>2020-03-04T05:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Mobile-Device-Eavesdropping.jpg</image:loc>
			<image:title><![CDATA[Mobile-Device-Eavesdropping]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/3-reasons-why-companies-are-adopting-ai-ml-for-threat-intelligence/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/AI-ML-Threat-Intelligence.jpg</image:loc>
			<image:title><![CDATA[AI-ML-Threat-Intelligence]]></image:title>
			<image:caption><![CDATA[AI/ML for Threat Intelligence]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/170k-mikrotik-routers-inject-cryptomining-script/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Stealing-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Stealing-Infrastructure]]></image:title>
			<image:caption><![CDATA[coinbit]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/launching-a-digital-transformation-make-security-priority/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Digital-Transformation-Launch.jpg</image:loc>
			<image:title><![CDATA[Digital-Transformation-Launch]]></image:title>
			<image:caption><![CDATA[Launching a Digital Transformation]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/use-your-crm-cisos-are-tired-of-repeating-themselves-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Use-Your-CRM-CISOs-Dont-Want-to-Repeat.jpg</image:loc>
			<image:title><![CDATA[Use Your CRM-CISOs Dont Want to Repeat]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/spycloud-ciso-vendor-relationship-ad_560x82.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/microsoft-unseats-facebook-on-the-most-recent-phishers-favs-list-of-brands-to-spoof/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Phishers-Spoof-Brands.jpg</image:loc>
			<image:title><![CDATA[Phishers-Spoof-Brands]]></image:title>
			<image:caption><![CDATA[Phishers’ Favorite Brands to Spoof]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/too-costly-too-bothersome-mfa-adoption-lags/</loc>
		<lastmod>2020-03-04T05:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/MFA-Adoption.jpg</image:loc>
			<image:title><![CDATA[Microsoft phishing]]></image:title>
			<image:caption><![CDATA[Microsoft Again Most Spoofed as Office 365 Phishing Evolves]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/iran-linked-raspite-group-targets-u-s-electric-utilities/</loc>
		<lastmod>2020-03-04T05:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Holes.jpg</image:loc>
			<image:title><![CDATA[Holes]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/the-rise-of-crypto-crime-5-cases-security-professionals-can-learn-from/</loc>
		<lastmod>2020-03-04T05:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Crypto-Crime-Rise.jpg</image:loc>
			<image:title><![CDATA[Crypto-Crime-Rise]]></image:title>
			<image:caption><![CDATA[The Rise of Crypto Crime]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/virtualization-flaw-uptick-its-just-getting-underway/</loc>
		<lastmod>2020-03-04T05:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Virtualization-Flaw-Uptick.jpg</image:loc>
			<image:caption><![CDATA[BGP hijacking]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/us-charges-3-members-of-the-notorious-fin7-cybercriminal-group/</loc>
		<lastmod>2020-03-04T05:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Supreme-Court-Internet.jpg</image:loc>
			<image:title><![CDATA[Supreme-Court-Internet]]></image:title>
			<image:caption><![CDATA[Supreme Court Ruling Changes]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/highly-targeted-ransomware-samsam-earned-its-creator-6-million/</loc>
		<lastmod>2020-03-04T05:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto46664719.jpg</image:loc>
			<image:title><![CDATA[canstockphoto46664719]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/what-you-think-you-know-about-the-owasp-top-10-may-be-wrong/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/OWASP.jpg</image:loc>
			<image:title><![CDATA[OWASP]]></image:title>
			<image:caption><![CDATA[RangeForce]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/OWASPpic1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-boulevards-5-most-read-stories-for-the-week-july-23-27/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ultra-enhanced-deluxe-ai-with-a-drop-of-retsyn-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/AI-DropOfRetsyn_SecurityBoulevard.jpg</image:loc>
			<image:title><![CDATA[AI-DropOfRetsyn_SecurityBoulevard]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/demand-more-signal-sciences-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/researchers-uncover-massive-malvertising-operation/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Email-Compromised.jpg</image:loc>
			<image:title><![CDATA[Email-Compromised]]></image:title>
			<image:caption><![CDATA[Safeguard Email Compromised Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/survey-most-ceos-exfiltrate-intellectual-property-when-leaving/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Exfiltrate-Intellectual-Property.jpg</image:loc>
			<image:caption><![CDATA[Bitbucket]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/08/protect-the-brand-overcoming-cybersecurity-obstacles-in-digital-marketing/</loc>
		<lastmod>2020-03-04T05:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Cybersecurity-Obstacles.jpg</image:loc>
			<image:title><![CDATA[Cybersecurity-Obstacles]]></image:title>
			<image:caption><![CDATA[Cybersecurity Obstacles in Digital Marketing]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/cyberattackchart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/fileless-threat-cactustorch-abuses-net-to-infect-systems/</loc>
		<lastmod>2020-03-04T05:12:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/computer-security-change-is-scary-but-necessary/</loc>
		<lastmod>2020-03-04T05:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Change-Is-Scary.jpg</image:loc>
			<image:title><![CDATA[Change-Is-Scary]]></image:title>
			<image:caption><![CDATA[Computer Security Change is Necessary]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/the-secret-lives-of-passwords/</loc>
		<lastmod>2020-03-04T05:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Passwords-Secret-Lives.jpg</image:loc>
			<image:caption><![CDATA[mobile strategy]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/us-cert-warns-about-attacks-against-erp-applications/</loc>
		<lastmod>2020-03-04T05:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto1981069.jpg</image:loc>
			<image:title><![CDATA[canstockphoto1981069]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vehicle-cybersecurity-mitigating-the-threat-of-connectedness/</loc>
		<lastmod>2020-03-04T05:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Vehicle-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Vehicle-Cybersecurity]]></image:title>
			<image:caption><![CDATA[Vehicle Cybersecurity Threat of Connectedness]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-in-a-post-gdpr-world/</loc>
		<lastmod>2020-03-04T05:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Post-GDPR-World.jpg</image:loc>
			<image:title><![CDATA[Post-GDPR-World]]></image:title>
			<image:caption><![CDATA[Security in a Post-GDPR World]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/deception-technology-giving-users-home-field-advantage/</loc>
		<lastmod>2020-03-04T05:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Deception-Technology.jpg</image:loc>
			<image:title><![CDATA[Deception-Technology]]></image:title>
			<image:caption><![CDATA[Deception Technology]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/recently-patched-oracle-weblogic-flaw-used-in-active-attacks/</loc>
		<lastmod>2020-03-04T05:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto33014599.jpg</image:loc>
			<image:title><![CDATA[canstockphoto33014599]]></image:title>
			<image:caption><![CDATA[Vollgar botnet]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/tech-companies-cool-toward-california-consumer-privacy-act/</loc>
		<lastmod>2020-03-04T05:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Cali-Consumer-Act2.jpg</image:loc>
			<image:title><![CDATA[Cali-Consumer-Act2]]></image:title>
			<image:caption><![CDATA[California Consumer Privacy Act]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-choose-a-bad-security-product-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/GoogleDog.jpg</image:loc>
			<image:title><![CDATA[GoogleDog]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1-300x300-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/key-traits-employers-seek-from-information-security-professionals/</loc>
		<lastmod>2020-03-04T05:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Security-Professionals.jpg</image:loc>
			<image:title><![CDATA[Security-Professionals]]></image:title>
			<image:caption><![CDATA[remote work security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/ciscos-latest-patches-address-critical-flaws-hardcoded-password/</loc>
		<lastmod>2020-03-04T05:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42381372.jpg</image:loc>
			<image:title><![CDATA[security platform]]></image:title>
			<image:caption><![CDATA[Enso]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-boulevards-5-most-read-stories-for-the-week-july-16-20/</loc>
		<lastmod>2020-03-04T05:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/router-compromise-enables-1-million-bank-cyberheist/</loc>
		<lastmod>2020-03-04T05:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42974088.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42974088]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cyberespionage-campaign-in-ukraine-uses-free-and-custom-rats/</loc>
		<lastmod>2020-03-04T05:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto2552677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2552677]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/its-time-to-rethink-privileged-account-management/</loc>
		<lastmod>2020-03-04T05:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Privileged-Account-Management.jpg</image:loc>
			<image:title><![CDATA[Privileged-Account-Management]]></image:title>
			<image:caption><![CDATA[First Amendment]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/PAMimage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/we-have-the-silver-bullet-for-bs-detection-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/CISOpodcastJuly17.jpg</image:loc>
			<image:title><![CDATA[Smelly Athletic Shoe]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/ciso-banner-for-Thinkst.png</image:loc>
			<image:caption><![CDATA[Thinkst - Canary]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cybersecurity-job-seekers-go-west-or-south/</loc>
		<lastmod>2020-03-04T05:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Job-Seekers.jpg</image:loc>
			<image:caption><![CDATA[CISOs report to]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/exposed-exactis-database-of-340-million-consumer-records/</loc>
		<lastmod>2020-03-04T05:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Consumer-Records.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/vpnfilter-attack-hits-chlorine-plant-in-ukraine/</loc>
		<lastmod>2020-03-04T05:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/12/Breach.jpg</image:loc>
			<image:title><![CDATA[Breach]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cpu-speculative-execution-hits-again-with-2-new-spectre-variants/</loc>
		<lastmod>2020-03-04T05:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/dark-market-shop-sells-rdp-access-to-airport-system-for-10/</loc>
		<lastmod>2020-03-04T05:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto48825957.jpg</image:loc>
			<image:title><![CDATA[canstockphoto48825957]]></image:title>
			<image:caption><![CDATA[Cisco Report Cyber Attacks]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/how-to-protect-tomorrows-critical-infrastructure/</loc>
		<lastmod>2020-03-04T05:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Critical-Infrastructure.jpg</image:loc>
			<image:title><![CDATA[Critical-Infrastructure]]></image:title>
			<image:caption><![CDATA[Protect Tomorrow's Critical Infrastructure]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-boulevards-5-most-read-stories-for-the-week-july-9-13/</loc>
		<lastmod>2020-03-04T05:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/microsoft-fixes-54-vulnerabilities-on-julys-patch-tuesday/</loc>
		<lastmod>2020-03-04T05:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto20764094.jpg</image:loc>
			<image:title><![CDATA[web insecurities]]></image:title>
			<image:caption><![CDATA[web]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/cyberespionage-group-steals-certificates-to-sign-malware/</loc>
		<lastmod>2020-03-04T05:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/Data-Breaches.jpg</image:loc>
			<image:title><![CDATA[Data-Breaches]]></image:title>
			<image:caption><![CDATA[Data Regulation Data Breaches]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-password2-more-secure-than-password1-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/password_fkxNhIPd.jpg</image:loc>
			<image:title><![CDATA[password_fkxNhIPd]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/control-defend-and-extend-container-security/</loc>
		<lastmod>2020-03-04T05:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Defend-Security.jpg</image:loc>
			<image:title><![CDATA[Defend-Security]]></image:title>
			<image:caption><![CDATA[Control Defend Extend Container Security]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/mitigating-risks-of-shadow-it-with-casbs/</loc>
		<lastmod>2020-03-04T05:12:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Mitigating-Risks.jpg</image:loc>
			<image:caption><![CDATA[IT ops]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-boulevards-5-most-read-stories-for-the-week-july-2-6/</loc>
		<lastmod>2020-03-04T05:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/canstockphoto7824425.jpg</image:loc>
			<image:title><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:title>
			<image:caption><![CDATA[Security Boulevard’s 5 Most Read Stories for the Week]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/gentoo-repository-compromised-due-to-weak-admin-password/</loc>
		<lastmod>2020-03-04T05:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto41116518.jpg</image:loc>
			<image:title><![CDATA[canstockphoto41116518]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/slowly-moving-toward-a-future-without-passwords/</loc>
		<lastmod>2020-03-04T05:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Future-Without-Passwords.jpg</image:loc>
			<image:title><![CDATA[Future-Without-Passwords]]></image:title>
			<image:caption><![CDATA[Future Without Passwords]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/hide-n-seek-iot-botnet-starts-infecting-database-servers/</loc>
		<lastmod>2020-03-04T05:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/10/Holes.jpg</image:loc>
			<image:title><![CDATA[Holes]]></image:title>
			<image:caption><![CDATA[OT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/is-vulnerability-management-now-out-of-our-control/</loc>
		<lastmod>2020-03-04T05:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Vulnerability-Mangement.jpg</image:loc>
			<image:title><![CDATA[Vulnerability-Mangement]]></image:title>
			<image:caption><![CDATA[data breach]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/attackers-test-new-document-attack-vector-that-slips-past-office-defenses/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto29297811.jpg</image:loc>
			<image:title><![CDATA[canstockphoto29297811]]></image:title>
			<image:caption><![CDATA[Spyware Skygofree Targets Android]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/lte-mobile-standard-weakness-allows-dns-spoofing-website-fingerprinting/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Equifax.jpg</image:loc>
			<image:title><![CDATA[Equifax]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/stop-asking-cisos-if-they-care-about-security-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/AngryMan.jpg</image:loc>
			<image:title><![CDATA[AngryMan]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/demand-more-signal-sciences-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/who-needs-privacy-consumers-opt-for-convenience-in-voice-home-assistants/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Home-Assistants.jpg</image:loc>
			<image:title><![CDATA[Home-Assistants]]></image:title>
			<image:caption><![CDATA[IoT]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/risky-mobile-apps-no-fun-for-entertainment-sector/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Risky-Mobile-Apps.jpg</image:loc>
			<image:title><![CDATA[Risky-Mobile-Apps]]></image:title>
			<image:caption><![CDATA[Risky Mobile Apps]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/macros-based-attack-deploys-malware-by-hijacking-desktop-shortcuts/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto15310697.jpg</image:loc>
			<image:title><![CDATA[canstockphoto15310697]]></image:title>
			<image:caption><![CDATA[Apple Ships Meltdown Patch]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/security-risks-created-by-saas-they-might-not-be-what-you-expect/</loc>
		<lastmod>2020-03-04T05:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Software-As-A-Service.jpg</image:loc>
			<image:title><![CDATA[Software-As-A-Service]]></image:title>
			<image:caption><![CDATA[application]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/the-extradition-he-thought-would-never-happen-roger-clark-silk-road/</loc>
		<lastmod>2020-03-04T05:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Silk-Road.jpg</image:loc>
			<image:title><![CDATA[Silk-Road]]></image:title>
			<image:caption><![CDATA[Roger Clark of Silk Road]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/major-attack-rampage-puts-android-devices-at-risk/</loc>
		<lastmod>2020-03-04T05:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto25314828.jpg</image:loc>
			<image:title><![CDATA[canstockphoto25314828]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/are-you-vulnerable-to-bec-fraud/</loc>
		<lastmod>2020-03-04T05:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/BEC-Fraud.jpg</image:loc>
			<image:title><![CDATA[BEC-Fraud]]></image:title>
			<image:caption><![CDATA[phaxttachments]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/FBI-BEC-1.png</image:loc>
			<image:caption><![CDATA[Security Boulevard - FBI - BEC fraud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/07/5-ways-to-secure-the-digital-core-of-your-business/</loc>
		<lastmod>2020-03-04T05:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Organizations-Future.jpg</image:loc>
			<image:title><![CDATA[Organizations-Future]]></image:title>
			<image:caption><![CDATA[Securing the Network]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/vulnerable-web-applications-leave-all-sectors-at-risk/</loc>
		<lastmod>2020-03-04T05:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Vulnerable-Web-Apps.jpg</image:loc>
			<image:title><![CDATA[Vulnerable--Web-Apps]]></image:title>
			<image:caption><![CDATA[Akamai JavaScript]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/wireless-security-the-next-step-wpa3-is-ready-for-prime-time/</loc>
		<lastmod>2020-03-04T05:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/wirelessnetworking.jpg</image:loc>
			<image:title><![CDATA[wirelessnetworking]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/are-you-prepared-for-a-malicious-insider-threat/</loc>
		<lastmod>2020-03-04T05:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Malicious-Insider-Threat.jpg</image:loc>
			<image:title><![CDATA[privacy]]></image:title>
			<image:caption><![CDATA[APTs]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/spy-group-targeted-air-gapped-systems-via-compromised-secure-usb-drives/</loc>
		<lastmod>2020-03-04T05:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/keylock.jpg</image:loc>
			<image:title><![CDATA[keylock]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/katy-perry-recommends-two-factor-authentication-ciso-security-vendor-relationship-podcast/</loc>
		<lastmod>2020-03-04T05:12:58+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/KatyPerry.jpg</image:loc>
			<image:title><![CDATA[KatyPerry]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/CISO_Security-Vendor-Relationship-Series-Podcast-Square-Logo-1.jpg</image:loc>
			<image:caption><![CDATA[CISO/Security Vendor Relationship Podcast]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/china-cyberespionage-group-hacks-satellite-telecom-and-defense-firms/</loc>
		<lastmod>2020-03-04T05:12:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/China.jpg</image:loc>
			<image:title><![CDATA[China]]></image:title>
			<image:caption><![CDATA[Micron's IP was Stolen]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/olympic-destroyer-moves-from-pyeongchang-to-europe-and-russia/</loc>
		<lastmod>2020-03-04T05:12:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/07/canstockphoto2552677.jpg</image:loc>
			<image:title><![CDATA[canstockphoto2552677]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/2018/06/cisco-patches-critical-flaws-in-switch-and-firewall-os/</loc>
		<lastmod>2020-03-04T05:12:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/canstockphoto42371635.jpg</image:loc>
			<image:title><![CDATA[canstockphoto42371635]]></image:title>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->